DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/System32/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/System32//verifier.dll
MZ@	!L!This program cannot be run in DOS mode.

$'OFʫOFʫOFʫF>_JFʫF>NLFʫF>YLFʫOF˫FʫF>XNFʫF>IlFʫF>^NFʫF>[NFʫRichOFʫPEL*[J!	&`@$@2,$((<  hQ@x.text%& `.data@*@.rsrc(D@@.reloc#$@B[Jntdll.dllѻw5w ww`VwUww\wwZw@kw~kwBwUwUwUw`UwVwew Gw Tw@VwTw<hw Nw`Sw=www1wfwwQw)wuw[{wYwwdvw)/wwHw0w 1w@WwawB-wٯw2w]wwwL2w'w5w ww@w&w_w
wwګwUw^wwGw@Dw@wwLwՋwwҮww~1w4w1wTwfvwpUwLwwJwwwRwwwIwXw\wPRw:wwwZw`Nw5[w ZwwIwIw։w|wzwzww}w$ww+wwEewRwnwvwKwvwBwT~w`^w@^wPJwPQwpPw0KwRw^w[wwhww[J%QE*FaultInjectionProbabilityFaultInjectionTimeOutFaultInjectionExcludeDllsFaultInjectionIncludeDllsAVRF: fault injecting call made from %p 
AVRF:FINJ: invalid fault injection class %X 
multithreaded access in HEAP_NO_SERIALIZE heapHeap handleLast thread that used the heapCurrent thread using the heapNot used.heap handle with incorrect signaturePage heap: pid 0x%X: page heap enabled with flags 0x%X.
\KernelObjects\HighCommitConditionattempt to destroy process heapProcess heap handleextreme size requestSize requestedPage heap: freeing a null pointerHeapRootAddressprocess heap list count is wrongActual countPage heap countcorrupted heap blockexception raised while verifying blockException codecorrupted end stampcorrupted start stampCorrupted stampcorrupted prefix patterncorrupted suffix patterncorrupted heap pointer or using wrong heapHeap used in the callHeap owning the blockcorrupted infix pattern for freed blockcorruption addressblock already freedcorrupted headerHeap blockBlock sizeCorruption Addressheap blockheap signatureAVRF: EntryContents.Blink = %p, expected %p
heap list entryAVRF: Reached the end of heap list without finding heap index %x. Total number of heaps %x
list countlist headAVRF: Spy [%s, %u]: %X
VerifierRegisterLayerVerifierRegisterBasicsLayersVerifierUnregisterLayerVerifierUnregisterBasicsLayersAVRF: Terminate process after verifier stop failed with %X 
AVRF: Noncontinuable verifier stop %p encountered. Terminating process ... 
===========================================================
%s
===========================================================

VERIFIER STOP %p: pid 0x%X: %s 

	%p : %s
	%p : %s
	%p : %s
	%p : %s


===========================================================
This verifier stop is not continuable. Process will be terminated 
when you use the `go' debugger command.This verifier stop is continuable. 
After debugging it use `go' to continue.%sAVRF: Failed to initialize logging and stop supportAVRF: Invalid Stop code 0x%X passed to VerifierStopMessageExAVRF: Invalid LayerDescriptor or BreakDecriptor passed for Stop code 0x%X
AVRF:Failed to save message into stop list

AVRF:bogus string length, overflow
stop codeStopProcessingadvapi32.dllRegDeleteValueWRegSetValueExWRegQueryValueExWRegCloseKeyRegCreateKeyExWSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%xAVRF: settings: result %u 
GlobalFlag0x%08XVerifierFlagsLeak{81EEC8DA-0E61-4942-8037-9A6C4A86510D}InputOutput{5FE32372-CE71-43f9-B75D-6AD4B1B08D6A}Threadpool{F15FC24E-53A0-444D-8D28-F7697EDD9C83}TimeRollOver{de35a0c0-d3b8-11d9-8cd5-0800200c9a66}DangerousAPIs{02A5B40C-2F22-4409-BB37-7EF0D3F34A88}MiscellaneousDirtyStacks{970bd287-2e5a-4a06-9084-9e394d4c2697}Exceptions{F86B022F-E589-4e8f-B0DD-6B7AF9D71A59}Memory{8A70B8A4-4FA6-41c3-85EE-595FCB3E1051}TLS{EDDA96DB-D216-467d-BE3C-8603745EDA43}Locks{159D60EC-F459-456b-A27B-1076AD59F8F4}BasicsHandles{9760941A-8DA5-4dbe-843B-0EBD376CAB02}ThreadPageHeapCommitMemoryPercentPageHeapVirtualMemoryPercentPageHeapTargetDllsPageHeapDllRangeEndPageHeapDllRangeStartPageHeapRandomProbabilityPageHeapSizeRangeEndPageHeapSizeRangeStartAVRF: Exception during verifier.dll init for %ws with flags 0x%X.
AVRF: verifier.dll provider initialized for %ws with flags 0x%X
AVRF: Failed to initialize verifier.dll provider for %ws with flags 0x%X.
AVRF: failed to define OANOCACHE variable (%X). 
1OANOCACHEAVRF: NtQuerySystemInformation (SystemBasicInformation) failed, status %#x
AVRF: VerifierLoadEssentialStrings failed, status %#x
AVRF: VerifierRegisterBasicsLayers failed.
AVRF: failed to initialize FreeMemoryCallBacks (%X). 
AVRF: failed to initialize call trackers (%X). 
'c'0d'NtResumeProcessNtSuspendProcessntdll.dll=AVRF: failed to create verifier heap. 
AVRF: failed to initialize verifier stop logic (%X). 
AVRF: failed to allocated a verifier TLS slot.
first chance access violation for current stack traceInvalid address being accessedCode performing invalid accessException record. Use .exr to display it.Context record. Use .cxr to display it.AVRF: failed to add free memory callback @ %p 
AVRF: attempt to delete invalid free memory callback @ %p 
Unloading DLL inside current thread's stack address rangeDLL memory base addressDLL memory range sizeDLL name address. Use du to dump it.Stack low limit addressAVRF: Read just %Ix out of %Ix bytes of %s @ %p
AVRF: Couldn't read %s @ %p
RtlAcquireSRWLockSharedRtlAcquireSRWLockExclusiveRtlReleaseSRWLockSharedRtlReleaseSRWLockExclusiveRtlInitializeSRWLockntdll.dllRtlFreeMemoryBlockLookasideRtlAllocateMemoryBlockLookasideRtlExtendMemoryBlockLookasideRtlCreateMemoryBlockLookasideAVRF: Exception %x from address %p
RtlReportExceptionkernelbase.dlloleaut32.dllsetupapi.dlluser32.dllole32.dllmsvcrt.dllkernel32.dllSetupDiOpenDevRegKeySetupDiCreateDevRegKeyWSetupDiCreateDevRegKeyAVariantClearSysFreeStringSysAllocStringByteLenSysReAllocStringLenSysAllocStringLenSysReAllocStringSysAllocStringSetClipboardDataUnregisterPowerSettingNotificationRegisterPowerSettingNotificationPostQuitMessagePostMessageAPostMessageWPostThreadMessageAPostThreadMessageWCoUninitializeCoInitializeExCoInitialize_mbsdup_wcsdup_strdup??_V@YAXPAX@Z??_U@YAPAXI@Z??3@YAXPAX@Z??2@YAPAXI@ZfreerealloccallocmallocRegNotifyChangeKeyValueRegOpenKeyExWRegOpenKeyExARegOpenKeyWRegOpenKeyARegCreateKeyExARegCreateKeyWRegCreateKeyASetProcessWorkingSetSizeSetProcessWorkingSetSizeExHeapFreeHeapReAllocHeapAllocVirtualAllocLocalFreeGlobalFreeSetThreadPrioritySetThreadAffinityMaskUnmapViewOfFileWideCharToMultiByteMultiByteToWideCharCreateEventWCreateEventAVirtualFreeExVirtualFreeExitProcessIsBadStringPtrWIsBadStringPtrAIsBadCodePtrIsBadHugeWritePtrIsBadWritePtrIsBadHugeReadPtrIsBadReadPtrGetTickCountFreeLibraryAndExitThreadCreateFileWCreateFileALocalReAllocLocalAllocGlobalReAllocGlobalAllocWaitForMultipleObjectsExWaitForSingleObjectExWaitForMultipleObjectsWaitForSingleObjectCreateThreadTlsSetValueTlsGetValueTlsFreeTlsAllocSuspendThreadTerminateThreadExitThreadCloseHandleHeapDestroyHeapCreateNtDuplicateObjectNtNotifyChangeDirectoryFileRtlDestroyHeapRtlDeleteSecurityObjectNtCancelIoFileExNtCancelIoFileNtSetInformationFileRtlSetIoCompletionCallbackRtlExitUserThreadNtRemoveIoCompletionExNtRemoveIoCompletionNtFsControlFileNtDeviceIoControlFileRtlSetTimerRtlCancelTimerRtlUpdateTimerRtlDeleteTimerRtlCreateTimerRtlDeleteTimerQueueRtlDeleteTimerQueueExRtlCreateTimerQueueRtlDeregisterWaitRtlDeregisterWaitExRtlRegisterWaitRtlCreateHeapRtlQueueWorkItemTpCallbackLeaveCriticalSectionOnCompletionTpSimpleTryPostTpAllocAlpcCompletionTpReleaseIoCompletionTpAllocIoCompletionTpAllocWaitTpAllocTimerTpAllocWorkRtlInitializeCriticalSectionExLdrUnloadDllLdrLoadDll_snwprintf_snprintf_vsnwprintf_vsnprintfNtLockRegistryKeyNtSetInformationKeyNtUnloadKeyExNtSetValueKeyNtSaveMergedKeysNtSaveKeyExNtSaveKeyNtRestoreKeyNtCompressKeyNtCompactKeysNtRenameKeyNtReplaceKeyNtQueryMultipleValueKeyNtQueryValueKeyNtQueryKeyNtNotifyChangeMultipleKeysNtNotifyChangeKeyNtFlushKeyNtEnumerateValueKeyNtEnumerateKeyNtDeleteValueKeyNtDeleteKeyNtFlushInstructionCacheNtResetWriteWatchNtGetWriteWatchNtFreeUserPhysicalPagesNtQuerySectionNtProtectVirtualMemoryNtUnlockVirtualMemoryNtLockVirtualMemoryNtFlushVirtualMemoryNtWriteVirtualMemoryNtReadVirtualMemoryNtExtendSectionNtAllocateUserPhysicalPagesNtGetNextProcessNtTerminateProcessNtSetInformationProcessNtQueryInformationProcessNtGetNextThreadNtTerminateThreadNtSuspendThreadNtSetInformationThreadNtSetContextThreadNtResumeThreadNtQueueApcThreadNtQueryInformationThreadNtImpersonateThreadNtGetContextThreadNtAlertThreadNtAlertResumeThreadNtSetEventBoostPriorityNtResetEventNtQueryEventNtPulseEventNtClearEventNtSetEventRtlSetThreadPoolStartFuncNtWaitForMultipleObjectsNtWaitForSingleObjectNtWriteFileGatherNtWriteFileNtReadFileScatterNtReadFileRtlFreeHeapRtlReAllocateHeapRtlAllocateHeapNtCloseNtCreateEventRtlConvertExclusiveToSharedRtlConvertSharedToExclusiveRtlReleaseResourceRtlAcquireResourceExclusiveRtlAcquireResourceSharedRtlDeleteResourceRtlInitializeResourceRtlDeleteCriticalSectionRtlInitializeCriticalSectionAndSpinCountRtlInitializeCriticalSectionRtlLeaveCriticalSectionRtlEnterCriticalSectionRtlTryEnterCriticalSectionLdrGetProcedureAddressNtOpenKeyNtCreateKeyNtOpenFileNtCreateFileNtOpenSectionNtCreateSectionNtUnmapViewOfSectionNtMapViewOfSectionNtFreeVirtualMemoryNtAllocateVirtualMemoryAVRF: internal error: we do not have a replacement for %s !!! 
AVRF: %ws Failed to close handle 0x%p with Status 0x%X
AVRF: %ws Failed to close event 0x%p with Status 0x%X
AVRF: conditional breakpoint %X hit.
AVRF: %ws Failed to close event 0x%p with Status 0x%X in event completion callback
AVRF: %ws Failed to register wait callback with Status 0x%X
AVRF: %ws Failed to create event with Status 0x%X
AVRF: %ws Failed to clear event 0x%p with Status 0x%X
PeekMessageWRealGetWindowClassWEnumThreadWindowsUNKNOWN%p (CS = %p, DebugInfo = %p), left %p, right %p, parent %p
 current thread doesn't own locksNumber of critical sections owned by curent thread.critical section over-released or corruptedNumber of critical sections owned by current thread.Critical section addressLock countCritical section debug info address================================================
================================================
Critical section tree root = %p


