TSTP Solution File: SWW967+1 by Vampire---4.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Vampire---4.8
% Problem  : SWW967+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --ignore_missing on --mode portfolio/casc [--schedule casc_hol_2020] -p tptp -om szs -t %d %s

% Computer : n015.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri Sep  1 01:14:08 EDT 2023

% Result   : Theorem 0.22s 0.45s
% Output   : Refutation 0.22s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   10
%            Number of leaves      :   14
% Syntax   : Number of formulae    :   65 (  15 unt;   0 def)
%            Number of atoms       :  171 (   0 equ)
%            Maximal formula atoms :    9 (   2 avg)
%            Number of connectives :  197 (  91   ~;  75   |;  14   &)
%                                         (   5 <=>;  12  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   15 (   5 avg)
%            Maximal term depth    :    4 (   2 avg)
%            Number of predicates  :    8 (   7 usr;   6 prp; 0-2 aty)
%            Number of functors    :   20 (  20 usr;   5 con; 0-3 aty)
%            Number of variables   :   82 (;  82   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f774,plain,
    $false,
    inference(avatar_sat_refutation,[],[f575,f618,f664,f714,f723,f773]) ).

fof(f773,plain,
    ~ spl0_1,
    inference(avatar_contradiction_clause,[],[f725]) ).

fof(f725,plain,
    ( $false
    | ~ spl0_1 ),
    inference(resolution,[],[f724,f376]) ).

fof(f376,plain,
    pred_attacker(constr_CONST_0x30),
    inference(cnf_transformation,[],[f147]) ).

fof(f147,axiom,
    pred_attacker(constr_CONST_0x30),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax146) ).

fof(f724,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_1 ),
    inference(resolution,[],[f561,f466]) ).

fof(f466,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f288]) ).

fof(f288,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f194]) ).

fof(f194,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f121]) ).

fof(f121,axiom,
    ! [X116] :
      ( pred_attacker(X116)
     => pred_attacker(tuple_client_A_in_8(X116)) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax120) ).

fof(f561,plain,
    ( ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4))
    | ~ spl0_1 ),
    inference(avatar_component_clause,[],[f560]) ).

fof(f560,plain,
    ( spl0_1
  <=> ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).

fof(f723,plain,
    ~ spl0_5,
    inference(avatar_contradiction_clause,[],[f722]) ).

fof(f722,plain,
    ( $false
    | ~ spl0_5 ),
    inference(subsumption_resolution,[],[f721,f373]) ).

fof(f373,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f177]) ).

fof(f177,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f176]) ).

fof(f176,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f175]) ).

fof(f175,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',co0) ).

fof(f721,plain,
    ( pred_attacker(name_objective)
    | ~ spl0_5 ),
    inference(resolution,[],[f483,f574]) ).

fof(f574,plain,
    ( pred_attacker(tuple_client_A_out_9(name_objective))
    | ~ spl0_5 ),
    inference(avatar_component_clause,[],[f572]) ).

fof(f572,plain,
    ( spl0_5
  <=> pred_attacker(tuple_client_A_out_9(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).

fof(f483,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_9(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f305]) ).

fof(f305,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_9(X0)) ),
    inference(ennf_transformation,[],[f211]) ).

fof(f211,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_9(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f110]) ).

fof(f110,axiom,
    ! [X97] :
      ( pred_attacker(tuple_client_A_out_9(X97))
     => pred_attacker(X97) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax109) ).

fof(f714,plain,
    ~ spl0_4,
    inference(avatar_contradiction_clause,[],[f666]) ).

fof(f666,plain,
    ( $false
    | ~ spl0_4 ),
    inference(resolution,[],[f665,f376]) ).

fof(f665,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_4 ),
    inference(resolution,[],[f477,f570]) ).

fof(f570,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ spl0_4 ),
    inference(avatar_component_clause,[],[f569]) ).

fof(f569,plain,
    ( spl0_4
  <=> ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).

