fe [2J[1;1H
Player: Ulvin
Game: Slash'EM Extended
Server: $ATTR(14)em.slashem.me - https://em.slashem.me/$ATTR()
Filename: 2023-12-18.15:36:03.ttyrec
Time: (1702913763) Mon Dec 18 15:36:03 2023
[2Jfe4 [?1049h[H[2J[H[2;1HThis is Sadistic Levels of Endless X-Citement (SLEX) 1997-2022 by Amy
[3;1HNetHack, Copyright 1985-2003 Stichting Mathematisch Centrum, M. Stephenson.
[4;1HContact the dev team via the #em.slashem.me channel on Libera IRC.
[5;1HSee license for details.
[6;1HfeQ W [7;1H[8;1HShall I pick a character's race, role, gender and alignment for you? [ynq] feQ yfe N [H[2J[H[H[2J[H[H[2J[HContent warning:
[2;1H[3;1HThis game is rated R, or Mature Content. The content of this game
[4;1Hmay be unsuitable for underage players. Additionally, some of this
[5;1Hgame's content may include features that can be triggering to some
[6;1Hplayers, including but not limited to strong language, graphical
[7;1Hdescriptions of violence, sexual assault, self injury and mental
[8;1Hdisabilities. If you feel that you could be triggered by the
[9;1Hexposure to this kind of content, you might want to opt out of
[10;1Hthis game. The author, Amy, takes no responsibility for any harm
[11;1Hcaused by playing this game.
[12;1H[13;1HIf you wish to not see this message on every new game start,
[14;1Hyou can hide it by adding OPTIONS=!contentwarning to your
[15;1Huser configuration file.[45;1H[K--More--feVc [H[2J[H[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[Afe@k [43;1H[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[1;133H[K It is written in the Book of Danzai:[2;133H[K [3;133H[K After the Creation, the cruel god Moloch rebelled[4;133H[K against the authority of Marduk the Creator.[5;133H[K Moloch stole from Marduk the most powerful of all[6;133H[K the artifacts of the gods, the Amulet of Yendor,[7;133H[K and he hid it in the dark cavities of Gehennom, the[8;133H[K Under World, where he now lurks, and bides his time.[9;133H[K [10;133H[K Your god Danzai seeks to possess the Amulet, and with it[11;133H[K to gain deserved ascendance over the other gods.[12;133H[K [13;133H[K You, a newly trained Cash Stealer, have been heralded[14;133H[K from birth as the instrument of Danzai. You are destined[15;133H[K to recover the Amulet for your deifesk ty, or die in the[16;133H[K attempt. Your hour of destiny has come. For the sake[17;133H[K of us all: Go bravely with Danzai![18;133H[K[C--More--feC [1;132H[K[2;132H[K[3;132H[K[4;132H[K[5;132H[K[6;132H[K[7;132H[K[8;132H[K[9;132H[K[10;132H[K[11;132H[K[12;132H[K[13;132H[K[14;132H[K[15;132H[K[16;132H[K[17;132H[K[18;132H[Kfe } [6;115H[HHello Ulvin, welcome to SlashEMExtended! You are a lawful female peacemaker Pickpocket.[K[6;115H[1;89H--More--feO 2 [HYou are playing SLASH'EM Extended on a public server. For game discussion, bug reports etc. join the #em.slashem.me IRC channel on Libera. You should absolutely do that, unless you want to[K[K
figure out this complex game on your own. Amy and other players will be glad to give you advice![K--More--ge
[A[K[2;1H[K[H[6;115H[HAttention: You're playing BIGslex, where the dungeon levels are bigger than normal. Recommended terminal size is 125x45. Also, savebreaks will happen without warning in this version. If you[K[K
have a far-progressed savegame that you want to finish, contact me on the IRC. If your savegame seems to be gone, contact me on the IRC too. Have fun![K--More-- ge A
[A[K[2;1H[K[H[6;115H[HMessage of the day: This is a reminder that you should be playing the game on a terminal with the dimensions 125x45. If you haven't already, open your terminal settings NOW and change it to[K[K
125x45 or you'll keep wondering why the bottom status line disappears or gets cut off when it gets too long! Use exactly 125x45 for best results, any other dimensions and it won't work[K[K
properly![K--More--gepE '
[A[A[K[2;1H[K[3;1H[K[H[6;115Hgej L [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[HThe victorian underwear shapes your figure, but it isn't very practical to fight in.[K[6;115Hge - [1;87HThe moon is waxing tonight.[K[6;115Hge 0 [H[K[6;115H[HUnknown command ' '.[K--More--ge] M [6;115H[HYou might want to turn on the number pad, which is done by opening the options with shift-O and navigating to the number_pad entry (it's not between null and perm_invent, you have to scroll[K[K
further down to the compound options). Toggle that with the appropriate letter key and hit spacebar (not escape!) until the number_pad dialog comes up, and set it to 2. Alternatively, you[K[K
can also turn on the number pad by adding this line to your options file: OPTIONS=number_pad:2 (probably requires you to start a new game). (Press y to disable this message) [yn] (n) [K"ges~ N n[K[H[K[K[2;1H[K[3;1H[K[6;115H[HTurn the number pad on? [yn] (n) [K#geUb n[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115H'ge8 0 [H[K[6;115H[HUnknown command ' '.[K--More--(ge M [6;115H[HYou might want to turn on the number pad, which is done by opening the options with shift-O and navigating to the number_pad entry (it's not between null and perm_invent, you have to scroll[K[K
further down to the compound options). Toggle that with the appropriate letter key and hit spacebar (not escape!) until the number_pad dialog comes up, and set it to 2. Alternatively, you[K[K
can also turn on the number pad by adding this line to your options file: OPTIONS=number_pad:2 (probably requires you to start a new game). (Press y to disable this message) [yn] (n) [K)ge N n[K[H[K[K[2;1H[K[3;1H[K[6;115H[HTurn the number pad on? [yn] (n) [K*ge n[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115H+ger [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115H,ge [1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) 0ge [5;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[H[2J[HSLASH'EM History file for release 0.0.7
[2;1H[3;1HBehold, mortal, the origins of SLASH'EM...
[4;1H[5;1HJay Fenlason wrote the original Hack with help from Kenny Woodland,
[6;1HMike Thome, and Jon Payne.
[7;1H[8;1HAndries Brouwer did a major re-write, transforming Hack into a very different
[9;1Hgame, and published (at least) three versions (1.0.1, 1.0.2, and 1.0.3) for
[10;1HUNIX(tm) machines to the Usenet.
[11;1H[12;1HDon G. Kneller ported Hack 1.0.3 to Microsoft(tm) C and MS-DOS(tm), producing
[13;1HPC HACK 1.01e, added support for DEC Rainbow graphics in version 1.03g, and
[14;1Hwent on to produce at least four more versions (3.0, 3.2, 3.51, and 3.6).
[15;1H[16;1HR. Black ported PC HACK 3.51 to Lattice(tm) C and the Atari 520/1040ST,
[17;1Hproducing ST Hack 1.03.
[18;1H[19;1HMike Stephenson merged thes0gek e various versions back together, incorporating
[20;1Hmany of the added features, and produced NetHack version 1.4. He then
[21;1Hcoordinated a cast of thousands in enhancing and debugging NetHack 1.4 and
[22;1Hreleased NetHack versions 2.2 and 2.3.
[23;1H [24;1HLater, Mike coordinated a major rewrite of the game, heading a team which
[25;1Hincluded Ken Arromdee, Jean-Christophe Collet, Steve Creps, Eric Hendrickson,
[26;1HIzchak Miller, Eric S. Raymond, John Rupley, Mike Threepoint, and Janet Walz,
[27;1Hto produce NetHack 3.0c. The same group subsequently released ten patch-
[28;1Hlevel revisions and updates of 3.0.