AVrfpInsertCritSectInSplayTree( %p )


AVrfpFindCritSectInSplayTree( %p )


AVrfpDeleteCritSectFromSplayTree( %p )
AVRF: InitializeCriticalSection (%p) - out of memory - DebugInfo is not valid.
AVRF: InitializeCriticalSection (%p) - no tree node.
AVrfpInitializeCriticalSectionCommon (%p, %x, %x))
AVrfpRtlDeleteCriticalSection (%p)
AVrfpRtlInitializeResource (%p), CS = %p
AVrfpRtlDeleteResource (%p), CS = %p
AVRF: checking CS @ %p (debug info @ %p)
wuaueng.dllwscsvc.dllwmssetup.dllwmipcima.dllWMALFXGFXDSP.dllWLDAP32.dllwkssvc.dllwinspool.drvWinScard.dllWinInet.dllWindowsCodecs.dllwevtsvc.dllwercplsupport.dllwebclnt.dllwbemcons.dllwab32.dllVSSAPI.DLLvdsbas.dllvaultsvc.dllUrlmon.dllUNTFS.dlltscfgwmi.dlltquery.dlltaskschd.dlltaskcomp.dllsysmain.dllsrvsvc.dllsqmapi.dllspp.dllShimEng.dllshacct.dllschedsvc.dllrastapi.dllrasmans.dllradardt.dllquery.dllpwrshsip.dllprintui.dllpnidui.dllPhotoMetadataHandler.dllPerftrack.dllntevt.dllnlasvc.dllnlash.dllnlaapi.dllnetshell.dllnetprofm.dllmsxml6.dllmsxml3.dllmswmdm.dllmshtml.dllmsfeeds.dllmscories.dllmpssvc.dllmfc42u.dlllogger.ocxjscript.dllinetpp.dllimapi2.dlliessetup.dllieframe.dllIEDKCS32.DLLhidserv.dllfxsst.dllfirewallapi.dllfirewall.cplesent.dlles.dllemdmgmt.dllehssetup.dlldiagperf.dlldhcpmonitor.dlldhcpcore6.dlldhcpcore.dllDHCPCMONITOR.DLLcimwin32.dllcfgbkend.dllbitsigd.dllbcrypt.dllbcdsrv.dllauthui.dllaudiosrv.dlladsldpc.dllAVRF: Overflow for BytesAllocated (%p) + Size(%p) 
Application verifier deadlock/resource issueAVRF: deadlock: stop: %p %p %p %p
** Type !avrf -dlck in the debugger for more information.                 **
** Potential deadlock detected!                                           **
**                                                                        **
****************************************************************************
Resource %p acquired before resource %p -- 
Current thread (%p) is trying to release it first
Deadlock detection: Must release resources in reverse-order
WINHTTP.DLLUxTheme.dlliuengine.dllGDI32.DLLcatsrv.dllODBC32.dllrpcss.dlliac25_32.axframedyn.dllasfsipc.dllnetlogon.dllNETAPI32.DLLlocalspl.dllSPOOLSS.DLLmswsock.dllDNSAPI.DLLUSER32.DLLSbscrdll.dlllicdll.dlldpcdll.dlllicwmi.dllMSWSOCK.DLLOESpamFilter.dllsppsvc.exewinlogon.exeAVRF: TLS slot %x allocated by code at %p.
AVRF: AVrfpLdrLoadDll (%p, %ws)
AVRF: AVrfpLdrUnLoadDll (%p)
AVRF: failed to get dll base of user32.dll.
AVRF: dll entry @ %p (%ws, %x) 
AVRF: hooked dll entry point for dll %ws 
AVRF: low memory: will not verify entry point for %ws .
nsi.dllAVRF: %ws @ %p: entry point @ %p .
AVRF: %ws: null entry point.
AVRF: AVrfpLdrGetProcedureAddress (%p, %s) -> new address %p
Unexpected exception raised while initializing output buffer.Buffer start addressBuffer sizeAVRF: (%x, %x) AVrfpInitOutputBuffer filling Buffer 0x%p, size 0x%x
AVrfpFreeVirtualMemNotify: NtQueryVirtualMemory( %p ) failed %x
EventOrProcessFileKeySectionProcessThreadEvent
 Q$Q$Q$P$P$
P$P$H0F&Q$RSDS'xEMOR$verifier.pdbxlU(EEE}t}t	Exu
MQU	ELEM9EUEBHM;UsEMU;EvMUEPMQUBPMQeE}}UELMUREPMQREP/E}}MUD
EMQU REH$QURE}}TEMTUEPM(QUB,PMQÇE}}UELMURE0PMQ4REP荇E}}MUD
EMQU@REHDQURWE}}EMTUEPM8QUB<PMQ!E}}VE<$UUEffMރEf}uU+UU؋E؍LMUUh<$8MA8UELMUEB@MUQD3ExtMQRExtMQREx tMQ REx(tMQ(REx0tMQ0REx@tMQ@REx8tMQ8R~E]̋UQ}t}t	Exu
$ȅUBE	MLMU:ExtMQRExtMQREx tMQ REx(tMQ(REx0tMQ0REx8tMQ8REx@tMQ@RSE@3]̋UEE}sAEMAUEEM;Ms;Ut1M;MsUtMMUUEE뽋M;Mv;URjT	@0HQ$UE8uMMUEMUEEM;MsfUt\MQUMR$E;Ev<	MMU;UsEtUUEEMM뒋U3ɋUfЋE3ҋEfTMED]̋UEh'$E}}EjEP$M
@'h'$hjh'设 'hjh@'萾hjh@'|hjh@'h'hjh 'Jhjh '6hjh '"D'jjhh'jh$UR$B&E}h@&jh@'hh'WE	EEM@&|tYjE
@&Rh@&$u93
@&f3ҡ@&fP
@&A@'@'jjhh@'jh$UR$B&E}|h@&jh'hh@'jjjhأ'jhx$EP$B&jjj@h'jhD$MQ$B&3]̋U E<'u3=أ'tdMQ$أ'jj
RPJEUE+'M
'EMU;U|E;Evأ'3MQ>u3URu3{h@' $EE3ҹdE;'s@M'M<'tURh${TE@'3]̋UQ}u3jE	EEM;
 'sKU<@'t<E@';Mw-U@';EvM@'E@'3]̋UQ}u3jE	EEM;
'sKU< 't<E ';Mw-U ';EvM 'E '3]̋UQ'AME35@&UjU'R@&Pj$$]̋Uv@0Hhu=}rURh8$蠝#h',$EM'h'($]̋U@0Hhu3Eh',$=@'u-=@'u$U@'E@'@'E_E	MMU; 'sBE<@'u3MU@'EM@'U@'EEh'($E]̋UE@0Hhu3h',$E	UUE; 'sGMU;@'u6EM;@'u'@'@'@'Eh'($}t
E3]̋Uc@0Hhu3Eh',$E	UUE;'sBM< 'u3UE 'MU 'E 'MMh'($E]̋UE@0Hhu3h',$E	UUE;'sGMU; 'u6EM; 'u' ' ' 'Eh'($}t
E3]̋Ud]̋UV'E
'MEU;UskEEE;EsDM;Ms<UUEPQ0$UEPQ0$;tEE뱋M;MuUU2^]̋UQ=' tEQUBP,ȅu$Ѕth'8$EE;'}GMU;'s-'+EPM'RE'Q$UU뮡''MU'EEM'h'4$]̋U='uhE'EM;MFU+UUUEM;'rUUEM;'sUU벃E]̋UQ$u$h'@$MQIEh'<$EE]̋UQ$tbh'8$MQE}t:'''+EPM'RE'Q$h'4$]̋UQE}t'}t	Ex0t}uMy0t	UEB0]̋UQFE}t
E@03]̋UQE3ҹUUE]̋UEtTH$U¼3
t9h$jh$@$Ph$MRh$EPhh$jT]̋UEǀ]̋UEHQ,$]̋UEHQ($]̋U}u
EHQ($]̋UPEEEEEd$EMQH$]̋Ujhh&h&dPSVW0F&1E3PEdeEEHDt,UUE8uMMEEE[UM}u3h$jh$jh$jh$URh$jtREEEËeEh$jh$jh$jh$EPh$j,R3Md
Y_^[]̋UEHu
EE]̋UQEPMQEU UEEMME]̋UQEPMQURjEPjL$EE]̋Uh= @&dssjhHPjT$E3Ƀ}tKkd33҉EU @&3ɉU;rwE;vEF= @&u6jjMQj'RP$E3}t
}uEE3Ƀ}tURhEPMQEE]̋U4=@&dsGjj,EPjjX$E3Ƀ}t#Ekd35Z'EЋU;@&vEL=@&u<jj,EPjjX$E3Ƀ}tZ'+U؁wEE3}tAMEM9s	Ujh EPMQE̋E̋]̋UEEMQUREPj`$E}Eu,MQUR\$tMQUREPj`$EE]̋UEEMQUREPMQjd$E}Eu0UREP\$ȅtUREPMQURjd$EE]̋UEH QURhEEHMUUEtUUEtUU}u)EHɃ<QUREPE'MQ҃<REPMQE3҃}…tDEt3UBEMu	EEEjhMQEE]̋UEHMUB PMQ?EU%tMMUtMM}uh@UREPEjMQUREE]̋UQUBEMt*EEMQ REPEEMME]̋UEtUREP}EM MUB EE]̋UEPZȅu>U„RdEEEMQEPMEEE]̋UE;M]̋UEMUEMUEMHE]̋UEHUJEUEPMQ]̋UQEMUEMUQEMHUE]̋Ujh&h&dPSVW0F&1E3PEde}u3UEPMQ9Uu'EEEE܍MQURjEP-ME EЋM$MEEUЁ:ͫu0EЁxu$Ḿ9uŰBH;MuŰBEEEfMEȁ}u7EMԃ MԋUHM܍UREPjMQ-EEEËeEE,URE Ph$E}tMMEEMd
