:T |b`cUĮFFFxwFFRP蘰^݈GFF=@|w*n|*p|*r|*t|*v|*x|*z|*||4 uPPȃ]øPPnPD~tGP6x||P6r|nP6z|`P6||RFP6n|D PHY~uvݶYu=t&w\t>wuP6z|2PYv6xPPYx;FtvPDP PYxFv6xnP PYFP6p|26YP6p|FF=|ѸPPnPkPqY ~u]x~uKvյYu==t2>wu(&w\tv6xP PYx;FtvPDP PYxFP6r|[PYnPYxP6r|:&w؋xPRx+ҋȋZXӉVFPPnPhPnYFV@G݊G3x%xF,6xvv0)6xYF6xYF=t=t=t% ~t PPƃPcY=NuFP6n|P6x|P6r|P6z|~P6||p PtYw~uvYu=t&w\t>wuP6z|2P7Yv6xP7 2PYx;FtvPDP 2PYxFv6xnP 2PYFP6p|X6YP6p|BFF=| wRPtFP6n|XP6x|JP6r|<P6z|.P6|| FP6p|6-YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|76YP6p|!FF=|ѸP6n|VFP6n|HP6x|:P6r|,P6z|P6||FP6p|6YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|'6YP6p|FF=|ѸP6n|FFP6n|8P6x|*P6r|P6z|P6||FP6p|6 YP6p|FF=|ѸP6n|RP2tFP6n|P6x|P6r|~P6z|pP6||bFP6p|6oYP6p|FF=|ѸP6n| FP6n|P6x|P6r|P6z|P6||FP6p|y6YP6p|cFF=|ѸP6n|FP6n|P6x||P6r|nP6z|`P6||RFP6p|6_YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|i6YP6p|SFF=|ѸP6n|FP6n|zP6x|lP6r|^P6z|PP6||BFP6p|6OYP6p|FF=|ѸP6n|RPttFP6n|P6x|P6r|P6z|P6||FP6p|C6YP6p|-FF=|ѸP6n|bFP6n|TP6x|FP6r|8P6z|*P6||FP6p|6)YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|36YP6p|FF=|ѸP6n|RFP6n|DP6x|6P6r|(P6z|P6|| FP6p|6YP6p|FF=|ѸP6n|FP6n|P6x|P6r|P6z|P6||FP6p|#6YP6p| FF=|ѸP6n|BPPnPNP6n|&PrYPY |PCPPP$|PCPPP7|PCPPPX|PCPPPPPnPPYP6n|PYFUF*F*FF#PP\P6n|GP6t|9Pv,PvP6p|P6v|P6x|P6r|P6z|P6||PY PYPPnP^xnPYFPnP?xnPYF~u ~uF&PYP6n|SPYPOYF~} ~uF]Uv v ~|P~|PPcPR]UFF^?tvF*PvY]UwWVv>wtFN>xs t#؋z3u~u z6z&7^_]w&&&&&&&&&&&&&&&&&&&&&& &&0&&@&&P&&`&&pUw^ ux㋟6zS3P&&F &Fw3dȀ>wu!a aCBB &bt%a aCBB赀&CBtX[&&]Uw^x㋟6zSF PF &F w3da aCBŀ>wu bB&t赀B&CBtX[&&]Uw>wt F&~t&]UVvwF d<t2x؋6z&&^]UVvwV<t2x؋6z&7^]W+y؃Gy ك9t؃_Wy؃GyكÅu;wP+Xʋ+ʋWVRPt͊ߊĊ*لuPs'IX؋ڎXZ+ӃӋ[Y+[sH+^_Encription and Lock Bitfields programmed.Note down the 64 byte Encriptioncode for future use.