[29;1H[30;1HNetHack 3.0 was ported to the Atari by Eric R. Smith, to OS/2 by Timo
[31;1HHakulinen, and to VMS by David Gentzel. The three of them and Kevin Darcy
[32;1Hlater joined the main development team to produce subsequent revisions of
[33;1H3.0.
[34;1H[35;1HOlaf Seibert ported NetHack 2.3 and 3.0 to the Amiga. Norm Meluch, Stephen
[36;1HSpackman and Pierre Martineau d0ge Z esigned overlay code for PC NetHack 3.0.
[37;1HJohnny Lee ported NetHack 3.0 to the Macintosh. Along with various other
[38;1HDungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports
[39;1Hthrough the later revisions of 3.0.
[40;1H[41;1HA scant one month before the next major version release of Nethack, two
[42;1Hadventurous souls undertook their own modification to the sacred Nethack
[43;1Hformula. Tom Proudfoot and Yuval released Nethack++, which was rapidly
[44;1Hrenamed Nethack--, containeing new monsters, items and other miscellaneous
[45;1H[K--More--3geB [H[2J[Hmodifications.
[2;1H [3;1HHeaded by Mike Stephenson and coordinated by Izchak Miller and Janet Walz,
[4;1Hthe development team which now included Ken Arromdee, David Cohrs,
[5;1HJean-Christophe Collet, Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart,
[6;1HDean Luick, Pat Rankin, Eric Raymond, and Eric Smith undertook a radical
[7;1Hrevision of 3.0. They re-structured the game's design, and re-wrote major
[8;1Hparts of the code. They added multiple dungeons, a new display, special
[9;1Hindividual character quests, a new endgame and many other new features, and
[10;1Hproduced NetHack 3.1.
[11;1H[12;1HKen Lorber, Gregg Wonderly and Greg Olson, with help from Richard Addison,
[13;1HMike Passaretti, and Olaf Seibert, developed NetHack 3.1 for the Amiga.
[14;1H[15;1HNorm Meluch and Kevin Smolkowski, with help from Carl Schelin, Stephen
[16;1HSpackman, Steve VanDevender, and Paul Winner, ported NetHack 3.1 to the PC.
[17;1H[18;1HJon Watte and Hao-yang Wang, with help from Ross Brown3gex , Mike Engber, David
[19;1HHairston, Michael Hamel, Jonathan Handler, Johnny Lee, Tim Lennan, Rob Menke,
[20;1Hand Andy Swanson developed NetHack 3.1 for the Macintosh, porting it for
[21;1HMPW. Building on their development, Barton House added a Think C port.
[22;1H[23;1HTimo Hakulinen ported NetHack 3.1 to OS/2. Eric Smith ported NetHack 3.1
[24;1Hto the Atari. Pat Rankin, with help from Joshua Delahunty, is responsible
[25;1Hfor the VMS version of NetHack 3.1. Michael Allison ported NetHack 3.1 to
[26;1HWindows NT.
[27;1H[28;1HDean Luick, with help from David Cohrs, developed NetHack 3.1 for X11.
[29;1HWarwick Allison added in the "tiled" version of the game and generated most
[30;1Hof the individual tiles for NetHack 3.2.
[31;1H[32;1HTime passed, and Nethack-- was ported to 3.11 by Chris.
[33;1H[34;1HStephen White then released his own modification known as Nethack Plus,
[35;1Hwhich contained new character classes. Unbeknownst to the world at large,
[36;1HTom Proudfoot to3ge ? ok this source and combined it with his Nethack--.
[37;1HStephen White went on to add weapon skills, which were eventually integrated
[38;1Hinto the next version of Nethack, and other features.
[39;1H[40;1HIn February 1996, Tom Proudfoot released SLASH V1. Including part of
[41;1HStephen White's Nethack Plus and his own Nethack--, leaving unmentioned
[42;1Hhis own slew of further modifications, this is perhaps the best known of
[43;1Hthe Nethack modifications. Six versions of this, ending with SLASH V6,
[44;1Hare known to exist.
[45;1H[K--More--5ge, [H[2J[H[2;1HThe 3.2 development team, comprised of: Michael Allison; Ken Arromdee; David
[3;1HCohrs; Jessie Collet; Steve Creps; Kevin Darcy; Timo Hakulinen; Steve
[4;1HLinhart; Dean Luick; Pat Rankin; Eric Smith; Mike Stephenson; Janet Walz; and
[5;1HPaul Winner, released version 3.2 in April of 1996.
[6;1H[7;1HVersion 3.2 marks the tenth anniversary of the formation of the development
[8;1Hteam. In a testament to their dedication to the game, all thirteen members
[9;1Hof the original development team remained on the team at the start of work
[10;1Hon the current release. During the interval between the release of 3.1.3
[11;1Hand 3.2, one of the founding members of the development team, Dr. Izchak
[12;1HMiller, passed away. This release of the game is dedicated to him by the
[13;1Hdevelopment and porting teams.
[14;1H[15;1HVersion 3.2 proved to be more stable than previous versions. Many bugs
[16;1Hwere fixed, abuses eliminated, and game features tuned for better game
[17;1Hplay.
[18;5geo 1H[19;1HSLASH V6 was picked up by Enrico Horn managed to synchronize it with the
[20;1H3.2 source. The new SLASH 4.1.2 was released as far back as November 1996
[21;1Hwent through at least 4 editlevels (E5, E6, E7) with the latest version
[22;1Hbeing 4.1.2E8, synchronized with Nethack 3.2.2 and the Blackmarket option
[23;1Havailable, released in June 1997.
[24;1H[25;1HNathan La began the arduous task of drawing tiles for the SLASH monsters.
[26;1H[27;1HKentaro Shirakata ported SLASH 4.1.2E8 to Unix.
[28;1H[29;1HLief Clennon ported SLASH 4.1.2E8 to OS/2.
[30;1H[31;1HRomain Dolbeau ported SLASH 4.1.2E8 to Macintosh.
[32;1H[33;1HWarren Cheung combined SLASH 4.1.2 and Wizard Patch to create SLASH'EM 0.1
[34;1Hin November 1997. Several revisions including new spells and other minor
[35;1Hadditions have led to SLASH'EM 0.0.3. Steven Uy has generously made
[36;1Hadditional modifications.
[37;1H[38;1HDirk Schoenberger has continued updating the SLASH/SLASH'EM monster tiles.
[39;1HH5ge e has also ported SLASH'EM to Linux.
[40;1H[41;1HLief Clennon ported SLASH'EM to OS/2 EMX.
[42;1H[43;1HKevin Hugo ported SLASH'EM to Macintosh, and has also contributed
[44;1Hadditional changes and improvements.
[45;1H[K--More--5ge
[H[2J[H[2;1HRobin Johnson finished arduous task of drawing tiles for the SLASH'EM
[3;1Hmonsters. He has also contributed many more new tiles.
[4;1H[5;1HKevin later joined the DevTeam and incorporated the best of these ideas
[6;1Hin NetHack 3.3.
[7;1H[8;1HJNetHack (the Japanese version of NetHack) has been around since at least
[9;1H1994, developed by Issei Numata and others. The GTK interface was written
[10;1Hfor this variant and released in 1999.
[11;1H[12;1HMitsuhiro Itakura headed a team which began the process of redrawing the
[13;1HNetHack tiles in 8-bit color at 32x32 pixels.
[14;1H[15;1HThe final update to 3.2 was the bug fix release 3.2.3, which was released
[16;1Hsimultaneously with 3.3.0 in December 1999 just in time for the Year 2000.