Y_^[]̋UEPMQ;E}UBu'EEMMUREPjMQY,UREP<EEEMUA ;BtMMUREPjMQ,UEJ0;HtUUEPMQjUR+jjEPMQ.E]̋UEHUJEHUJEPMQ]̋UEHUJEHUJEP]̋UEMUBEMUEMHU;U]̋UEH UJMP$Q,Etj'UB0jEPMQUR7EEMUQEMHXURjEPM Ql$EUB\MA\UB`MAUB`EH QURMUEP]̋UjEPMMQUR@E}EPMQfEUMUBߋMAURE Pp$EMQ\EP\MUA`+BMA`UB PMQU+ȋUEPE]̋UEHMUBMAUM}@wAUEMUE9MtUUEPMUPsYMUE9Et-MMUEJ;HwUREP7MUƋEPMQ]̋UQEHMUEMUQEMUEB]̋UEEE}@w5MUEMU9EtMMIUUŋEMU”9UtEEMQ;UrEME}t-UR0EHUJEUE]̋UEHMUJEH+MUJEMHU$RE$PQMQUR]̋UEMHUEBM$QmUEBMUQE$PM$QUBEMAUB+EMAUREPMQUR]̋UEMHUE]̋UEH($MUBtxMQEPM9QudUREHUJEUEMQPEHUJEHM$QSUREPMQ$$UEHtlUBMAU9BuXEPMQEPMEMQEPMQU$REPMQUB($EMUA;BuOMUA;BuAMQURKhEHQUBPMQUREPMQ
UREPJ]̋UVWEEjEPMylt>UBlEMUAl;Bpu
MApUEHJlUBtMAtE}t+Ut!MQdE
HdUzdu
E@hMQU}u3HUMMUBMAUr3EHQUR
ȋ9Ut My0tUB0P'MA0jUREt.UMUBMAURExP`
MQUREPxqMMjj	U RjK)EtUzt
EHQ'UMUBMAURjEQt$_^]̋UEEsjjMQUR&E3}tKjMQkUs(EUEHUJEEPkE]̋UEEUUuMP$Q,Et$Uz0t
EH0Q'j'UB0EPMQ=EUͫE@܋MUB0AMQ REPk=uMQURujMQUREHUJEHQURbMQ;EEMt$Ext
MQR'j'MAjURE@MyluUEBlMUQpEHpUQEMHpUBtMAtUt:MUzduEMHdUEBhMQhEMUQhEPzMytvURe]̋UEHlM}t.UtMMUB;EuE
MQU3]̋UjEPMxQЅu;EUExP9EMMUBMAEURE]̋UEHMUBEMUQEME]̋UEPMQ{E}UEPEMQE}t}u}UREP/E}teEMMUREP
E3Ƀ}u9UREPjMQUREPMQUREEE}t
EPMQ}t
UREP}tHMQ;Uv=EtMQEURE}tEPMQUREP+E]̋UEMUUUE4;Ew'MQUREHUJE4E΋MUE]̋U(EPE}EEMUEHMUE;Hurjh@URE}tEHMU@UBEEEPMQ#E3҃}…uUE܉EM@MEUB%<PMQURE3}u9}tMQUR}thEPMQEUE;HuUEMUQEPMQ&}u>}t6UREEPuEMQURh@EPMQURTMEx@v(MQ=E}tURh@EPMQU$REPMQUREE]̋UE၇FU%t	EIMu	E2EtPtu	EU%tM;
P'rU;L'v	EEtnlRpPj j$$ȉME	UUE;Es(M􋔍p;H'rE􋌅p;
D'wNjU;UuEZEt-U°R $EE3ҹd;@'rE=@&t	= @&uEEE]̋UEMUEM;Ms3U;Uv]̋UE EMQXUE@XE]̋U]̋UPhX$EP$EEEM܉MEEURhh'$E3}uEjj,MQjT$E3҃}…uEEУZ'
Z'+M̉
Z'h'$E3҃}…uEPhX'k'h 'h'$h'|$@&P^H Qh$jj]x$E]̋U 3EEEEEEEEjMQhUR$EE]̋U4E}u3}uE'uGE3Ƀ}u3[}u}t3HEEjh UREPE3Ƀ}uUt
h3E E%<PhMQURE3}u)hjMQUt
h3hhEPTMUJ@E
MADjhUR
E3}u)hjMQzUt
h83EEMUEBMUJE
@&}tU
MU%tMQEPM tEHUJjEP$MUЉEHQ$E3҃}…u)hjEPMt
h@3$jUREPMQUREP$MUu6EHQ$hjUREt
h3Mt\EjEPjMR$E3}u3sMRiE3}u3MMQSUxRGEP;MQ,E}@sUEQUU܋EPM@UJEMh	UREP,EMQ EUREPhPMQUREPj'Mjh$h`$h$U R$E@Xh',$MQhX''`'`'h'($E-]̋UE@0M;Hu1h$jh$jh$jh$URh$j	'.3EPE}u3jMQU싂EjM Q$EjU R$E}toEEM싑ujjEPMQ\UB PMQR'E싈t Uz0tEH0Q'UB0yE싈MUEM9MtWUUjjE PMQUBPM Q'U싂tMyt
UBP'듋MQ1th',$U¤RA`'`'h'($MQUBP$M샹tU싂P'MQUEEMUE9EuhjMQRhjEHQ뽋UR$3]̋UVEEE}vO'@t,h$jh$jh$MQh$URh$j+Et
h!3MMU#UUEP?E}u3MUQUE$ȅu
UREPMt4'%t}sMQUR=uEP[E}tE}s&MхuEPMQЅuF}u7EPMQjUREPPMQEUR}tEMH UtMQEP*MQURQMqUREP+MqUREPMQE3҃}…t	EHM}t~UREPMхuCEuMQ RhEHQ}tUB PjMQR҇EPMQ REHQUREPf}}t8}tjMQUREPMQTUREPMQ~U…u6MQUREQUURbE}t''Mхu!EP}uMt
h+E^]̋UE}u?'%t,h$jh$jh,$MQh $URh$j&(EPE}u2MUQUEPMQ}UREPE}t/MAUBMAUREPEMQUREQURMEEPMuUt
hE]̋U,EEEEEE}vP
'@t,h$jh$jh$URh$EPh$j&Mt
hd3UUE#EEMQE}u3UEBEMQUREPMQ<E܃}ujjUREPMtn}uU܋E;B vEyM܋Q +URhE܋HMQdU܋EB M􋑬u	EMHUU-}tE܋H M	UBEMۀMUUUEPMQURE}uEPMQUREPEMQM;MrUREPMQUREPMQU;Uv`EtM+MQjUURm>}tE+EPhMMQJU+URhEEP-}t$MQUREEHMԋUBE#MQURE PMQU􋂴P$MtUU}t$EPMQ)EUEԉBMUQ@EPM QURE􋈴Q$URjE PMQU􋂴P$}t2MAU܋BM܉AU܃REPEMQURE􋈴QUR}tWE􋈬t U܃z0tE܋H0Q'UB0EPMQNUREP1EMU܋B0A}u5}u/Mۀхu"EPMQURE􋈴QUREEP}uMt
hE]̋UEEPE}uEMUQUEPMQ>UREPMQURE}t	EH MUR}uEPMQU􋂴PMQEURL}uEt
hE]̋U'u3h',$
`';MX'UE}X't4E-EMUE-MUUEEËM;
`'t/h$jh$jhh$`'RhX$EPh4$je!	
`'Mh'($E]̋UQEPE}u3$MUQUEPMQUR3]̋UEPE}u2EMUQUEPMQB}t0UREPMQURE}tEEPMuUREPM􋑴REP	EMQME]̋U]̋UQEPE}u2MR$]̋UQEPE}u2MR$]̋UEPOE}u2MUQUEPMQUREPiMQUR\E}tEPMQEUEBEEMQg}u"UREPMQUPMQEURE]̋UEPE}u2MUQUEPMQUREPMQURE}t8EPMQE}tUEH
}tUEH
EEUR~}u&EPMQUREPMREPeEMQE]̋UEPE}u2MUQUEPMQ&UREPMQURE}t6EPMQ&EUҋE#PMQUBEMAEEUR}u&EPMQUREPMREPEMQE]̋UQEPE}u2%jMQUBMAUR]̋U3]̋U3]̋UQEP1E}u2Mu2]̋U4EPj MQU Rj$E}|} u}uE5EMԉMIUUEPMQE}t U
MUUEH MEU%t3h$MQRh$EPh$MQh$URh$j
_Et.h$jh$URh$EPh$MQh$j$U%t3h$MQRh$EPh$MQh$URh$jEt0h$URh$EPh$MQhh$URh<$jEt3h$UBPh$MQh$URh$EPh $jnMt3h$EHQh$URh$EPh$MQh$j1Ut0h$MQh$URh$EPh$MQh$jUt0h$MQh$URh$EPh$MQh$jU t3h$MQRh$EPh$MQh$URh$jh$jh$EPh$MQh$URhx$jR]̋Ujh&h&dPSVW0F&1E3PEdeEHMEEEEUREPEȋMȁ9ͫt%UЃUЋEȁ8ͫuMЁMUȁztEЃEMȋQ;UtEЃE|MȋQREPM9AtUЁUЋEȃEMMtEUȋEBE܋M܃MhU+UREPbE}tMЃMЋUU؃}tEPMQUREPEaMEā}u9EMЃ MЋUHM؍UREPMQURcEEEËeEMd
Y_^[]̋Ujh&h&dPSVW0F&1E3PEdeEEEE EEMԁ9ͫt!Uԁ:ͫuE
E؋M؃MyUԁztE؃EbMԋQ;UtE؃EFMt>U%u.hjMԋUQRE}tE؃E؋MM}tUREPMQUREaEUЁ}u9EE؃ E؋MBEMQUREPMQEEEËeEMd
Y_^[]̋Ujh&h&dPSVW0F&1E3PEdeEEEE EEMԁ9ͫtU؃UEԁxtM؃MUtxEԋMԋP+Qu.hjEԋMHQAE}tU؃U؋EE}u0hMԋQREPE}tM؁ɀM؋UU}tEPMQUREPXEaMEЁ}u9EM؃ M؋UHMUREPMQUREEEËeEMd
Y_^[]̋UEPMQEUEBMUQEPMQUBEͫMA܋UEH0JUBE%MAUUUEEM+MQhURq]̋UE EMUJEMHUEBMͫUB܋Eu*UUUEEM+MQhURqEtj'UB
E@]̋UEEM#MMUUEPj MQ	}3U%uMQjUR	}31E%EMuU<t3EEMMUREPMQ$E}u3xUREPM QURiEPMQ̽UREPMQU…u MuURhE PoE ]̋UE EjjMQUREPMQ1UREP\ͫUͫ
E}ͫt뮋EHUJEHQhU RoE@MQEPMQUR]̋UEEEM MjjUREPMtGUE;Bw5Mu$EMHEMHQEC3<UUEPMQUREEPAE}u3
MQURE PMQUP$ȅtNURjE PMQUP$ȅt&URE PMQUP$ȅuUREPMQUR3yEM;HwUREPMQn@UBPMQURnEu!MU+QRhEMHQmUREPMQURzE]̋UE EMQUREP$E}uE'%M MU%u	MME]̋UQjjEPMQUREPM QUREP$EE]̋UQjjEPMQyURE PMQUR$EE]̋UQEPMQU REPMQ$EE]̋UQ}uEPMQUR$EE PMQUR$EE]̋U80F&3ʼnEEh4$hQUREPE3Ƀ}ttEAUEM;}uEAEh($j4QREPxE3Ƀ}u	EATU;r3EM;w	EA&U;UwEMMUEIEM3M]̋U(EX'+
c'MMh$jUREPMQ讒E}}`'+c'UUh$jEPMQURwE}}EEEMMU؉UE;EM܉M؋U;Uu&EPMQh$jj]x$EAht$jUREPMQE}}gU;Ut#EPMQhD$jj]x$EA<U؁UEPMQUREPgE}|
Mu'E]̋UEEEPE}u2DjMQUREPtEMQ>UujjEPMQu]̋UEEEMMMU;UE;EM9MvUU	EEM;MsUE;tE|ڋUUUEEM;Ms-UiUM;MsUE;uMMUUU	EEM;MsUE;tE3]̋UQEE;ErMMU
EEEE]̋Ujh&h&dPSVW0F&1E3PEdEE
E}t}u

