:T] |b``UFFFxwFFRP蘰^݈GFF= |w*n|*p|*r|*t|*v|*x|*z|*||v uPPȃ]øPPnPD~tGP6x||P6r|nP6z|`P6||RFP6n|D PHY~uvݶYu=t&w\t>wuP6z|2PYv6xPS PYx;FtvPDP5 PYxFv6xnP PYFP6p|26YP6p|FF=|ѸPPnPkPqY ~u]x~uKvյYu==t2>wu(&w\tv6xP^ PYx;FtvPDP@ PYxFP6r|[PYnPYxP6r|:&w؋xPRx+ҋȋZXӉVFPPnPhPnYFV ݊GИ3x%xF,6xvv0)6xYF6xYF=t=t=tg~t^PPƃPcY=NuFP6n|P6x|P6r|P6z|~P6||p PtYw~uvYu=t&w\t>wuP6z|2P7Yv6xPy2PYx;FtvPDP[2PYxFv6xnP<2PYFP6p|X6YP6p|BFF=| wRPtFP6n|XP6x|JP6r|<P6z|.P6|| FP6p|6-YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|76YP6p|!FF=|ѸP6n|VFP6n|HP6x|:P6r|,P6z|P6||FP6p|6YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|'6YP6p|FF=|ѸP6n|FFP6n|8P6x|*P6r|P6z|P6||FP6p|6 YP6p|FF=|ѸP6n|RP2tFP6n|P6x|P6r|~P6z|pP6||bFP6p|6oYP6p|FF=|ѸP6n| FP6n|P6x|P6r|P6z|P6||FP6p|y6YP6p|cFF=|ѸP6n|FP6n|P6x||P6r|nP6z|`P6||RFP6p|6_YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|i6YP6p|SFF=|ѸP6n|FP6n|zP6x|lP6r|^P6z|PP6||BFP6p|6OYP6p|FF=|ѸP6n|PPnP P6n|P0YPY |PCPPP$|PCPPP7|PCPPPX|PCPPPPPnPPYP6n|RPYFUF*F*FF#PP\P6n|P6t|PvPvP6p|P6v|P6x|P6r|P6z|P6||PY PYPPnPxnPYFPnPxnPYF~u ~uF&PYP6n|P]YP YF~} ~uF]Uv v ~|P~|PPcP]sUFF^?tvF*PvY]UwWVv>wtFN>xs t#؋z3u~u z6z&7^_]w&&&&&&&&&&&&&&&&&&&&&& &&0&&@&&P&&`&&pUw^ ux㋟6zS3P&&F &Fw3dȀ>wu!a aCBB &bt%a aCBB赀&CBtX[&&]Uw^x㋟6zSF PF &F w3da aCBŀ>wu bB&t赀B&CBtX[&&]Uw>wt F&~t&]UVvwF d<t2x؋6z&&^]UVvwV<t2x؋6z&7^]W+y؃Gy ك9t؃_Wy؃GyكÅu;wP+Xʋ+ʋWVRPt͊ߊĊ*لuPs'IX؋ڎXZ+ӃӋ[Y+[sH+^_Encription and Lock Bitfields programmed.Note down the 32 byte Encriptioncode for future use.