[17;1H[18;1HThe 3.3 development team, consisting of Michael Allison, Ken Arromdee,
[19;1HDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen,
[20;1HKevin Hugo, Steve Linhart, Ken Lorber, Dean Luick, Pat Rankin, Eric Smith,
[215geF
;1HMike Stephenson, Janet Walz, and Paul Winner, released 3.3.0 in
[22;1HDecember 1999 and 3.3.1 in August of 2000.
[23;1H[24;1HVersion 3.3 offered many firsts. It was the first version to separate race
[25;1Hand profession. The Elf class was removed in preference to an elf race,
[26;1Hand the races of dwarves, gnomes, and orcs made their first appearance in
[27;1Hthe game alongside the familiar human race. Monk and Ranger roles joined
[28;1HArcheologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues,
[29;1HSamurai, Tourists, Valkyries and of course, Wizards. It was also the first
[30;1Hversion to allow you to ride a steed, and was the first version to have a
[31;1Hpublicly available web-site listing all the bugs that had been discovered.
[32;1HDespite that constantly growing bug list, 3.3 proved stable enough to last
[33;1Hfor more than a year and a half.
[34;1H[35;1HWarren Cheung combined SLASH'EM 0.0.5E7F1 and NetHack 3.3 to create
[36;1HSLASH'EM 0.0.6 and maintained the DOS and 5ger
Microsoft Windows ports.
[37;1H[38;1HJ. Ali Harlow incorporated the GTK interface and Mitsuhiro Itakura's 32x32
[39;1Htileset into SLASH'EM 0.0.6 and maintained the UNIX port of SLASH'EM 0.0.6.
[40;1HPeter Makholm maintained the Debian package.
[41;1H[42;1HPaul Hurtley maintained the MAC port of SLASH'EM 0.0.6.
[43;1H[44;1HThe 3.4 development team initially consisted of Michael Allison, Ken Arromdee,
[45;1H[K--More--6geؑ [H[2J[HDavid Cohrs, Jessie Collet, Kevin Hugo, Ken Lorber, Dean Luick, Pat Rankin,
[2;1HMike Stephenson, Janet Walz, and Paul Winner, with Warwick Allison joining
[3;1Hjust before the release of NetHack 3.4.0 in March 2002.
[4;1H[5;1HAs with version 3.3, various people contributed to the game as a whole as
[6;1Hwell as supporting ports on the different platforms that NetHack runs on:
[7;1H[8;1HPat Rankin maintained 3.4 for VMS.
[9;1H[10;1HMichael Allison maintained NetHack 3.4 for the MS-DOS platform.
[11;1HPaul Winner and Yitzhak Sapir provided encouragement.
[12;1H[13;1HDean Luick, Mark Modrall, and Kevin Hugo maintained and enhanced the
[14;1HMacintosh port of 3.4.
[15;1H[16;1HMichael Allison, David Cohrs, Alex Kompel, Dion Nicolaas, and Yitzhak Sapir
[17;1Hmaintained and enhanced 3.4 for the Microsoft Windows platform. Alex Kompel
[18;1Hcontributed a new graphical interface for the Windows port. Alex Kompel also
[19;1Hcontributed a Windows CE port for 3.4.1.
[20;1H[21;1HRon Van Iwaa6ge' rden maintained 3.4 for OS/2.
[22;1H[23;1HJanne Salmijarvi and Teemu Suikki maintained and enhanced the
[24;1HAmiga port of 3.4 after Janne Salmijarvi resurrected it for 3.3.1.
[25;1H[26;1HChristian `Marvin' Bressler maintained 3.4 for the Atari after he
[27;1Hresurrected it for 3.3.1.
[28;1H[29;1HWarren Cheung, Christian Cooper, J. Ali Harlow, Paul Hurtley, Pekka Rousu
[30;1Hand Darshan Shaligram combined SLASH'EM 0.0.6E5F2 and Nethack 3.4
[31;1Hto create SLASH'EM 0.0.7
[32;1H[33;1HThe Slash'EM home page is at http://www.slashem.org/.
[34;1H[35;1H - - - - - - - - - -
[36;1H[37;1HFrom time to time, some depraved individual out there in netland sends a
[38;1Hparticularly intriguing modification to help out with the game. The Gods of
[39;1Hthe Dungeon sometimes make note of the names of the worst of these miscreants
[40;1Hin this, the list of Dungeoneers:
[41;1H[42;1H Adam Aronow Izchak Miller Mike Stephenson
[43;1H Alex Kompel 6geS J. Ali Harlow Norm Meluch
[44;1H Andreas Dorn Janet Walz Olaf Seibert
[45;1H[K--More--6ge0 [H[2J[H Andy Church Janne Salmijarvi Pasi Kallinen
[2;1H Andy Swanson Jean-Christophe Collet Pat Rankin
[3;1H Ari Huttunen Jochen Erwied Paul Winner
[4;1H Barton House John Kallen Pierre Martineau
[5;1H Benson I. Margulies John Rupley Ralf Brown
[6;1H Bill Dyer John S. Bien Ray Chason
[7;1H Boudewijn Waijers Johnny Lee Richard Addison
[8;1H Bruce Cox Jon W{tte Richard Beigel
[9;1H Bruce Holloway Jonathan Handler Richard P. Hughey
[10;1H Bruce Mewborne Joshua Delahunty Rob Menke
[11;1H Carl Schelin Keizo Yamamoto Robin Johnson
[12;1H Chris Russo Ken Arnold Roderick Schertler
[13;1H David Cohrs Ken Arromdee Roland McGrath
[14;1H David Damerell 6ge!1 Ken Lorber Ron Van Iwaarden
[15;1H David Gentzel Ken Washikita Ronnen Miller
[16;1H David Hairston Kevin Darcy Ross Brown
[17;1H Dean Luick Kevin Hugo Sascha Wostmann
[18;1H Del Lamb Kevin Sitze Scott Bigham
[19;1H Deron Meranda Kevin Smolkowski Scott R. Turner
[20;1H Dion Nicolaas Kevin Sweet Stephen Spackman
[21;1H Dylan O'Donnell Lars Huttar Stephen White
[22;1H Eric Backus Malcolm Ryan Steve Creps
[23;1H Eric Hendrickson Mark Gooderum Steve Linhart
[24;1H Eric R. Smith Mark Modrall Steve VanDevender
[25;1H Eric S. Raymond Marvin Bressler Teemu Suikki
[26;1H Erik Andersen Matthew Day Tim Lennan
[27;1H Frederick Roeber Merlyn Le6ge1 2 Roy Timo Hakulinen
[28;1H Gil Neiger Michael Allison Tom Almy
[29;1H Greg Laskin Michael Feir Tom West
[30;1H Greg Olson Michael Hamel Warren Cheung
[31;1H Gregg Wonderly Michael Sokolov Warwick Allison
[32;1H Hao-yang Wang Mike Engber Yitzhak Sapir
[33;1H Helge Hafting Mike Gallop
[34;1H Irina Rempt-Drijfhout Mike Passaretti
[35;1H[45;1H[K--More--7gev [H[2J[H[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[A8ge [1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) ;geA [6;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[6;115H[HSpecify unknown object by cursor? [ynq] (q) [K>geX q[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115HAge [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115HBge! [1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) Dge
[3;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[H[2J[H Welcome to NetHack! ( description of version 3.4 )
[2;1H[3;1H NetHack is a Dungeons and Dragons like game where you (the adventurer)
[4;1Hdescend into the depths of the dungeon in search of the Amulet of Yendor,
[5;1Hreputed to be hidden somewhere below the twentieth level. You begin your
[6;1Hadventure with a pet that can help you in many ways, and can be trained
[7;1Hto do all sorts of things. On the way you will find useful (or useless)
[8;1Hitems, quite possibly with magic properties, and assorted monsters. You can
[9;1Hattack a monster by trying to move onto the space a monster is on (but often
[10;1Hit is much wiser to leave it alone).