EE衯H0QUEPjj$EMUЋE;Et/MЉM܋U܋E;BuMU܋B0E
MЋUEEׅtMQj$ËE؋Md
Y_^[]̋UQ}t}u%j	j}h$h$jj]x$	EHPMQE}}(jhh$h$jj]x$ULREHQ/E}}%jhh$h$jj]x$FUzt;EPMQ!E}}%jhh$h$jj]x$3]̋UQhX@&EPE}t'MQhh,$h$jj]x$3h@&URE}t'EPhh,$h$jj]x$3WhA&MQ`E}t'URhh,$h$jj]x$3h(A&EP"E}t'MQhh,$h$jj]x$3h(B&URE}t'EPhh,$h$jj]x$3hB&MQE}t'URhh,$h$jj]x$3_}t'EPhh,$h$jj]x$32h(C&MQ;E}t'URhh,$h$jj]x$3hC&EPE}t'MQhh,$h$jj]x$3hXD&URE}t$EPhh,$h$jj]x$3{hE&MQE}t$URhh,$h$jj]x$3@hpE&EPIE}t$MQhh,$h$jj]x$3]̋UQ}t}u%j	hGhL$h$jj]x$	FExt;MQURßE}}%j
hPhL$h$jj]x$
3]̋UQhX@&EP\E}t'MQhshd$h$jj]x$3hh@&URE}t'EPhzhd$h$jj]x$3*hA&MQE}t'URhhd$h$jj]x$3h(A&EPE}t'MQhhd$h$jj]x$3h(B&URdE}t'EPhhd$h$jj]x$3phB&MQ&E}t'URhhd$h$jj]x$32h(C&EPE}t'MQhhd$h$jj]x$3hC&URE}t'EPhhd$h$jj]x$3hXD&MQlE}t$URhhd$h$jj]x$3{hE&EP1E}t$MQhhd$h$jj]x$3@hpE&URE}t$EPhhd$h$jj]x$3]̋UEEEE=x'u	=\w'u`E'M tEU߉UEE%tEMMh',$=`w'u#y|`w'=`w'uh'($''ĕ''
ȕ'
'̕''Е''
'
'U'Eĕ'M
ȕ'U ̕'E(Е'=$@&tW	E}}t	E$E $h$jj]x$M,QU(RE$PM QUREPMQUREPH QURh$jj]x$8EPh$jj]x$}uM'}E}tEHUJ̃}tEHUJ'}u}u	E=$@&th'($}tMURh$jj]x$x'hj$E}}EPh$jj]x$̋](̋Ujh(&h&dPSVW0F&1E3PEdEEEEEE Z'EXEă=x'u	=\w'u3}t	Myu URhX$jj]x$	E	EEMkLUB<t%MkLUB;MuUkLEPU}u MQh$jj]x$
TUBE}u3>MQt
E@h',$=`w'u:y`w'=`w'u'h'($h$jj]x$E'h`	jh Z'Y''
ĕ'
'ȕ''̕''
Е'
'''E'M
'Uĕ'Eȕ'M
̕'UЕ'3MfUz8E$EMQUB8PhMQ
EE}}%,'Rh$jj]x$EQEXEPhMQ
UETMMUUEEM=$@&tUB$uE}tEMQt\'EE	
X'M܋U`uEH UREPMQ0REPMQ(REPMQ REPMQREPMQRp@ PMR'Phh'!	@Eԃ}MQhh'^	|zEÚŰE;Es[Ḿ;MsŮ'EۋMƁ'Ú 'Rh$jj]x$E;EsM̊Uۈ''h'h$jj]x$E@/聠H0QE3҉HLDžPDžTEH3҉X\E3ɉ`dUB3ɉhlU3ptMQ 3x|M3҉MUEH(3҉MUE3ɉEMUB03ɉEMDž!DžDžDžDžDžAVrfDžHPH$;M t3wEЃ}tUЋBMЉÃ}tUЋBMЉA=$@&tE'h'($Ã}tQMQ$'Rjj]x$x'hj$Eȃ}}EP
D'Qjj]x$̋EMd
Y_^[]̋UE Z'EXEj h'E}MAUTt}EPjMTR}h$jj]x$EPh'YMAUzt.EPMQUBP}h$jj]x$SOM'ĕ'Aȕ'Q̕'AЕ'QEPh'
'
')}t#UztEPh'.j h'"]̋UE'EMU}'EEEE	MM}s!UEM';Tt	EЃ}t^=ĕ'uU=ȕ'uL=̕'uC=Е'u:E Z'EXEMytUBPMQ$tE}t4E]̋UQ'''h'ұ'h'辱h'$EE]̋UE$u_h',$h'_ȅu-h'nEUUhEPMQj`$h'($h'$]̋UEEM9u}'+c'UUh$jEPMQURizE}}}uz'+c'EEh$jMQUREP*zE}}FMU<c'+c'EM9Av&c'c'+c'UE9Ps	ME]̋UE8u	EMBEEEjhMQjURjL$E}|CEMUQEPh'FM
'UU'E']̋UQE}u3REEMQUE;Pv	MQUBEM;AwUBEMQUEPE]̋UEEMQ+UEP]̋UEEhMQUR^E}|hEPjMQUREE]̋UQhEPMQE}|UREPjMQUREE]̋UEEhMQURE}|'EEMQURjEPMQEEE]̋UEEE}t	}v	EWMQUREPE}t}|
MU	EE]̋UEEE}t	}v	EWMQUREPE}t}|MU
	EE]̋UEEE}tMtEEMM܃}uEW}t}|
U+UE	ME]̋UQE}tE;EvEWE]̋UEEEEMQUREPMQ$E}|U;UvEEEMUUEz%E;EuMMMUEEMM}tUEE]̋UEEEEMQUREPMQ$E}|U;Uv#EMAU3MfUUEz*E;EuMUJE3ɋUf
EEMM}tUEE]̋U}t	Exu


h$MQ$UREPjj$E}}EMQE}}UBP*E}uE
}uDEMQURE%EuMQe
UREPMQ@EUREPMMUREPnMMUREPKMQ"UR$E]̋Uht$EP$MQjUREP$E}}EMQ$t'hh$UR$EPjMQUR$E}}EEP$p'hT$MQ$URjEPMQ$E}}EUR$l'hD$EP$MQjUREP$E}}ERMQ$h'h4$UR$EPjMQUR$E}}EEP$d'E]̋U0F&3ʼnEh$hPMQhRP3fE
t'Q$EjURjh?jjjPhUE}t3EM3+]̋UQp'P$EMQU]̋U\0F&3ʼnEE l'P$EЍMQUREPjh@$MQUЉE؃}u}tURh$$?+3wuE	EEM sUDUtMUDUD
ыMD
EURh $EP $u}tMỦM3*]̋U@0F&3ʼnEh'P$EMQhX$jUR	EЉE̋M̃MȋUffEƃEf}uM+MMUDEMQURjjh@$EPUE3}M3)]̋Ud'P$Eh@$MQUE3}]̋Uh'P$EjMQjjhh$URUE3}]̋Uh'P$Ehh$MQUE3}]̋U4VWEE}t

EE}u

j}uNEM؃M؋U؃U؋EE؋M؃M؋`'kU؉U؋EM؉UE
;t

UE}w
MMԋUE@MAUBEEMM}s
UUEԃE̋M+MԋUԉJEM̋4'QE̋
4'H}s
DUUẼEM+MԋUԉJE
D'HUBh',$M}'}H'U '}nj@'}nj@'M'}ǐ '}ǐ 'h'($'h',$E
`'kMMU;UsEE+EEMMU+UԋEԉPMUE
`'HUUСX'EMUEЃEЁ}X'tSMMUUEMЋUB@AMЋUBAMЋU苂AMЋUQh'($KEE;Es	E3M+MMUUE+EԋMԉAUEMAE_^]̋U4VWEEEEE}t

