File size: 5,878 Bytes
2dcd69b
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
ID,Label

50,doesn't mention a harmful application

51,mentions a harmful application

52,doesn't mention a harmful application

53,mentions a harmful application

54,mentions a harmful application

55,doesn't mention a harmful application

56,doesn't mention a harmful application

57,doesn't mention a harmful application

58,doesn't mention a harmful application

59,mentions a harmful application

60,mentions a harmful application

61,doesn't mention a harmful application

62,doesn't mention a harmful application

63,mentions a harmful application

64,mentions a harmful application

65,doesn't mention a harmful application

66,doesn't mention a harmful application

67,mentions a harmful application

68,doesn't mention a harmful application

69,doesn't mention a harmful application

70,mentions a harmful application

71,mentions a harmful application

72,doesn't mention a harmful application

73,doesn't mention a harmful application

74,mentions a harmful application

75,mentions a harmful application

76,mentions a harmful application

77,doesn't mention a harmful application

78,mentions a harmful application

79,mentions a harmful application

80,doesn't mention a harmful application

81,doesn't mention a harmful application

82,doesn't mention a harmful application

83,mentions a harmful application

84,mentions a harmful application

85,doesn't mention a harmful application

86,mentions a harmful application

87,doesn't mention a harmful application

88,mentions a harmful application

89,mentions a harmful application

90,doesn't mention a harmful application

91,mentions a harmful application

92,mentions a harmful application

93,mentions a harmful application

94,mentions a harmful application

95,mentions a harmful application

96,doesn't mention a harmful application

97,doesn't mention a harmful application

98,mentions a harmful application

99,mentions a harmful application

100,doesn't mention a harmful application

101,doesn't mention a harmful application

102,doesn't mention a harmful application

103,mentions a harmful application

104,mentions a harmful application

105,mentions a harmful application

106,mentions a harmful application

107,doesn't mention a harmful application

108,doesn't mention a harmful application

109,doesn't mention a harmful application

110,mentions a harmful application

111,doesn't mention a harmful application

112,mentions a harmful application

113,mentions a harmful application

114,doesn't mention a harmful application

115,mentions a harmful application

116,mentions a harmful application

117,mentions a harmful application

118,doesn't mention a harmful application

119,mentions a harmful application

120,doesn't mention a harmful application

121,doesn't mention a harmful application

122,doesn't mention a harmful application

123,mentions a harmful application

124,doesn't mention a harmful application

125,doesn't mention a harmful application

126,mentions a harmful application

127,doesn't mention a harmful application

128,mentions a harmful application

129,mentions a harmful application

130,doesn't mention a harmful application

131,doesn't mention a harmful application

132,mentions a harmful application

133,doesn't mention a harmful application

134,mentions a harmful application

135,mentions a harmful application

136,doesn't mention a harmful application

137,mentions a harmful application

138,mentions a harmful application

139,mentions a harmful application

140,doesn't mention a harmful application

141,mentions a harmful application

142,doesn't mention a harmful application

143,mentions a harmful application

144,doesn't mention a harmful application

145,mentions a harmful application

146,mentions a harmful application

147,doesn't mention a harmful application

148,mentions a harmful application

149,mentions a harmful application

150,doesn't mention a harmful application

151,mentions a harmful application

152,doesn't mention a harmful application

153,mentions a harmful application

154,doesn't mention a harmful application

155,mentions a harmful application

156,doesn't mention a harmful application

157,mentions a harmful application

158,mentions a harmful application

159,mentions a harmful application

160,doesn't mention a harmful application

161,mentions a harmful application

162,doesn't mention a harmful application

163,mentions a harmful application

164,doesn't mention a harmful application

165,doesn't mention a harmful application

166,doesn't mention a harmful application

167,doesn't mention a harmful application

168,doesn't mention a harmful application

169,doesn't mention a harmful application

170,doesn't mention a harmful application

171,doesn't mention a harmful application

172,mentions a harmful application

173,doesn't mention a harmful application

174,mentions a harmful application

175,doesn't mention a harmful application

176,doesn't mention a harmful application

177,mentions a harmful application

178,mentions a harmful application

179,doesn't mention a harmful application

180,mentions a harmful application

181,doesn't mention a harmful application

182,doesn't mention a harmful application

183,mentions a harmful application

184,mentions a harmful application

185,mentions a harmful application

186,doesn't mention a harmful application

187,doesn't mention a harmful application

188,mentions a harmful application

189,mentions a harmful application

190,doesn't mention a harmful application

191,mentions a harmful application

192,doesn't mention a harmful application

193,mentions a harmful application

194,doesn't mention a harmful application

195,doesn't mention a harmful application

196,doesn't mention a harmful application

197,mentions a harmful application

198,mentions a harmful application

199,doesn't mention a harmful application