fof(f477,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f299]) ).

fof(f299,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f205]) ).

fof(f205,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_A_in_2(X122)) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax126) ).

fof(f664,plain,
    ~ spl0_3,
    inference(avatar_contradiction_clause,[],[f620]) ).

fof(f620,plain,
    ( $false
    | ~ spl0_3 ),
    inference(resolution,[],[f619,f376]) ).

fof(f619,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_3 ),
    inference(resolution,[],[f473,f567]) ).

fof(f567,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3))
    | ~ spl0_3 ),
    inference(avatar_component_clause,[],[f566]) ).

fof(f566,plain,
    ( spl0_3
  <=> ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).

fof(f473,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f295]) ).

fof(f295,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f201]) ).

fof(f201,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f125]) ).

fof(f125,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_A_in_4(X120)) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax124) ).

fof(f618,plain,
    ~ spl0_2,
    inference(avatar_contradiction_clause,[],[f577]) ).

fof(f577,plain,
    ( $false
    | ~ spl0_2 ),
    inference(resolution,[],[f576,f376]) ).

fof(f576,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_2 ),
    inference(resolution,[],[f470,f564]) ).

fof(f564,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1))
    | ~ spl0_2 ),
    inference(avatar_component_clause,[],[f563]) ).

fof(f563,plain,
    ( spl0_2
  <=> ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).

fof(f470,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f292]) ).

fof(f292,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f198]) ).

fof(f198,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(rectify,[],[f123]) ).

fof(f123,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_A_in_6(X118)) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax122) ).

fof(f575,plain,
    ( spl0_1
    | spl0_2
    | spl0_3
    | spl0_4
    | spl0_5 ),
    inference(avatar_split_clause,[],[f558,f572,f569,f566,f563,f560]) ).

fof(f558,plain,
    ! [X2,X3,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_attacker(tuple_client_A_in_8(X4)) ),
    inference(subsumption_resolution,[],[f557,f491]) ).

fof(f491,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f219]) ).

fof(f219,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f84]) ).

fof(f84,axiom,
    ! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax83) ).

fof(f557,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(subsumption_resolution,[],[f556,f491]) ).

fof(f556,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(subsumption_resolution,[],[f555,f491]) ).

fof(f555,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(subsumption_resolution,[],[f546,f491]) ).

fof(f546,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(cnf_transformation,[],[f372]) ).

fof(f372,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(flattening,[],[f371]) ).

fof(f371,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(ennf_transformation,[],[f273]) ).