[11;1H[12;1H Unlike most adventure games, which give you a verbal description of
[13;1Hyour location, NetHack gives you a visual imaDge3
ge of the dungeon level you are
[14;1Hon.[15;1H[16;1H NetHack uses the following symbols:
[17;1H[18;1H - and | The walls of a room, possibly also open doors or a grave.
[19;1H . The floor of a room or a doorway.
[20;1H # A corridor, or iron bars, or a tree, or possibly a kitchen
[21;1H sink (if your dungeon has sinks), or a drawbridge.
[22;1H > Stairs down: a way to the next level.
[23;1H < Stairs up: a way to the previous level.
[24;1H @ You (usually), or another human.
[25;1H ) A weapon of some sort.
[26;1H [ A suit or piece of armor.
[27;1H % Something edible (not necessarily healthy).
[28;1H / A wand.
[29;1H = A ring.
[30;1H ? A scroll.
[31;1H ! A potion.
[32;1H ( Some other useful object (pick-axe, key, lamp...)
[33;1H $ A pile of gold.
[34;1H * ADgeD
; gem or rock (possibly valuable, possibly worthless).
[35;1H + A closed door, or a spell book containing a spell
[36;1H you can learn.
[37;1H ^ A trap (once you detect it).
[38;1H " An amulet, or a spider web.
[39;1H 0 An iron ball.
[40;1H _ An altar, or an iron chain.
[41;1H { A fountain.
[42;1H } A pool of water or moat or a pool of lava.
[43;1H \ An opulent throne.
[44;1H ` A boulder or statue.
[45;1H[K--More--Egem [H[2J[H A to Z, a to z, and several others: Monsters.
[2;1H I Invisible or unseen monster's last known location
[3;1H[4;1H You can find out what a symbol represents by typing
[5;1H '/' and following the directions to move the cursor
[6;1H to the symbol in question. For instance, a 'd' may
[7;1H turn out to be a dog.
[8;1H[9;1H[10;1Hy k u 7 8 9 Move commands:
[11;1H \|/ \|/ yuhjklbn: go one step in specified direction
[12;1Hh-.-l 4-.-6 YUHJKLBN: go in specified direction until you
[13;1H /|\ /|\ hit a wall or run into something
[14;1Hb j n 1 2 3 g
: run in direction until something
[15;1H numberpad interesting is seen
[16;1H G, same, except a branching corridor isn't
[17;1H < up ^: considered interesting (the ^ in this
[18;1H Ege case means the Control key, not a caret)
[19;1H > down m: move without picking up objects
[20;1H F: fight even if you don't sense a monster
[21;1H With the qwertz_layout option, the y and z keys are swapped.
[22;1H If the number_pad option is set, the number keys move instead.
[23;1H Depending on the platform, Shift number (on the numberpad),
[24;1H Meta number, or Alt number will invoke the YUHJKLBN commands.
[25;1H Control may or may not work when number_pad is enabled,
[26;1H depending on the platform's capabilities.
[27;1H[28;1HCommands:
[29;1H NetHack knows the following commands:
[30;1H ? Help menu.
[31;1H ` Main Menu.
[32;1H / Tell what a symbol represents. You may choose to specify
[33;1H a location or give a symbol argument.
[34;1H & Tell what a coEge mmand does.
[35;1H < Go up a staircase (if you are standing on it).
[36;1H > Go down a staircase (if you are standing on it).
[37;1H . Rest, do nothing for one turn.
[38;1H _ Travel via a shortest-path algorithm to a point on the map
[39;1H a Apply (use) a tool (pick-axe, key, lamp...)
[40;1H A Remove all armor.
[41;1H ^A Redo the previous command
[42;1H[43;1H ^B Steal
[44;1H c Close a door.
[45;1H[K--More--Ege: [H[2J[H C Call (name) an individual monster.
[2;1H d Drop something. d7a: drop seven items of object a.
[3;1H D Drop multiple items. This command is implemented in two
[4;1H different ways. One way is:
[5;1H "D" displays a list of all of your items, from which you can
[6;1H pick and choose what to drop. A "+" next to an item means
[7;1H that it will be dropped, a "-" means that it will not be
[8;1H dropped. Toggle an item to be selected/deselected by typing
[9;1H the letter adjacent to its description. Select all items
[10;1H with "+", deselect all items with "=". The moves
[11;1H you from one page of the listing to the next.
[12;1H The other way is:
[13;1H "D" will ask the question "What kinds of things do you want
[14;1H to drop? [!%= au]". You should type zero or more obEge; ject
[15;1H symbols possibly followed by 'a' and/or 'u'.
[16;1H Da - drop all objects, without asking for confirmation.
[17;1H Du - drop only unpaid objects (when in a shop).
[18;1H D%u - drop only unpaid food.
[19;1H ^D Kick (for doors, usually).
[20;1H f Fire ammunition from quiver.
[21;1H F Followed by direction, fight a monster (even if you don't
[22;1H sense it).
[23;1H e Eat food. Vampires cannot eat as such. However, they can
[24;1H gain nutrition by draining blood from fresh corpses using
[25;1H this command.
[26;1H E Engrave a message on the floor.
[27;1H E- - write in the dust with your fingers.
[28;1H f Fire ammunition from quiver.
[29;1H i Display your inventory.
[30;1H I Display selected parts of your inventory, as in
[31;1H I* - list all gems inEgeA; f inventory.
[32;1H Iu - list all unpaid items.
[33;1H Ix - list all used up items that are on your shopping bill.
[34;1H I$ - count your money.
[35;1H n# repeat next command
[36;1H N name or classify an item
[37;1H o Open a door.
[38;1H O Review current options and possibly change them.
[39;1H A menu displaying the option settings will be displayed
[40;1H and most can be changed by simply selecting their entry.
[41;1H Options are usually set before the game with a NETHACKOPTIONS
[42;1H environment variable, or via a config file (defaults.nh,
[43;1H Slash'EM Defaults, nethack.cnf, .nethackrc, etc.), not with
[44;1H the 'O' command.
[45;1H[K--More--Ege
[H[2J[H p Pay your shopping bill/Shopkeeper services.
[2;1H P Put on an accessory (ring, amulet, etc).
[3;1H ^P Repeat last message (subsequent ^P's repeat earlier messages).
[4;1H The behavior can be varied via the msg_window option.
[5;1H q Drink (quaff) something (potion, water, etc).
[6;1H Q Select ammunition for quiver.
[7;1H r Read a scroll or spell book.
[8;1H R Remove an accessory (ring, amulet, etc).
[9;1H ^R Redraw the screen.
[10;1H s Search for secret doors and traps around you.
[11;1H S Save the game.
[12;1H t Throw an object or shoot a projectile.
[13;1H T Take off armor.
[14;1H ^T Teleport, if you are able.
[15;1H v Displays the version number.
[16;1H V Display a longer identification of the version, including the
[17;1H history of the game.
[18;1H wEge(
Wield weapon. w- means wield nothing, use bare hands.
[19;1H W Wear armor.
[20;1H x Switch weapon slots.
[21;1H X List the spells you know (same as '+').
[22;1H ^X Show your attributes.
[23;1H ^Y polymorph (if possible) (^Z if qwertz_layout is set)
[24;1H z Zap a wand. (y if qwertz_layout is set)
[25;1H Z Cast a spell. (Y if qwertz_layout is set)
[26;1H ^Z Suspend the game. (^Y if qwertz_layout is set)
[27;1H : Look at what is here.
[28;1H ; Look at what is somewhere else.
[29;1H , Pick up some things.
[30;1H @ Toggle the pickup option.