EE}t}u

MU;t

MU؃}w

Exr
zM؃M؋Uzu-EEЋMЋUQŰEЋMHMUЋEBEMyu	UUExu	MM̋Uzu	EE}?}ؐs

M؁M؋UEM;v

U:t

E쁸v

M쁹v

vD'h',$u'uH'E싈
 'uƌ@'uƌ@'U싂'uƐ 'uƐ 'h'($}}s

M؃M؋ŨEM;v

}Ũ:t

k4'%EM̋QẺPM̋QUẺPM̋Q4'E̋H
4'}EU;Us

EHkM܉M܋UE;t

M;Ms

U+U܉UE	EEMU;QEkMTUԋEԃ8t	E
h',$
X'MUE}X'tHMMUԋE;Bu/jMQ襋UEԋHJUEԋHUR衋h'($HE_^]̋UQhEPMQhE}|hURjEPMQEE]̋UhEPMQURE}|$hEPjM+MQUEPQ
EE]̋UhEPMQE}|'UUEPMQjUREPpEEE]̋UQEPMQURYE}|EPMQURE	EE]̋UEEE}tMtEEMM܃}uEW}t}|
U+UE	ME]̋U4EEEE܋E3ҹUEEU܉UEEPjMQUR$E}jEPMQUR$E}}EEE	MM}UE̋MMU;UẼ;E}
<M̍T	UEMUPKbE}tMRjEPp:L}tMQURẼPMQ
3ҋE̋MfAUE3M̋UJE*]̋UEPh`'j<MQTE}|<`'REP$jMQh@'$E}}D'4-URh\'j=EPE}|<
\'QUR$jEPh8'$E}}<'MQhX'j>URE}|;X'PMQ$jURh0'$E}}4'yrEPhL'jAMQ;E}|<L'REP$jMQh'$E}}'URhT'j?EPE}|<
T'QUR$jEPh('$E}},'MQhP'j@URE}|8P'PMQ$jURh '$E}}$'c_EPhH'jBMQ(E}|9H'REP$jMQh'$E}}'3=`'t4`'RB_`'=D'th@'$D'=\'t3\'P_\'=<'th8'$<'=X't4
X'Q^X'=4'th0'$4'=T't4T'R^T'=,'th('$,'=P't3P'PP^P'=$'th '$$'=L't4
L'Q^L'='th'$'=H't4H'R]H'='th'$'E]̋UQEEM0|U9E0E@MA|UFE7E"Ma|UfEWEEE]̋U00F&3ʼnES}t}u
EEMM܋U܃U؋EffMփEf}uU+UUЋEЉE}&uGM{u<EH-u0UB-u$MQ&-uEH0-uUBJ}t
03ɋU
JJJEEEMREHQڋE\MMUUEQ\UBPIًU\EEMMUPMQR؋M\
UUEEMREHQڋE\MMUUEEMREHQڋE\MMUUEQ_UBPLًU\EEMMUUEQUBPًU\EEMMUPMQR؋M\
UUEEMMUPMQR؋M\
UUEEMRYEHQFڋE\MMUUEEMREHQڋE\MMUUEQUBPًU\EEMMUPMQR؋M\
UUEEMR\EHQIڋE\MMUUEQUBPًU\EEMMUPMQR؋M\
UUEEMUEAUQEA3[M3]̋UEEMMUffEEf}uM+MMUUEPWE}u3MQUREPGE]̋UQhEPMQE}|4}vEW3ҋEfMQURjEPMQEE]̋UEE}tK}tEEt;UEff
UUEEMMUUEE믃}uMMUUEz3Mf}tUEE]̋UEPMQUREPMQUR$]̋UE}u35EM}u3 U:Ht3E@ @&MA$E&UB(4''EH0
l'=l'u3UBE}u3MQ'='u3EH
'='u3UB'='u3dMQ'='u3HEH4
'='u3,UB$B&=$B&u3MQ,U}jjhP'jhh#$EP$jjhL'jh<#$MQ$jjh@'jh#$UR$jjhH'jh"$EP$jjhD'jh"$MQ$jh h 'jh"$UR$jjh@&jhP"$EP$E}}
@&jjh @&jh"$MQ$E}}
 @&]̋UjhH&h&dPSVW0F&1E3PEd)u@0E܋M܋Qh1Uԃ}uOEc'M܋QU؋E܋HU9
t+E؋M؋U؉UEH;
c'u
UB c'ŋMԁt}uURE%uMQUU}E$<$M'E
'}[U4'eEЃ}}3.zI`w'=`w'u3Ẽ}u3mEЃ}}EPh%$jj]x$3NEЃ}}MQhp%$jj]x$3=c'7c'hSjUEEURZu-4'%thD%$jj]x$A&MQEЃ}}34'tEPh%$jj]x$A&E
4'
'jj,h@'jT$EЃ}}34'tEPh$$jj]x$A&M܋QR$E}tEH t
Lw'h"$h'$h$$UR$h$$EP$MQURj$Eȃ}}EPht$$jj]x$
'=4'Jh4'WHEЃ}}A&UEЃ}}A&M܋QBE؋M؉MU,RiEЃ}}A&
EЃ}}A&4'%t/?zEЃ}}A&fXEЃ}}A&fjNEЃ}}A&J=A&u"
4'Q4'Rh($$jj]x$4'P
4'Qh#$jj]x$EE:}t3c'A&4'R4'Ph#$jj]x$áA&OMQuhD%$jj]x$3,eSQHKmyXTTMd
Y_^[]$$$$$̋U}uEPMQUR	EPMQUR#]̋UQEE}t*}t\=`w'uD`w'=`w'u3E>=\w'tf\w'='t
'Q$'3]̋UEtc'
c'U%tc'
c'M tc'
c'E tc'
c'U%tc'
c'M@tc'
c'Etc'
c'U%@tc'
c'M@tc'
c'Etc'
c'U% tc'
c'MtEU
c'EtU%Mc']̋U=f'ujTOEPMQUREPMQS]̋UQl@0Hht7Ut4'
4'
4'
4'EE
E]̋UQUl@0Hht2}t#}tUE
4'EE
.}t!}tUEEE
E]̋Uk@0Hhu3.4'u3jEPMQUREPMQ$]̋Ufk@0Hhu34'u3
EP$]̋UQk@0Hhu3"BE}tUz t	3]̋UQj@0Hhu3!BE}tU:~	3]̋UQuj@0Hhu	E
UREEE]̋UQ5j@0Hhu	E
UREEE]̋UEEMQ/IE}uEUREPMQURE}}f}uFE8u;Myr2UREHQUREPE}})MtE}tU}tEME]̋UEEPeHE}uEM9uUE#iE	EEMU;s8}s2E%$+
c'MUEЋMUE%$D뵃}sE
MUE]̋UEEPGE}u	E+EjjMQ@&+c'UREP$EE]̋UEPMQ]̋U츠t	3]̋U}u
_E|EM;vUEMx'|'E
l'ME@c$URxPMQH3]̋UQQd'
d'd'd'5d'=d'fd'f
d'fd'fd'f%d'f-d'd'Ed'Ed'Ed'd'c'0F&0d'c'	c'E4F&h%$Eh	j̋U
$ (;u
M3t=N@uO@]̡0F&t=N@uh0F&0F&YУ4F&;
0F&űU}u3@]%$%$%$̋U}u
<MuEtHt uuuQ8uuuQi8Pw']̋UL't%MQuuuuЋM%
EPuuuuw'MUt
|
9Mt
]̋UVu;uw&ujuDEMVQu3^]̋U39f'tv}wm
8w'S]VW}g';u

<w';tPuVSWu|.=8w'<w'|E M$;UwQPuuVD_^[] ̋UE3Ƀ}HwQuPuuu]̋U}wErw	M3E]̋Uud@0jpw']̋Uud@0jpw']̋UE0d@0jpw']̋UW39}u9}u	33WjEPHw'}}3EMQPu|S];]v33_VuVEPHw'3EMQPu|(MUVEP3+RQu}}|}33EU^[_̋U 0F&3ʼnES]V3W};u;uhVuHuEPWSuuu;+}પͫVjEPÃQPu; h}}VW]FMj Xw;vE9u9ut_uujVSuuu63;9uv,3Ƀ}u
UTFDT;Mr39uU9uLEGEG;jEPHw'3QPu;VjEPHw'3QPu;hVu@MEHMf} v	E ɉMf;9ut~uuHw'ejVu3QPu|n3f;Es:EuMuE}uEVEuQMuًE33f;Mt9uu
Hw'3׉HP3e_^[M3̊<t<t<t33@̀yu2At	38A
AtA
?
Hw'A,̋UeS]VW~FF	F
uuHw'p4]p0FjPSEHw'pDp@FjPS.Hw'p<p8FjPSHw'pLpHjVSHw'pTpPjWSFHw'pLpHjVu?tN<uN<uNHw'x`}}e#ʋUMO#ыMCK33OOHw'p4Np0MjQuUHw'pDp@EjPu<Hw'p<Np8MjQu Hw'pLpHjVu
Hw'pTpPFjPuHw'p\pXF
jPuC1C1G]p4^p0jSuHw'pD}p@EjPWHw'p<Np8MjQW}Hw'pLpHjVWiHw'pTpPFjPWRHw'p\pXF
jPW;E$FFt
EtF	EFt+xEF
FF	?tFMffE_^[̋UVu&AttPGt=eSHw'R833SEjMURQPu[|E?3^]̋UQQWGt?u
(VtlHw'eeM3+ʋUjEPRQuD|awMƙ;ʋMw
r;w(C+΋uG
Hw'A,uEPuuuu|+EM3^_̋USVu3W;}(hSWu(V}u$QRPuu}$uufu!GwG3'ÃdLLLCCE(u(uuuuh0jBY#EE tu$u(u uuu;|3_^[$̋U0F&3ʼnEHw'@,SVWEFu$3fF@Eet `]3}諫}juuSWu|vjvPMu|b3f;N@ufMfN@} tVuSWU NL9w1fMfN@Hw'J,Eu;]wr;}sv3M3;t9Y=(u?FP(N N$HxXP P$@,x0X4ND;t	vLvHPѸ(e_^[M3* ̋U40F&3ʼnESVW=Hw'GlEejSVuuu|Hw'Ej_WPV
Hw'9u0EU
DUE9u0؉U
DE9u0EUEDEu~j@jWF F$GEhG,_0G4jvwFG8vLvHWVD3;t
FLst%Vu3WufF@uuSuB;N}9}@}juWuuu1#
Hw'ytApu8EU
DUEy|Axu8؉U
DEЃu8
TUЋ3U9Eu9Eu;]u	;U~j@PW\
F F$GEhG,_0G4jv2
FG8vLvHWVDFLw:t)Vu3PufF@uuSu	|FL8wEE;E3e_^[M3C̋U00F&3ʼnESV5Hw'WƋue3VSWuuuuu;QHw'EjPW
Hw'u8؉U
DE胹u8EUEDEu~j@jWF F$GEhG,_0G4jvFG8vLvHWVDt
FLqt(Vu3fF@EPuuuSuuIHw'H,33E};}"r	;EM}UjuWRQu>
Hw'u8؉U
DE؃u8
TU؋؉U;]u	;U~j@jW
F F$GEhG,_0G4jvf
FG8vLvHWVDFLw6Vu3fF@EPuuuSu6|FL83e_^[M3{̋UHw'SV0W8E@3}j]pPuMV|EtpVSWх|3_^[̋US]VsW~j@jWv	F F$GEG0EhG,G4jvI	FG8vLvHWVDt5FL8s+Hw't$t ssuu3D|3_^[]ssuu3=̋U$f}!v
(ESVuF,39v3.FNW}ЃQEEPWuM6]]]]]];uEPE3EQP6;EPMQ3EQP6;EEtE@PVuu4ME;uM;_N3+j@}~ SWEHw'SOQ3EMQP6;-Hw'SO Q3EMQP6;Hw'S$ OQ3EMQP6;Hw'S,(OQ3EMQP6W;uEPHw']܉]03EMQP6h;|suG(FFGEG0EG,	@G4vuuu6FG8F$;t	v,v(WЋF,9wEEtE@PVuu3_^[̋UHVuFEFL8v3(FS^WЃ3WEjEPHw'}3EMQPuG;uEPHw'}}3EMQPuW;~j@jWF F$GG,EG0EhG4jvFG8vLvHWVD3PHw'}KQ3EMQPW!Hw'jK Q3EMQPWVHw'j$ KQ3EMQPW'Hw'j,(KQ3EMQPWueeEPHw'03EMQPWbuC(F F$CC,	`EC0EC4vuuuWfFC8FDt	vLvHSЋFL8uEPHw'3EMQPWEEy~j@PWF F$GG,Hw'3EhMG0O4jvFG8vLvHWVDtl3hEEFEFEHw'MċN MȋN$M̋MMЋNMԋNDM܋NHMNLMjMQ]؋3EMQPR_[^̋U VuFEFL8v3FSW~Ѓ3SEjEPHw']3EMQPu;MuEPHw']]싀3EMQPu;Fj@SPEvN EN$H@,MH0MhH4SvGENH8vLvHPVD"j@SWHw'SOQ3EMQPu%;~Hw'SO Q3EMQPu;NHw'S$ OQ3EMQPu;Hw'S,(OQ3EMQPu;uEPHw']]03EMQPu;uG(F F$GG,	`EG0EG4vuuuuFG8FD;t	vLvHWЋFL8\uEPHw'3EMQPu;2EEluEPHw']]䋀3EMQPu;Fj@SPEON EN$H@,MH0MhH4Sv ENH8vLvHPVDj@SWHw'SOQ3EMQPu;RHw'SO Q3EMQPu;"Hw'S$ OQ3EMQPu;Hw'S,(OQ3EMQPui;uEPHw']]03EMQPuy;uG(F F$GG,	@EG0EG4vuuuuFG8FD;t	vLvHWЋFL8w4uEPHw'3EMQPu;|EEt3_[^̋U$VW}EPjEP3VV}ue}u_VjEPHw'uEPWw'|^E9Eu6VjMQ
Hw'uQWw'|2E܋M;Mt'E܋MMQjMQVPWw'o3_^̋U(ES3ۉ]9XVW+p FFFF3ɍFXt\Arj 3X;s+HZu]9]tEPuPU9]wEM+E;HU_^[̋U$S]W3}9{VsFFF3N;t@r㉅ sj Y+I:zu}9}tEPuPU9}wEEP;C`^_[̋USVWnP#EPWVw'=u3V}WuuϾEP_^[Å}39vG~ 3ҋτt$<\uAutBRh&$($YYt
C;r	3;u4h%$EPw'hDw'VEPWw';|h%$EPw'h@w'VEPWw';\C̋UQQSu؅u
[$VWuEPuuu!}S_^ҋEUW+EjYQuSWVu|˃} t
u$SWVU |E(t8w#}u	E
MT;Eu;Uu3̋Ud0F&3ʼnESVuF^33B#‰MĉMȉMMЉEFW~E؋G8_8]HHHMEStW(O(F MF$GEOGKHw'J,g$O MO4G,G0
Hw'Q,U3MUSJUMˉU%tCE˃U5+ЉUC{	EPEPvuu6FHw'P,9UGEQjPuu6X}Hw'EjPuu6pHw'EjPuu6>E;EE;EHw'EjPuu6f}YHw'@,W 3GOGOHw'@,3+ЋG$O,WGG(vLvHWVDt
<F@EfEfF@Hw'@,3}E]EEMejZUME3ÉU;r	;MjuuSW6hEPvPMu0~<t
}EEPVuSW~FL8w0Hw'H,EM3;Mxw	;EmfEfF@7RC$t
{	M;N(uM;N,uTN0tMCf;s?ekHv,U;uU;Pt
E9MrO,ECU}KEPEPuG(uu6pEg$G Hw'B,EEjE܋XEMˉEEvtVM;u؍EPuu6
Hw' ;LEUyCtrt#3!]؉M+ȋEM]CeHEEE܋E؋MEUjRPQ6oHw'Ct
O,Hw'<9ED@PjEPuu6v}̪ͫͫt	9EO,9EuG(Hw'lh<EjPuu6Hw'TP<EjPuu6Hw'<EUEEuf9EtIuEuuuPvvv6&G(Hw'@,3EMEMO,EGEGEgGFDt	vLvHW3e_^[M3̋UVujvPMuN|EPVuuu^̋U40F&3ʼnESVWEPHw'RP3;|uu;ue_^[M37WuVuuu;}uNj
Hw'3}uH;rG;rߍP/}u릋5Hw'F,EEv,eu}}܉e}E0
Hw'Eԋ8D8u%_GEeЃe3Uf;thUЋt_
Hw'I,3Su+uRPuV؅|f}uEMQMAMf;Msf;MwuEMEAHw'E}EtMunu3_̋UP0F&3ʼnESVu FEHw'WHjSWu}uufPHw'letAt=QhEjPWHw'pdMp`pjQPEFPHw' ;(,(u؉U
DEEH~j@jWF F$GEhG,_0G4jvFG8vLvHWVDt$EPƍe_^[M3EPuSuuo$EQjPWHw',(u8؉U
DE~j@jW/F F$G}u	G,3}G,Eh_0G4jvFG8vLvHWVD}-}EF,E3ҹ(
F0^(V4V8f;Muf9Mvf;Mu
f9EsF<FLERHw'4;0ljE؉UȉE}uMeIMM~j@jWF F$GEhG,_0G4jvFG8vLvHWVDFLt VuuSuFL8wkE؋MME}@M@Pxu]}]f]f]̍]Sh
%3M}UuRQuWOFLu3awE~EСHw'uԋ83]j@EjWEF F$GEhG,
_0G4jvFG8vLvHWVDvLEPHw'h%PuSuuK̋UHw'MMVpWju_u8WjPWu w';|Elj}u_^,Hw'pppEjPuuu;|Ը9EvEHw'ppp0jPuuu;|EPERPL;|urE;u
qSWuP40u;}u^[AEPEjYRP;|׋]Su;u]39}vr3҉UU;wd}u
E3
M
L
WjNFPHw'@3NQPuE9=L'u;EEC;]rE(|E]EE EE$E8EE3fEE,EE0EE}x}}}}}}}}Eĉ}9=L'uSE}Hw'p$p pEjPuuS;}uu}|EHw'pppEjPuuS;|EMEM9=L'u"WjU(RQPS;|}(f'W3EjuMQVPSE;V}Sj@8WP.EMS8hWP<DždlpEPu08PU,}tPHw't;uxPhX#%Vuu%xPhX#%Vuu^}uEPHw'}܉}3EQPu;Aj@8WP-E8E<E܉hESlWPDždpEPu08PU,}t*xPhX#%uuuuu}uf'E PHw'3ɉ} }$3EMQPu;XE ;u	9}$Yf9Ms+f'}$
Hw'33
f'+U$M$E EM]Kuus}(9}EEE}uEM(u0uXj@8WP]hWP8<DždhlUpEPu08PU,H}w=t&xPhX#%uuuuu}tEE(EE(;E+u}̋U`SVWj3XVPEEPVu3ۉuuĉuuȉủu} w';}EP_^[EEdM;H u
95Dw't95@w'u^W VuSj$w'=u!S?}u؉];uҾ;|M;ODt;u4e}Dw';tzu;Judud
ud@0VVVVPA0PB0Pu8E@w';u;uu9wv E؋CE܍EPEPjEPu؉u(w';EMQPE,w';uE|@4w'EE;Gr'4w'ueu9wrEЋCEԍEPEPjEPuЉu(w';$EMQPE0w';uE|@4w'EE;Gr4w'űUUt
`tuuRuoJdd
Vud5u@0R3RRRRPA0PF0Pu^]̋UQQW39}t