fof(f273,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X3))
        & pred_attacker(tuple_client_A_in_6(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X206,X207,X208,X209,X210] :
      ( ( pred_attacker(tuple_client_A_in_2(X208))
        & pred_eq_bitstring_bitstring(name_Na(X206),constr_tuple_4_get_0x30(constr_cbc_dec_4(X208,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X208,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X209))
        & pred_attacker(tuple_client_A_in_6(X207))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X207,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X210))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X209,X208,X206)),constr_cbc_dec_1(X210,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X207,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective)) ),
    file('/export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036',ax171) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.13  % Problem    : SWW967+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.15  % Command    : vampire --ignore_missing on --mode portfolio/casc [--schedule casc_hol_2020] -p tptp -om szs -t %d %s
% 0.14/0.37  % Computer : n015.cluster.edu
% 0.14/0.37  % Model    : x86_64 x86_64
% 0.14/0.37  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.37  % Memory   : 8042.1875MB
% 0.14/0.37  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.14/0.37  % CPULimit   : 300
% 0.14/0.37  % WCLimit    : 300
% 0.14/0.37  % DateTime   : Sun Aug 27 19:53:54 EDT 2023
% 0.14/0.37  % CPUTime    : 
% 0.14/0.37  This is a FOF_THM_RFO_SEQ problem
% 0.14/0.37  Running vampire_casc2023 --mode casc -m 16384 --cores 7 -t 300 /export/starexec/sandbox/tmp/tmp.BQmavCnzvj/Vampire---4.8_25036
% 0.14/0.37  % (25147)Running in auto input_syntax mode. Trying TPTP
% 0.22/0.41  % (25148)lrs+1011_1_bd=preordered:flr=on:fsd=off:fsr=off:irw=on:lcm=reverse:msp=off:nm=2:nwc=10.0:sos=on:sp=reverse_weighted_frequency:tgt=full:stl=62_562 on Vampire---4 for (562ds/0Mi)
% 0.22/0.44  % (25149)lrs-1004_3_av=off:ep=RSTC:fsd=off:fsr=off:urr=ec_only:stl=62_525 on Vampire---4 for (525ds/0Mi)
% 0.22/0.44  % (25150)lrs+10_4:5_amm=off:bsr=on:bce=on:flr=on:fsd=off:fde=unused:gs=on:gsem=on:lcm=predicate:sos=all:tgt=ground:stl=62_514 on Vampire---4 for (514ds/0Mi)
% 0.22/0.44  % (25151)ott+1011_4_er=known:fsd=off:nm=4:tgt=ground_499 on Vampire---4 for (499ds/0Mi)
% 0.22/0.44  % (25152)ott+11_8:1_aac=none:amm=sco:anc=none:er=known:flr=on:fde=unused:irw=on:nm=0:nwc=1.2:nicw=on:sims=off:sos=all:sac=on_470 on Vampire---4 for (470ds/0Mi)
% 0.22/0.44  % (25153)lrs+10_1024_av=off:bsr=on:br=off:ep=RSTC:fsd=off:irw=on:nm=4:nwc=1.1:sims=off:urr=on:stl=125_440 on Vampire---4 for (440ds/0Mi)
% 0.22/0.44  % (25154)ott+1010_2:5_bd=off:fsd=off:fde=none:nm=16:sos=on_419 on Vampire---4 for (419ds/0Mi)
% 0.22/0.44  % (25154)Refutation not found, incomplete strategy% (25154)------------------------------
% 0.22/0.44  % (25154)Version: Vampire 4.7 (commit 05ef610bd on 2023-06-21 19:03:17 +0100)
% 0.22/0.44  % (25154)Linked with Z3 4.9.1.0 6ed071b44407cf6623b8d3c0dceb2a8fb7040cee z3-4.8.4-6427-g6ed071b44
% 0.22/0.44  % (25154)Termination reason: Refutation not found, incomplete strategy
% 0.22/0.44  
% 0.22/0.44  % (25154)Memory used [KB]: 5884
% 0.22/0.44  % (25154)Time elapsed: 0.005 s
% 0.22/0.44  % (25154)------------------------------
% 0.22/0.44  % (25154)------------------------------
% 0.22/0.44  % (25151)First to succeed.
% 0.22/0.45  % (25151)Refutation found. Thanks to Tanya!
% 0.22/0.45  % SZS status Theorem for Vampire---4
% 0.22/0.45  % SZS output start Proof for Vampire---4
% See solution above
% 0.22/0.45  % (25151)------------------------------
% 0.22/0.45  % (25151)Version: Vampire 4.7 (commit 05ef610bd on 2023-06-21 19:03:17 +0100)
% 0.22/0.45  % (25151)Linked with Z3 4.9.1.0 6ed071b44407cf6623b8d3c0dceb2a8fb7040cee z3-4.8.4-6427-g6ed071b44
% 0.22/0.45  % (25151)Termination reason: Refutation
% 0.22/0.45  
% 0.22/0.45  % (25151)Memory used [KB]: 6012
% 0.22/0.45  % (25151)Time elapsed: 0.009 s
% 0.22/0.45  % (25151)------------------------------
% 0.22/0.45  % (25151)------------------------------
% 0.22/0.45  % (25147)Success in time 0.071 s
% 0.22/0.45  % Vampire---4.8 exiting
%------------------------------------------------------------------------------