[31;1H ^ Ask for the type of a trap you found earlier.
[32;1H ) Tell what weapon you are wielding.
[33;1H [ Tell what armor you are wearing.
[34;1H = Tell what rings you are wearing.
[35;1H " Tell what amulet you are wearing.
[36;1H Ege;
( Tell what tools you are using.
[37;1H * List and change items in use.
[38;1H * Tell what equipment you are using; combines the preceding five.
[39;1H $ Count your gold pieces.
[40;1H + List the spells you know; also rearrange them if desired.
[41;1H \ Show what types of objects have been discovered.
[42;1H ! Escape to a shell, if supported in your version and OS.
[43;1H # Introduces one of the "extended" commands. To get a list of
[44;1H the commands you can use with "#" type "#?". The extended
[45;1H[K--More--Fge [H[2J[H commands you can use depends upon what options the game was
[2;1H compiled with, along with your class and what type of monster
[3;1H you most closely resemble at a given moment. If your keyboard
[4;1H has a meta key (which, when pressed in combination with another
[5;1H key, modifies it by setting the 'meta' (8th, or 'high') bit),
[6;1H these extended commands can be invoked by meta-ing the first
[7;1H letter of the command. An alt key may have a similar effect.
[8;1H[9;1H If the "number_pad" option is on, some additional letter commands
[10;1H are available:
[11;1H[12;1H h displays the help menu, like '?'
[13;1H j Jump to another location.
[14;1H k Kick (for doors, usually).
[15;1H K List vanquished monsters (whether by you or not).
[16;1H l Loot a box on the floor.
[17;1H n followed bFgeR y number of times to repeat the next command
[18;1H N Name an object or type of object.
[19;1H u Untrap a trapped object or door.
[20;1H[21;1H You can put a number before a command to repeat it that many times,
[22;1H as in "40." or "20s.". If you have the number_pad option set, you
[23;1H must type 'n' to prefix the count, as in "n40." or "n20s".
[24;1H[25;1H[26;1H Some information is displayed on the bottom line or perhaps in a
[27;1H box, depending on the platform you are using. You see your
[28;1H attributes, your alignment, what dungeon level you are on, how many
[29;1H hit points you have now (and will have when fully recovered), what
[30;1H your armor class is (the lower the better), your experience level,
[31;1H and the state of your stomach. Optionally, you may or may not see
[32;1H other information such as spell points, how much gold you have, etc.
[33;1H[34;1H Have Fun, and HaFgee ppy Hacking![45;1H[K--More--FgeK [H[2J[H[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[AFgek " [HUnknown command ' '.[K--More--Gge8 M [6;115H[HYou might want to turn on the number pad, which is done by opening the options with shift-O and navigating to the number_pad entry (it's not between null and perm_invent, you have to scroll[K[K
further down to the compound options). Toggle that with the appropriate letter key and hit spacebar (not escape!) until the number_pad dialog comes up, and set it to 2. Alternatively, you[K[K
can also turn on the number pad by adding this line to your options file: OPTIONS=number_pad:2 (probably requires you to start a new game). (Press y to disable this message) [yn] (n) [KIge{5
' y[K[H[K[K[2;1H[K[3;1H[K[6;115HIge[8
n [HIn order to turn the message off for all subsequent games too, add OPTIONS=nonumpadmessage to your configuration file.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115HLgeM [H[K[1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) Oge
[4;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[H[2J[Hy k u 7 8 9 Move commands:
[2;1H \|/ \|/ yuhjklbn: go one step in specified direction
[3;1Hh-.-l 4-.-6 YUHJKLBN: go in specified direction until you
[4;1H /|\ /|\ hit a wall or run into something
[5;1Hb j n 1 2 3 g: run in direction until something
[6;1H numberpad interesting is seen
[7;1H G, same, except a branching corridor isn't
[8;1H < up ^: considered interesting (the ^ in this
[9;1H case means the Control key, not a caret)
[10;1H > down m: move without picking up objects
[11;1H With the qwertz_layout option, the y and z keys are swapped
[12;1H If the number_OgeF
pad option is set, the number keys move instead.
[13;1H Depending on the platform, Shift number (on the numberpad),
[14;1H Meta number, or Alt number will invoke the YUHJKLBN commands.
[15;1H Control may or may not work when number_pad is enabled,
[16;1H depending on the platform's capabilities.
[17;1H [18;1H[19;1HGeneral commands:
[20;1H? help display one of several informative texts
[21;1H` menu access the menusystem
[22;1HS save save the game (to be continued later)
[23;1H! sh escape to some SHELL (if allowed)
[24;1H^Z suspend suspend the game (independent of your current suspend char)
[25;1H (^Y if option qwertz_layout is set)
[26;1HO options set options
[27;1H/ whatis tell what a map symbol represents
[28;1H\ known display list of what's been discovered
[29;1Hv version display version number
[30;1HV history display game history
[3OgeV
1;1H^A again redo the previous command (^A denotes the keystroke CTRL-A)
[32;1H^R redraw redraw the screen
[33;1H^P prevmsg repeat previous message (subsequent ^P's repeat earlier ones)
[34;1H# introduces an extended command (#? for a list of them)
[35;1H[36;1HGame commands:
[37;1H^B bereave steal
[38;1H^D kick kick (a door, or something else)
[39;1H^T 'port teleport (if you can)
[40;1H^X show show your attributes
[41;1H^Y poly' polymorph (if possible)
[42;1Ha apply apply or use a tool (pick-axe, key, camera, etc.)
[43;1HA armor take off all armor
[44;1Hc close close a door
[45;1H[K--More--Pge [H[2J[HC call name an individual monster (ex. baptize your dog)
[2;1Hd drop drop an object. d7a: drop seven items of object 'a'
[3;1HD Drop drop selected types of objects
[4;1He eat eat something (or drain corpse, if vampire)
[5;1HE engrave write a message in the dust on the floor (E- use fingers)
[6;1Hf fire fire item from quiver
[7;1HF fight followed by direction, fight a monster
[8;1Hi invent list your inventory (all objects you are carrying)
[9;1HI Invent list selected parts of your inventory
[10;1H Iu: list unpaid objects
[11;1H Ix: list unpaid but used up items
[12;1H I$: count your money
[13;1Hn# repeat repeat next command
[14;1HN name name or classify an item
[15;1Ho open open a door
[16;1Hp pay pay your bill (in a shop)/shopkeeper services
[17;1HP puton put on an accessory (ring, amulet, etc)
[1Pge 8;1Hq quaff drink something (potion, water, etc)
[19;1HQ quiver select ammunition for quiver
[20;1Hr read read a scroll or spell book
[21;1HR remove remove an accessory (ring, amulet, etc)
[22;1Hs search search for secret doors, hidden traps and monsters
[23;1Ht throw throw or shoot a weapon
[24;1HT takeoff take off some armor
[25;1Hw wield wield a weapon (w- wield nothing)
[26;1HW wear put on some armor
[27;1Hx exchange swap weapon slots
[28;1HX 2weapon toggle two-weapon combat
[29;1Hz zap zap a wand (y if option qwertz_layout is set)
[30;1HZ Zap cast a spell (Y if option qwertz_layout is set)
[31;1H< up go up the stairs
[32;1H> down go down the stairs
[33;1H^ trap_id identify a previously found trap
[34;1H),[,=,",( ask for current items of specified symbol in use
[35;1H* items list and change items in use
[36;1H$ gold Pge count your gold
[37;1H+ spells list the spells you know
[38;1H_ travel move via a shortest-path algorithm to a point on the map
[39;1H. rest wait a moment
[40;1H, pickup pick up all you can carry
[41;1H@ toggle "pickup" (auto pickup) option on and off
[42;1H: look look at what is here
[43;1H; farlook look at what is somewhere else by selecting a map symbol
[44;1H[45;1H[K--More--Pge [H[2J[HKeyboards that have a meta key can also use these extended commands
[2;1Hvia the meta modifier instead of the # prefix:
[3;1H[4;1HM-? Display extended command help (if the platform allows this)
[5;1HM-2 twoweapon toggle two-weapon combat (unless number_pad is enabled)
[6;1HM-a adjust adjust inventory letters
[7;1HM-b bereave steal
[8;1HM-c chat talk to someone
[9;1HM-d dip dip an object into something
[10;1HM-e enhance advance or check weapons skills
[11;1HM-f force force a lock
[12;1HM-i invoke invoke an object's special powers
[13;1HM-j jump jump to another location
[14;1HM-l loot loot a box on the floor
[15;1HM-m monster use a monster's special ability
[16;1HM-n name name an item or type of object
[17;1HM-o offer offer a sacrifice to the gods
[18;1HM-p pray pray to the gods for help
[19;1HM-q quit quit the game
[20;1HM-r rub rub a lamp or a stone
[21;1HM-s sit siPge܈ \ t down
[22;1HM-t tech use a class specific technique
[23;1HM-u untrap untrap something
[24;1HM-y youpoly polymorph yourself
[25;1HM-v version print compile time options for this version
[26;1HM-w wipe wipe off your face
[27;1H[28;1HIf the "number_pad" option is on, these additional variants are available:
[29;1H[30;1Hn followed by number of times to repeat the next command
[31;1Hh help display one of several informative texts, like '?'