_SVWjEPjj} w'|9}tESu;tK>9}t~WSVj u w';}=u?V|3ۉuruuV9}t"EPq^[_x̋UEtf'EtL'}u%}uif}uHw'h'qHw'@'e}uD}wf}uHw'$'FHw'!':f}uHw'+''Hw'''f}Hw''t
Hw'']̋V3VVVVVh$';uh$&$Vj]x$3^3@^u3Ã=\w'u;_}(PhL&$jj]x$5'$%'\w'3@̋U=Tw'ta3VXw'@@d
I$Tw'kM5Tw'T0R5Tw'T05Tw'T0ITw'L^]̋USVuFWj=Y3`'W,$'FqW0($_^[]̋USVW`'S,$UjY'JSH($_^[]̋US]VWj=Y3e`'V,$'9Xt;uEV($E_^[]̋UQdeSVP'Wd=5T'5P'X04$jjs@0$uh&$jj]x$E?4.'=xw'O$
tw'
P'lw'
lw'5pw'QP'DŽdw',$E_^[̃=4.'u3d
4.'̋U=4.'tdM4.']̋UVuj8jVddF@$F^]̋U0F&3ʼnE4'Vu(W3;9}:,09}SX@&(049>uWWWWWh,;9x t}$us9}tnWh4Pj6@$|SW4Ph'<$t<WjPW68$|%d;H uWWWW6hS蝁00;E9[WWWuVhhX@&l_M3^y̋UV395'uVEP$E''h' $jd3Y;8.'wEPVuuD$P'T'3A^̋U4'$S]V3>jvh'Ɓu}~vw~W~PvsVvWhPh(B&oOjEPjWjD$|:}u	}t+hX'$sh,'$Vh'$vh&$Wh&$hk}_^[jhh&W3uh'H$|'EE3@ËeuE^̃=|'th'L$̋UV'3Wu37t,@ruh'$jj]x$̸_^]3̋UV3$ueSWjh'T$t9'3ҋE33;Et?@ruh'$jj]x$,_[th'P$^]3jh&$uTjh'X$t@ee}s&3ɋE'3
tuuuEEh'P$̋UW3G4' 5`'MVu;+;d;rd;Hr'd;d1;E33+HtbHt)HdRpdVQhdh($hX($uh@($Vh(($Qh'$hzbdRpdVQh	6dRpdVQhE33HHuRRuVQhhA&|^_]̋US]VuW}VWSutVWSuYVWSuVWS_^[]̋Uuj5'$]̋Uuj5't$]̋UEMt&tjqPuuhhA&'|3]̋UVuW3;u#EPjEPWWjD$|0Eu'`';v+;EsWWWWVuhA&{_^̋UQQVjjEPju3FX$|
EEu3^̋UVW}EPWuuu$3;}9EtCuuh($Pj]x$*9}t%9EtuuWuh($Pj]x$A_^]̋U|Wj|EjPEPE|'}j|EjP^E'Ex'El'E'_̋UShl)$E3P]$EPEPSS\$;V5$WhT)$EP֋=$EPSEPu;Ew'h8)$EP֍EPSEPu;|xEw'h )$EP֍EPSEPu;|SEw'h)$EP֍EPSEPu;|.Ew'h($EP֍EPSEPu;|	M
w'_^[̋UShl)$E3P]$EPEPSS\$;V5$Wh)$EP֋=$hw'SEPu;|Vh)$EPhw'SEPu;|8h)$EPhw'SEPu;|h)$EPhw'SEPu_^[d@0xt3@38̋U,SV5T$jj,EPj֋؅t$w'$w't$w'$w'D$w'$w'$w'X$ w'p$(w'l$,w'h$0w'd$4w'Eܣf'jPduw'&5$w'@0Pd@0d@0&^[̡'tPx$Tw't
P%Tw'̋UVuWV0V4' 8tpWh)$jj]x$;u(Au7jjvQPhhX@&wut@u3_^]!uuPw'tjv6V$h`'$|9j='Y@Iuj ud
I$PH3̋Vj8t&V
P'F@P'AVP'3^̋Vt^dw'tVdN;uV;P$tjp$vPQhQh(A&uFNHF$tP"jVD^̋UShC%3j]|$h
'Tw'd@0p$;t#H\ftftfu
fxHr0.'hl)$EP$EPEPSS$|19]t,h *$EP$hPw'SEPu$}Pw'[̋UQE
w'SVW4'E;NjEuSw'tIttt
tt
tuu"k';rw';sE'}7'u't#p0k4';rw';sƉ}kE~u6h:$jj]x$_^[̋VW34'' 'e
&'W%'[%'Y%'f%'BS%'T%@'jY7'7'37'_^̋UV3VjEPjjuX$;|
9ut5c'sVEP$E5$h'L'ָ'h'''ָ'h'''ָ'h`'''ָ'''3^̃=c't.$u$V5$h'h'h`'h'^̋UhtMH]̋UVuF t	jP$FSd$W=x$tPӅ}Pv54'hp;$jj]׃FtPӅ}Pv54'h8;$jj]׃FP_[tPV^]̋Uu,$MEuHB($]̋Uu,$MIuH($]̋U
'3';Mt	;u3@]̋UQQ3E9c'P>tESVW'V,$=''0MNj?E9H$uH89HuVP?Suh''uV($'V,$='0MNj?E9H$uH89HuVPSuh''uV($}u4S,$5''uu6uS;u($_^[̋Ud
E;rd
;As3@3]̋U0F&3ʼnEEV3t$0QPDž0$|ƋM3^̋UVuhtjVVjj V$^]̋UEUH3;r]̋U=c'tVVWh`',$5'';t-S]Ƌ69Xt9XuP
PQ;uH[h`'($_^]̋U=c'tFSVW`'S,$5''ƋH6;MuP
PQ;;uS($_^[]̋UV`'V,$
'E@'AV'($^]̋UV395c'9uSW`''|k9utfS,$5'
E9Ft6;u>j xt3M	HNHNHNHNH
'xA'S($3EtES,$'
M9Ht;u 9pu9puP
PQHS($_[^]̋UV$uuSF8t~HuxV<FDV@PVPt(~Xt
F8uxF8uv`RvT-F$tF8uFp u	jP$^]̋UVuF8t3@dNS;H$u]
v؋Fd;s!jNtQvSPhhE&l3S~HWu~DjW9FLu~Xu2v`~TW9F\t!jFtPvSWhhE&Ol33@_[^]̋UQVuW3G}9~ltt~ht
V fhEV~lw'Et<Ht2Ht(HtHtHt
Hu3w'(w'!w'w'w'w'w'8E_^̋U=c'Vh',$5''twSW}E&~lt[F8uRFD;w"M;vjNtQvWPhS6kFT;w"M;vjNtQvWPhS
k6'u_[h'($^]̋U=c'tO}tISVW'S,$5''E9FuN8~lujVc6;uS($_^[]̋UVW'V3,$'';t8U9PDuxlu
3;ujjHtQpRhhE&+jV($_^]̋USWjh@.'xZ']SPt='tjh;$!YY̸:Vu0uu,u(u$u uuuuuV׋|jSj64M^_[],̋UVWjh@.'rpZ'}WP,t='tjh;$葨YY̸+Su]uuuuS֋|jWj3L[_^]̋USVWu(u$x]39u,95c'tGEt>}t8 t0u(Suuh<$uVVVVuhhE&h0Z'uPOt)95'tjh;$赧YYd@4:Vj^Ku SuuuuuVjzKtVu0jWK_^[],̋U39w'u@uPjh4'u uuuuuu]̋Uujjh'u uuuuuu]̋USVWu(u$x]39u,95c'tGEt>}t8 t0u(Suuuh$VVVVuhhE&*g0Z'uPt)95'tjh;$LYYd@4:VjIu SuuuuuVjJtVu0jWSJ_^[],̋U39w'u@uPjh4'u uuuuuu]̋Uujjh'u uuuuuu]̋UVjh@.' u(@u$u uuuuuuЋu4't^]$̋UVj h@.'u(@u$u uuuuuuЋu4't7^]$̋UQQVj}3h@.'uudu@uMQuuЉE95c';=9uuS,$W'Wӡ'';t;u~<EtWVW($}tD'Wӡ'';t;u~<EtWVW($}u!F,E~<tjV@N8V_[EME^̋UQeSVWj~h@.'@u]uu}@SVWu3ɉE9
c';=93v3M9}'E0h',$'';t;uE9~<th'Vh'($}t?S,$'';t;uE9~<tSVS($}u#F,Me9~<tjVN8VEEME;1E_^[̋USVWhh@.'u]}@VuSuWЃ=c'Et?|;)ut1u*j tx)uH
uHPE_^[]̋Uhh@.'gu@uЉE|X=c'tOdSX$VWh',$5''MƋ69Hu
9XujP;uh'($_^[E]̋UQhh@.'=c'@EtPVW'W,$
'';t*S]	;Xu4}t+XD;]u&	P8H<M[W($_^uuuU	P8;űUSVW3ۿ'W]]],$'';t\uE;t!];uGWV<fpjVF^ N8f fFpEth'Vh'EW($39ut}uu;tVS$9ut(ud$;}Pu54'h;$Vj]x$_^[̋UES3ۉ9c'dVu;WVIEW;u9^d0C^h#;9~<u
Fp	Fp3C0t
tE 39c'uNFhP: tttMEMFpt
t t9ufhjVb	^8hL' $3ҹ@B;c'sЋE8w'ud3WWVp$j5܄']9~dt<3Cw'FDN<N@HFPtv`PvTEE9uh'V _^[]̋UVuh'VjVuN8vDv,V(V^]̋USVW=,$'V3ס'';Et
3;u	VuV($u:'Vס'';t};t;uVWc}V($}jWw,O8uuW0Wp_^[]̋UQQSVW=,$3۾'V]]ס''
E;Et];u	Vu($VӃ}'Vס''E;Ete;u	VuVӃ}uM}tG`'Vס''
P;Ut;u@EVӃ}t;uuuuuU'ujVuN8 vDv,uuV0V[_^[̋U=c't`}tZVW'W,$5''t/SEދ69C4uWSS3ɸw'A'u[W($_^]t]̋U=c'tu]]̋US]VWhh@.']1=c'xtj xt
b\%uuS]S׃=c't#|tEV^F7
tVO_^[]̋ULVW33}}}}}Љ}؉}}9=c'`EUSEEUU]̉MEU;u;u;&W6t;h`',$''
U9Pt;u=HPU3҉MЋH@;EM؍UtMtM h`'($9}u;u9}u	9}E07|URJt9} t
UEUR.t9}t9UrUEW;/d PEPNj
QE}}}}ĉ}p$}~h~9};MS$;}PS54'h<$Wj]x$VWWWh^S$;}P54'hd<$&jjVhY%3F P$;}+P54'h$<$Wj]x$V3WM]d@$FEFEF(EF,EFDEFHE܉FTEFXE F`EFdEFpE؉FEԉF4EЉ~8^$~P~l;tF0V?~HujvD`FL~L~Xuv`vTGF\~\;tFMt	fp9}tE&\%E09}tE0}MF<t9=c't;} w29} t'u FP;tu ]3PoFP~\~Xh'Vh'~h:3ɸw'A[_^̋UQQEEEVuEEWEEejh@.'Eu=c'xt=$A&tu hVhu EPEPEPEPEPuu(u$u uuuuuu׉E t-'W,$EPE PVW($}uV} _^u4'tE $̋UQQEEEEEVEEeWEEjh@.'EpjEPEPEPEPEPuu(u$u uuuuuu։Et-'V,$EPEPW(V($}uW}_^u4'tE$̋UESEEVWEE3EEj{h@.'E}}}}}@] E'9=c'tt}@Muh;td';r[';sOVE,$'';t)]ȋ;Yu]9YDt	;u] ] EV($9}u WEPEPEPEPEPuEu,u(u$SuuuuuuUE 9}t.V,$EPE PuV($}uu}u	;tE} _^[u4'tE (̋UQQEEEVEEWEEej|3!uh@.'E}	xtVEPEPEPEPEPuu,u(u$u uuuuuu׉Et-'W,$EPEPVW($}uV}_^u4'tE(̋UQQEEESEEeVEEehh@.'EpjEPEPEPEPEPuu(u$u uuuuuu։Et-'V,$EPEPSV($}uS}^[u4'tE$̋U]̋U
x'3@E;H'SV5$Wh<$EP֋=$h'3SEP5H';|9'u]h<$EPhD'SEP5H';|9D'u]h<$EPh@'SEP5H';|9@'u]9]_^[tx'eE̋UEt	upP]̋UVW 'W,$uNWH($vsVm_^]j@'Y@IuV'h '''$|h`'H$h8'$^h '$h`'L$̋Vh8'$t.jt!jjjhFP$}V3^̋UV8'V$f(ruvd$V|