[32;1Hj jump jump to another location
[33;1Hk kick kick something (usually a door)
[34;1HK kills list vanquished monsters (whether by you or not)
[35;1Hl loot loot a box on the floor
[36;1HN name name an item or type of object
[37;1Hu untrap untrap something (usually a trapped object)[45;1H[K--More--Pge [H[2J[H[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[AQgeE [1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) Uge~ [10;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[H[2J[H[2;1H Full Current Key Bindings List
[3;1H[4;1HDirectional keys:
[5;1H y k u
[6;1H \|/
[7;1H h-.-l
[8;1H /|\
[9;1H b j n
[10;1H[11;1H < up
[12;1H > down
[13;1H[14;1HShift- will move in specified direction until you hit
[15;1H a wall or run into something.
[16;1HCtrl- will run in specified direction until something
[17;1H very interesting is seen.
[18;1H[19;1HMiscellaneous keys:
[20;1Hg rush until something interesting is seen
[21;1HG run until something extremely interesting is seen
[22;1HF fight even if you don't see a monster
[23;1Hm move without picking up objects/fighting
[24;1HM run without picking up objects/fighting
[25;1H escape from the current query/action
[26;1H^a redo the previous command
[27;1H[28;1H^c break out of nUgeO n ethack (SIGINT)
[29;1H[30;1HCommand keys:
[31;1H^d kick something
[32;1H^p toggle through previously displayed game messages
[33;1H^r redraw screen
[34;1H^s save the game
[35;1H^t teleport around level
[36;1H^x show your attributes (intrinsic ones included in debug or explore mode)
[37;1H" show the amulet currently worn
[38;1H# perform an extended command
[39;1H$ count your gold
[40;1H& tell what a command does
[41;1H( show the tools currently in use
[42;1H) show the weapon currently wielded
[43;1H* show all equipment in use (generally, ),[,=,",( commands
[44;1H+ list known spells
[45;1H[K--More--UgeN [H[2J[H, pick up things at the current location
[2;1H. rest one move while doing nothing
[3;1H/ show what type of thing a symbol corresponds to
[4;1H: look at an object
[5;1H; show what type of thing a map symbol on the level corresponds to
[6;1H= show the ring(s) currently worn
[7;1H? give a help message
[8;1H@ toggle the pickup option on/off
[9;1HA remove all armor
[10;1HC call (name) a particular monster (vanilla)
[11;1HD drop specific item types
[12;1HE engrave writing on the floor
[13;1HI inventory specific item types
[14;1HO show option settings, possibly change them
[15;1HP put on an accessory (ring amulet, etc)
[16;1HQ select ammunition for quiver
[17;1HR remove an accessory (ring, amulet, etc)
[18;1HS save the game
[19;1HT take off one piece of armor
[20;1HV show long version and game history
[21;1HW wear a piece of armor
[22;1HX toggle two-weapon combat
[23;1HZ zap (cast) a spell
[24;1H[ show the armor currently worn
[25;1H\ show what object types have been discovered
[26Uge m ;1H^ show the type of a trap
[27;1H_ Travel to a specific location
[28;1Ha apply (use) a tool (pick-axe, key, lamp...)
[29;1Hc close a door
[30;1Hd drop an item
[31;1He eat something
[32;1Hf fire ammunition from quiver
[33;1Hi show your inventory
[34;1Ho open a door
[35;1Hp pay your shopping bill
[36;1Hq quaff (drink) something
[37;1Hr read a scroll or spellbook
[38;1Hs search for traps and secret doors
[39;1Ht throw something
[40;1Hv show version
[41;1Hw wield (put in use) a weapon
[42;1Hx swap wielded and secondary weapons
[43;1Hz zap a wand
[44;1HM-2 toggle two-weapon combat
[45;1H[K--More--UgeԂ : [H[2J[HM-? get this list of extended commands
[2;1HM-N name an item or type of object
[3;1HM-a adjust inventory letters
[4;1HM-b steal from monsters
[5;1HM-c talk to someone
[6;1HM-d dip an object into something
[7;1HM-e advance or check weapons skills
[8;1HM-f force a lock
[9;1HM-i invoke an object's powers
[10;1HM-j jump to a location
[11;1HM-l loot a box on the floor
[12;1HM-m use a monster's special ability
[13;1HM-n name an item or type of object
[14;1HM-o offer a sacrifice to the gods
[15;1HM-p pray to the gods for help
[16;1HM-q exit without saving current game
[17;1HM-r rub a lamp or a stone
[18;1HM-s sit down
[19;1HM-t perform a technique
[20;1HM-u untrap something
[21;1HM-v list compile time options for this version of Slash'EM
[22;1HM-w wipe off your face
[23;1H[45;1H[K--More--Vge [H[2J[H[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[AVge [1;143H[K Select one item:[2;143H[K [3;143H[K a - Long description of the game and commands.[4;143H[K b - List of game commands.[5;143H[K c - Concise history of Slash'EM.[6;143H[K d - Info on a character in the game display.[7;143H[K e - Info on what a given key does.[8;143H[K f - List of game options.[9;143H[K g - Longer explanation of game options.[10;143H[K h - Full list of keyboard commands.[11;143H[K i - List of extended commands.[12;143H[K j - The NetHack license.[13;143H[K [14;143H[K[C(end) Wge [12;146H+[1;142H[K[2;142H[K[3;142H[K[4;142H[K[5;142H[K[6;142H[K[7;142H[K[8;142H[K[9;142H[K[10;142H[K[11;142H[K[12;142H[K[13;142H[K[14;142H[K[15;142H[K[H[2J[H NETHACK GENERAL PUBLIC LICENSE
[2;1H (Copyright 1989 M. Stephenson)
[3;1H[4;1H (Based on the BISON general public license,
[5;1H copyright 1988 Richard M. Stallman)
[6;1H[7;1H Everyone is permitted to copy and distribute verbatim copies of this
[8;1H license, but changing it is not allowed. You can also use this wording to
[9;1H make the terms for other programs.
[10;1H[11;1H The license agreements of most software companies keep you at the mercy of
[12;1Hthose companies. By contrast, our general public license is intended to give
[13;1Heveryone the right to share NetHack. To make sure that you get the rights we
[14;1Hwant you to have, we need to make restrictions that forbid anyone to deny you
[15;1Hthese rights or to ask you to surrWgeK ender the rights. Hence this license
[16;1Hagreement.