uV$^]̋UE3ɉHH]̋UVuFtP$fFt
jP$ft	Pj&^]̋U$tuSWu3ɸx'AQEVujjuFu>wFP$؅}3ɸx'AW&fEtO^_[]̋U0F&3ʼnED'MS]tvtrVW{7hRQЍu=$ u5FQd
Pq$N jjQvPhhXD&kO,3ɸ'AK_^M33@[b̋Ux'u	t$MAu'tQd
hk%q$]̋Ux'u
S]Cu@'W3E;toMV1jWWWMQWEx u2uFud
Pq$N WWQvPhhXD&yN,3ɸ'AKjWWWEPUu^_[̋UVuW3j	YEd@$FEFtG$uj`tG$Np_^]́='pr?d3;t	t3@9u9u9u䁸u3d@0d
@+A$@̋U='pr,My duAt3@
I;3]́='prdt3@3̋UjjEPjjX$|MŰU$<u3S]VWSuu`t3E;p$;d{ 9tN@V3VSpFu0WjEPWj8$}C{NECECM39'~PPj*3ɋANtN3ɋAStN3ɋAtN3ɋA&tN3@39F3_^[̋U$$<u3oWF3ɉE;Yx$;NE@ dSVuXD&9t$G@uQQF PvvhSKO@WWuGjjEPjj8$EH;Mt1uFQd
Pq$N juQvPhSJ,OE@;EtIEP|<M;Mt4FQMqd
Pq$N juQvPhS[J,OE39~$GuE9tjPQQj(O3ɋE@;t$GuQPF PvvhSJOGu6t-djF PvvhSIOGu/u;t#jjF PvvhSIOGu,Nt#jjF PvvhSZIOGu,t#jjF Pvvh
S%IO39G^[3_j,h&Kut5~eEPuV	vu׍EPuV3EOt@$t`j,h&ut8~eEPuVuvu׍EPuVEt@$t`j,h&tut;~eEPuV2uuvu׍EPuVVErt@$t`j,h&ut>~eEPuVuuuvu׍EPuVE/t@$t`j,h(&葤u3;t3~]EPSVPv׍EPSVVE蕤t@$t`j,hH&'u3;t0~]EPSVuv׍EPSVE.^t@$t`̋UVuVFtP4V^]̋US]VWSjCP,${7
F6jP;usV($V$S|_^[]̋UVuVFtPVN^]̋UEtVpWxPtWu_^]̋UVjjh@.'u@Ћ|u^]̋UVjmh@.'VpMUt@$t@t9PuHQR^]̋UQQSVjq3h@.'uuX95c'tXuW}tEPVWhu%WQ|uuVwӋ؅u9Ett|
ujW_uu^[̋Uju^]̋UVWjsh@.'b=c'xtIj0t5VVF@FP$F,P׋|E0jV	u׋_^]̋UQQSVjt3h@.'uuX95c'tXuW}tEPVWht%W*|uuVw,Ӌ؅u9Ett|
ujW1_uu^[̋Uju^]̋Ujxh@.'==c'@tuMuqMq,]]̋UVjw3h@.'uu@E95c't}SW}_S,$uFNSH($]tEPSVht%V|]]Svw,Uu9Ett|
ujV_[uuu^̋Ujuu1]̋UVjh8''u@Ћ|!t@$t@t
3ɃA^]̋UVjh8'u@uЋ|!蔾t@$t@t
3ɃA^]jh8'PXt@$t@t
̋UVWjh7'Sx395c'tE;t<@$;t5@9t(9ut#9utVVH QpphhXD&Auuuuu_^]̋UWj&h4'u@ujjEPju8$|E3ujjuPj5؄'>_̋UWj'h4'lu@ujjEPju8$|E3ujjuPj5؄'>_̋UVjh9'u@uuuuuuuuj5؄':>^]̋UVjh9'u@uuuuuuuuj5؄'=^]̋UVjh9'qu@uuuЃ}u"uduuup$j5؄'=^]̋UVjh9'u@uuuЃ}u"uduuup$j5؄';=^]̋Ujh9'u@udjujp$j5؄'<]̋UQESV33W;t$w	E 3Ƀ$ME(j(;h;~_______G G$(};t$uWv9_tFHN@h%FHN@Fu%EFESFF Pj j$$ 'Wf,$'F'pW5'($W_^[̋UVWjlh@.'3Mx95c't$uuutFE
r%uEuuu׋}
tV_^]̋UVWjfh@.'3x95c't$uuu9tFEwr%uEuuuu׋}
tVk_^]̋UVWjgh@.'3rx95c't$uuutFEwr%uEuuuu׋}
tV_^]̋UVWjhh@.'3x95c't$uuu[tFEr%uEuuuu׋}
tV_^]̋UQSVW}jih@.'3ۉ}@E9c't uuW؅tCTs%]E=c'tj 訾t
}]%uuuW}WuUE}
tS=c't-}|t#EFE~VFD
tV\E_^[̋UVWjkh@.'3x95c't$uuutFEwr%uEuuuuu׋}
tVF_^]̋UVWjnh@.'3Mx95c't,VuutEjXEs%uuuu׋}
tV_^]̋UQSVWjph@.'=c'@EjtBjuut%EjYFVE1t%EV3uJu}uuFu7uPUE}#jVKuuuuuuЉEE_^[̋UQSVWjvh@.'@3ۉE9c'E t 9]tSSSu uh	hXD&8j ;tmSuu#}V;tLE jX_V~SE1t%U,$OFHBS($3л3;uru ]uuEuFu3Pw,UE }EEW,$FNWH($jV~u uuuuuuЉE E _^[̋U]̃='th'$%'̋USVuW=x$]vhT=$jj]׃Ku6vvvvVh=$jj]׋F$tMAQPvtE_^[]̋US]VW39='t9}tEX8x8u3ҹ,'Bx8;tNyJ4't>$u4$PWPWPWh|=$6hX=$h3>u3ɸ('A>_^[]̋VW'V$$'''WV$0x's_^̋Vj0觹uh'$t
j0jVő^̋UE=x'r;$'sPh'$Pn]̡';u='s;w33@̋UM3;t9Ev;Ut@;Er3]3@̋U3='pr
l'tEP@RP
't
E@P]̋UQVh'V$E|2SWd='_8V,$;_8Vأ'($_[E^̋UUSVr3WC3;t#3;;u%;ǸHX'u,X'h<>$2PWh0>$Vh>$Rgd@$J;tW2PrRhh@&l4JB;}W2SrRh9}t1;t(;"$PWPWPWh=$Qh=$h	m13_^[]4'tSjh'4't;V5'5x$h>$jj]֡'tjP#h`>$jj]փ^̋UQS]V34'Wu'tVWSh>$Vj]x$[W($W,$u	EO^Fd@$F$3'u
65'!;XsHupHtpE_^[̋US34'Vut"Sh'Vh?$Sj]x$'
s@@t	H;u؃}ttS$'^[]̋US]VW34''tWVaSh<?$Wj]x$$WSBE;t$P$V'($uV,$64't*$u 9= 'uWWW3Shh@&1_^[]̋UQVuW3}tu9='u
WWW6Vh,d@0;tojVh'2tWWWWVhh@&U1ES'S,$uVRE;u 9= 'uWWW6Vhh@&1S($[E_^̋U4't*$u V'V,$uu
V($^]̋UdVuNtEN;H$u N|jPj^Tt"pjvjvVhh@&`0^]̋UQQSd4'VW]$[$u3GWV]QtˍP
(F3Ƀ
F@&t-d
I0;u;Etj6jPVhS/Ft(d
I0;tj6jPVhS~/EWuFW~>};9^uFFeIuV$Et83G9~	jSW4't
WuV+4't譭E_^[̋USVWd=4'}$t_$ujV]tÍO3ɍG(AFeEt,F;u3ɍFAFPNN3@@t;F;EtƅtEO3ɍG,AVtEF@&t1d@0;uF;Etj6jvVhW-Ft)d@0;tj6jvVhW-EF3@PuFPnM-u3Uj6j1Vh	h@&P-+uV,$E|BF3Ƀu	QWj4'tjuV)4't褫E_^[̋UQSdVuWh3jGV}誰4't	uVh)4't($ujVtMK$ WVE3ɅF;V($|u9}t	WSj_^[= 'ue̋U4'tuuuh?$jj]x$$t)}uuu$jeh@.'ж@]SVW=,$'Vju؅t?4't3CttP3jjPsshh@&l+V($}uuu$jeh@.'Cu@uuVE׃}u_up؅}Q='sV($u$V׉]-3ɸ 'A4'tuh?$jj]x$}|EMtu7='r+3Ҹ'B4'tQhh?$jj]x$V($}_^[|4'tuu'E]̋Ujuu	]̋Ujju]̋U]̋USVW}4't
Wh$@$)iYY5$քuHh',$4't քujWu9 'tWW#h'($W$E|.udVjjp$Wj5Є''4'tVW&E_^[]jhh&肆34'tuuhH@$Sj]x$hj8u$'W,$]Su;t=4't1Ft;tP3SSPvvhh@&(W($EuH$]>uE;}DW($EuL$]u$3ۿ'W,$ÿ'W,$E'W($	uH$荅jh&4hj8}W跫4'tWWht@$jj]x$5$քuMh',$3ۉ]4'tքuSW;u9 'tWWEWL$}h'($̋Uhj8uju]%X$̋Uhj8uݪju]%T$̋Uhj8u質ju]%P$̋Uhj8u艪ju]%$̋Uhj8u_juq]%$̋UVd54'Wt*$u ~$juttH93Ƀ(A}W$Et8
jVj4'tjuWv"4't聤E_^]̋US]Vd54'Wt($u~$jStH93Ƀ(AS,$|BC3Ƀu	QVj04'tjuS!4'tޣ_^[]̋Uhju t]]̋Uhjuɨt]]j`h&3fEjY}f3u3}Ыu]4'tSuh@$Vj]x$VjEPVu8$;}33BujYu}jXE3@Ëe3jXE]3;u.t;tS3WWPSuhh@&$;tdu;t]3BUjY}E3@Ëe3E]juS+PSuuh륍EPPSPSuh뉋E;Eu6}t0;tS3WPSuuhh@&_#E9}3@݀̋UES3VpC}WxtuuVRuuWV@_^[]̋UQe4'$Vh',$5'S]W@&F;M;FttP3M3+t9It&ItIuGRuSPvh.RSuPvhRuSPvhRuSPvhW("EFuve_[u;svpvuh'($^̋UEetjS3VCWKE}@B7w?uuuVXt2FtC@svtC'w'_^[̋U$unV395c'tb9utudu@0Uuud@0V5'V,$uuu5'V($^]̋UEP4EM	u;v3;v;@@]̋UEM@V1;w3A3;A^]̋UQh54'w'|EPu54'w'|eE̋UVuFtuPx'V54'w'^]̋UVuFWtuPx''Ww'FNWHw'V54'w'_^]̋UQSVW}3ESu+P4hX'w$~^}Nu;]~2_^[̋Ud@0VpEp@v$$YYt;Ft@P$Yt2^]̋UeS$VW}Ek<MD8QEPEvAt*ttuoE	"E	E	E	E	G,Pu4G,Pu$Gjpp0FP6uhpE& Vup$EPueӋKE}'W54'w'_^[̋UVuF8Pw'jh%h%uV$^]̋UVW|y|n3G}tWhjhjh4'w'|FhD%=|'h''ih|%h8'Zh'(%=0'_^]%0'$#0'̋U=c't$t衙t}t@(}t@,]̋U=c't$tft}tH(}tH,]Bt(ø|'̋U0F&3ʼnE=c'EVuW}ƅ
S]uDžDžu3@t;t
tu+t@4ƅ
uj'ƅ
hp'w'Ph8'h$k<tF8Pw'PPV5l$֋
33Gh'w'P'Sh$u<PPSօt*t`HI	POQ
HG@h'w'w'hp'w'[t3ɸt'At
ux'M_3^Y̋U0F&3ʼnEEWEhp'ƅDžw'P8'Wh$uPW$tfMk<SV4^8Sw'EF4PVp$f4Sw'uPW$u^[hp'w'M3_X̋UQ=c'^@VuS]uW}jWSVuWu1EEEPWjVu<EPWjVu+EPWj
ujWjVbu3ɸx'At'_[^̋U=c'twtn@ubSVW'Vw'EP'Sh$Vw'tjujp;uVw'EPSp$Vw'_^[]̋U0F&3ʼnESVu3W}9c'jEp'Ww'PhPh8'l$;t28t*^DžhD%S+<uF@*%Ww'M_^3[U̋U0F&3ʼnE=c'Vut\tSESWp'Ww'P8'Vh$؍PVp$Ww'tSs_[M3^bUh',$h'($̋UEj3YE]̋VWXVI3';VWPqqƠV&
'A'9xt+V