[17;1H[18;1H Specifically, we want to make sure that you have the right to give away
[19;1Hcopies of NetHack, that you receive source code or else can get it if you
[20;1Hwant it, that you can change NetHack or use pieces of it in new free
[21;1Hprograms, and that you know you can do these things.
[22;1H[23;1H To make sure that everyone has such rights, we have to forbid you to
[24;1Hdeprive anyone else of these rights. For example, if you distribute copies
[25;1Hof NetHack, you must give the recipients all the rights that you have. You
[26;1Hmust make sure that they, too, receive or can get the source code. And you
[27;1Hmust tell them their rights.
[28;1H[29;1H Also, for our own protection, we must make certain that everyone finds out
[30;1Hthat there is no warranty for NetHack. If NetHack is modified by someone
[31;1Helse and passed on, we want its recipients to know that what they have is
[32;1Hnot what we distributed.
[33;1HWgen Z [34;1H Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
[35;1Hthe following terms which say what you must do to be allowed to distribute or
[36;1Hchange NetHack.
[37;1H[38;1H[39;1H COPYING POLICIES
[40;1H[41;1H 1. You may copy and distribute verbatim copies of NetHack source code as
[42;1Hyou receive it, in any medium, provided that you keep intact the notices on
[43;1Hall files that refer to copyrights, to this License Agreement, and to the
[44;1Habsence of any warranty; and give any other recipients of the NetHack
[45;1H[K--More--Xge&O [H[2J[Hprogram a copy of this License Agreement along with the program.
[2;1H[3;1H 2. You may modify your copy or copies of NetHack or any portion of it, and
[4;1Hcopy and distribute such modifications under the terms of Paragraph 1 above
[5;1H(including distributing this License Agreement), provided that you also do the
[6;1Hfollowing:
[7;1H[8;1H a) cause the modified files to carry prominent notices stating that you
[9;1H changed the files and the date of any change; and
[10;1H[11;1H b) cause the whole of any work that you distribute or publish, that in
[12;1H whole or in part contains or is a derivative of NetHack or any part
[13;1H thereof, to be licensed at no charge to all third parties on terms
[14;1H identical to those contained in this License Agreement (except that you
[15;1H may choose to grant more extensive warranty protection to some or all
[16;1H third parties, at your option)
[17;1H[18;1H c) You may charge a distribution fee for the physical act XgeO of
[19;1H transferring a copy, and you may at your option offer warranty protection
[20;1H in exchange for a fee.
[21;1H[22;1H 3. You may copy and distribute NetHack (or a portion or derivative of it,
[23;1Hunder Paragraph 2) in object code or executable form under the terms of
[24;1HParagraphs 1 and 2 above provided that you also do one of the following:
[25;1H[26;1H a) accompany it with the complete machine-readable source code, which
[27;1H must be distributed under the terms of Paragraphs 1 and 2 above; or,
[28;1H[29;1H b) accompany it with full information as to how to obtain the complete
[30;1H machine-readable source code from an appropriate archive site. (This
[31;1H alternative is allowed only for noncommercial distribution.)
[32;1H[33;1HFor these purposes, complete source code means either the full source
[34;1Hdistribution as originally released over Usenet or updated copies of the
[35;1Hfiles in this distribution used to create the object code or executable.XgeO D
[36;1H[37;1H 4. You may not copy, sublicense, distribute or transfer NetHack except as
[38;1Hexpressly provided under this License Agreement. Any attempt otherwise to
[39;1Hcopy, sublicense, distribute or transfer NetHack is void and your rights to
[40;1Huse the program under this License agreement shall be automatically
[41;1Hterminated. However, parties who have received computer software programs
[42;1Hfrom you with this License Agreement will not have their licenses terminated
[43;1Hso long as such parties remain in full compliance.
[44;1H[45;1H[K--More--Xgej [H[2J[H[2;1HStated plainly: You are permitted to modify NetHack, or otherwise use parts
[3;1Hof NetHack, provided that you comply with the conditions specified above;
[4;1Hin particular, your modified NetHack or program containing parts of NetHack
[5;1Hmust remain freely available as provided in this License Agreement. In
[6;1Hother words, go ahead and share NetHack, but don't try to stop anyone else
[7;1Hfrom sharing it farther.[45;1H[K--More--Xgej [H[2J[H[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1HDlvl:1 $200 HP[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[4;111H[1m[38;5;7mĿ[m[5;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;7m[7md[m[m[38;5;7m[m[1m[38;5;6m+[m[1m[38;5;7m[m[6;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;0m[41m@[m[38;5;3m%[m[1m[38;5;7m[m[7;111H[1m[38;5;7m[m[38;5;7m[m[1m[38;5;4m![m[1m[38;5;7mr[m[38;5;7m[m[1m[38;5;7m[m[8;111H[1m[38;5;7m+[m[A[AYge 2 [HSpecify unknown object by cursor? [ynq] (q) [K[gezn s y[K[6;115H[HPlease move the cursor to an unknown object.[K[6;115H[1;47H(For instructions type a ?)[K[6;115H]geK ]ge ^ge _ge\ [A_geE
[6;115H_ge
[HDone.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T1
[45;1H[K[6;115Hage [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T2
[45;1H[K[6;114H[1m[38;5;0m@[m[1m[38;5;5m<[mage/ : [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T2
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T3
[45;1H[K[5;114H[38;5;7m[m[6;113H[1m[38;5;0m@[m[1m[38;5;7mr[7md[m[m[7;115H[38;5;7m[m[Abgezb / [A[1m[38;5;0m@[m[6;113H[38;5;7m[m[Abgevh [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T3
[45;1H[K[HThe little dog bites the rabbit.[K[5;113Hbgeg| [1;35HThe rabbit is killed![K[5;115H[38;5;1m;[m[6;114H[38;5;7m[m[1m[38;5;5m<[m[1m[38;5;7m[7md[m[m[5;113Hbge~ # [1;58HThe little dog eats a tripe ration {0}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T4
[45;1H[K[5;113Hfge@: [H[K[5;113Hfge= [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T4
[45;1H[K[5;113Hgge + [H[K[5;113H[HPick an object.[K[5;113Hgge [Chge hge hge igeY [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T4
[45;1H[K[5;113Hige $ [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T4
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T5
[45;1H[K[5;113H[38;5;7m[m[C[38;5;7m[m[6;113H[1m[38;5;0m@[m[38;5;1m;[mjgeA D [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T5
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T6
[45;1H[K[6;112H[1m[38;5;0m@[m[38;5;1m;[m[38;5;7m[m[C[38;5;7m[m[7;116H[1m[38;5;7m[7md[m[m[6;112Hjgex [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T6
[45;1H[K[6;112Hkgey [H[K[6;112Hkgez [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T6
[45;1H[K[6;112HlgeP [H[K[6;112Hlgea` ; [HYou hit the mussle.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T6
[45;1H[K[7;115H[1m[38;5;7m[7md[m[m[38;5;7m[m[6;112Hlgeb ' [1;22HThe mussle bites you![K[6;112Hlgee [43;1H[K[[CUlvin the Cash Steal[m
[43;22Her] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H15(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T6
[45;1H[K[1;45H[-1 -> 15][K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T7
[45;1H[K[6;112Hmge_t [H[K[6;112Hmgev ; [HYou hit the mussle.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T7
[45;1H[K[7;115H[38;5;7m[m[1m[38;5;7m[7md[m[m[6;112Hmge{ > [1;22HThe mussle misses.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H16(16)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H4(4)
[45;1H[K[A[44;28H AC5 Exp1 T8
[45;1H[K[7;115H[1m[38;5;7m[7md[m[m[38;5;7m[m[6;112HngeAX [H[K[6;112HngeT[ [HCritical hit![K[6;112Hnge[ 6 [1;16HYou kill the mussle![K[6;113H[38;5;1m%[mngea` + [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T8
[45;1H[K[1;38HWelcome to experience level 2.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T8
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T9
[45;1H[K[6;116H[1m[38;5;7m[7md[m[m[7;115H[38;5;7m[m[6;112HqgesR [ [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T9
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T10
[45;1H[K[5;112H[1m[38;5;0m@[m[C[C[38;5;7m[m[1m[38;5;7m[7md[m[m[6;112H[38;5;7m[m[C[C[C[38;5;7m[m[5;112Hrge0 b [A[38;5;3m#[m[5;110H[38;5;3m[m[1m[38;5;0m@[m[38;5;7m[m[6;110H[38;5;3m[m[Arge6 H [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T10
[45;1H[K[HThe little dog picks up a spellbook {0}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T11
[45;1H[K[5;116H[38;5;7m[m[6;115H[1m[38;5;7m[7md[m[m[5;111HtgeF [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T11
[45;1H[K[4;109H[38;5;3m#[m[5;109H[1m[38;5;6m[m[1m[38;5;0m@[m[1m[38;5;7m[m[6;109H[38;5;3m+[m[6;115H[1m[38;5;5m<[m[7;116H[1m[38;5;7m[7md[m[m[5;110Htge3H # [HYou hear a door open.[K[5;110Htge X [1;24HThe little dog drops a spellbook {0}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T12
[45;1H[K[7;115H[1m[38;5;7m[7md[m[m[1m[38;5;6m+[m[5;110HtgeY [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T12
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T13
[45;1H[K[4;108H[38;5;3m#[m[5;108H[38;5;3m#[m[1m[38;5;0m@[m[38;5;3m[m[6;108H[38;5;3m#[m[6;116H[1m[38;5;7m[7md[m[m[7;115H[38;5;7m[m[5;109Huge+D [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T13
[45;1H[K[5;109HugeD m [H[K[5;109H[1m[38;5;6m[m[6;109H[1m[38;5;0m@[m[6;116H[38;5;7m[m[7;108H[38;5;5m[m[Auge?B
[HYou see here a moldy spellbook {0}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T13
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T14
[45;1H[K[6;109Hvge [H[K[5;109H[1m[38;5;6m[m[38;5;3m[m[6;109H[38;5;3m+[m[6;114H[38;5;7m[m[7;109H[1m[38;5;0m@[m[8;108H[38;5;3m[m[1m[38;5;1m[m[Avge [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T14
[45;1H[K[HThe little dog eats a mussle corpse {500}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T15
[45;1H[K[7;109Hvge
s [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T15
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T16
[45;1H[K[6;110H[38;5;3m[m[C[C[1m[38;5;7m[7md[m[m[7;109H[38;5;5m[m[8;109H[1m[38;5;0m@[m[9;108H[38;5;3m#[m[1m[38;5;1m[m[Awgeb [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T16
[45;1H[K[8;109Hwge; [H[K[8;109Hwge [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T16
[45;1H[K[8;109Hxge [H[K[8;109Hxge6 [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T16
[45;1H[K[8;109Hxge M [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T16
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T17
[45;1H[K[7;108H[38;5;5m[m[8;108H[38;5;3m[m[1m[38;5;0m@[m[9;108H[38;5;3m[m[C[C[38;5;3m#[m[AygeO$ [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T17
[45;1H[K[8;110Hzgev! [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T17
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T18
[45;1H[K[6;110H[38;5;3m[m[C[C[38;5;7m[m[7;110H[1m[38;5;0m@[m[1m[38;5;7m[7md[m[m[38;5;7m[m[8;110H[1m[38;5;1m[m[9;110H[1m[38;5;1m[m[A[AzgeN F [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T18
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T19
[45;1H[K[7;108H[38;5;5m[m[1m[38;5;0m@[m[1m[38;5;7m[7md[m[m[1m[38;5;7m[m[8;108H[38;5;3m[m[A{gec [A[A[1m[38;5;6m[m[38;5;3m[m[6;109H[1m[38;5;0m@[m[7;109H[38;5;5m[m[8;108H[38;5;3m[m[1m[38;5;1m[m[A[A{geP 7 [HYou see here a moldy spellbook {0}.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T19
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T20
[45;1H[K[7;109H[1m[38;5;7m[7md[m[m[38;5;5m[m[A{gel [H[K[6;109H{ge [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T20
[45;1H[K[6;109H{ge
[H[K[6;109H{ge
[HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T20
[45;1H[K[6;109H|geu [H[K[7;109H|ge [HYou displaced the little dog.[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T20
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T21
[45;1H[K[5;109H[1m[38;5;6m[m[38;5;3m[m[6;109H[38;5;3m+[m[1m[38;5;7m[7md[m[m[7;109H[1m[38;5;0m@[m[8;108H[38;5;3m[m[1m[38;5;1m[m[A|ge t [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T21
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T22
[45;1H[K[6;107H[38;5;3m#[m[C[C[38;5;3m[m[7;107H[38;5;5m[m[1m[38;5;0m@[m[38;5;5m[m[8;107H[38;5;5m[m[C[C[1m[38;5;1m[m[A}geJ V [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T22
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T23
[45;1H[K[6;106H[38;5;3m#[m[7;106H[38;5;3m#[m[1m[38;5;0m@[m[38;5;5m[m[8;106H[38;5;3m#[m[C[C[38;5;3m[m[A}geIr
[HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T23
[45;1H[K[7;107H~ge i [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T23
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T24
[45;1H[K[7;107H[38;5;5m[m[C[C[C[1m[38;5;7m[7md[m[m[8;107H[1m[38;5;0m@[m[9;106H[38;5;3m#[m[38;5;5m[m[38;5;3m[m[A~ge$ X [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T24
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T25
[45;1H[K[7;107H[38;5;5m[m[8;107H[38;5;5m[m[9;107H[1m[38;5;0m@[m[10;106H[38;5;3m[m[38;5;5m[m[38;5;3m#[m[Agej [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T25
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T26
[45;1H[K[7;111H[1m[38;5;7m[m[8;107H[38;5;5m[m[38;5;3m[m[9;107H[38;5;5m[m[10;107H[1m[38;5;0m@[m[11;106H[38;5;3m[m[38;5;5m[m[38;5;3m#[m[Age Z [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T26
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T27
[45;1H[K[9;107H[38;5;5m[m[38;5;3m[m[10;107H[38;5;5m[m[11;107H[1m[38;5;0m@[m[12;106H[38;5;5m[m[38;5;3m#[m[Age1 _ [43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T27
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T28
[45;1H[K[10;106H[38;5;3m[m[38;5;5m[m[11;107H[38;5;5m[m[12;107H[1m[38;5;0m@[m[13;106H[1m[38;5;6m[m[38;5;3m##[m[Age* [HThere is a wall in the way![K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T28
[45;1H[K[12;107HgeI
G [H[K[43;1H[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T28
[45;1H[K[A[A[K[[CUlvin the Cash Stealer[m
[43;24H] St9 Dx18 Co4 In8 Wi9 Ch13 PicPeaFemLaw
[44;1H[44;15H[K
[45;1H[K[A[44;15H22(22)
[45;1H[K[A[44;21H Pw
[45;1H[K[A[44;24H11(11)
[45;1H[K[A[44;30H AC5 Exp2 T29
[45;1H[K[11;105H[38;5;3m[m[12;105H[38;5;5m[m[1m[38;5;0m@[m[38;5;5m[m[13;105H[38;5;3m#[m[Age