'A '9x u:9xt
p'9x t
p ';P='|@'@'@3ɡ'@@'@ @;rh'$'@<'@@c'_^$t2á't=c't3;H$̋U
'SV3FWE;v^M0]>EHt4HEtF@Z9CtTuE]uӋ6uF9uw;v'yX;{u@$uF;r߰_^[AL2̋UEHU;QuH$3@#8Mt2]̋U졄'VuVp Ћ
	A90t	;u3^]̋UVu3t-WEP'p HNAJ_^]̋UU
3vI
M+EJ]̋UMEMMHB]̋UVW3EHt9HtHu\'j_jQj@6'(j'jQhP;uKW̕-tXEHt8HtH'u[@'H;HvKHA'';Hv3H)'@'H;HvH'
'@$'t,PW0}'Wph$I$jj]x$_^]̋UEV3HtEHt"Huh'H'j^j?''(j'H'jQPu ')p^]̋UEEEEVEEEW3EE' v9GJMHUE'' wj@^9v:3GJMHUE''9w9v:3GJMHUE졄''9wɅtTuF6P葓E;uuF6PzE;uuF6PcE;u'T_^̋U='MUVuW}
''5'='tWVRQhI$jj]x$$PWPVPRPQhXI$j_^]̋U졄' r	
'U']̋U}UtBJjRH;:SVWtCB0+N6A8X;_:9
yxAB;uыBJH%ZApx	7~30pp;uBfHBJjRH_^[]̋UM3@	u]̋UEPM;Qu@$3A$u3@3]̋UUJ EVWtH j Yr(x(j YJ$tp$p$r;t6pSAX	E8;_}];~0xFB;u[:_^tBJHBfHBJjRH]̋UQQ}'t83ɉH0'@8'''x8?u
'S]K$;H8u2l@0'H8C$UȉK$';P<v@D΋P0;P@r@HSVuW;ruuSEGz:EU;'@8wN$F$t#;tMAQujPuEuU?;uV;tS}}Y'tcM5x$J$Sjj]ֿPJ$Wjj]hJ$jj]hI$jj]W3Wj]SWj]փHWuuh2E'}tH0;H4vH4E_^[̋U3Vu8Eu9Fu9FtPV6hFNjVH^]̋V3'3B9Tu^@w9w9vT'tj^̋UQeS]{C;E'H8VW{7M;t8NA$69EvU+;Uv+E;EsjQME;u͡'MH(C;Er0e7C;ErF6jPE;u㡄'MH,_^[̋UQeVW}7;t0Su^6St}u	E	Su;u[_^̋UQE@eVWx7;t5S^;6u%uSQt}u	E	Sub;u[_^̋U졄''u&VW}75Y'F5Y'6PV;u_^]̋U졄'VW}Wp96tV
A9xt	;u3_^]̋US]VS3;tQPShcuM;u2gWhQV&dEF^@EP~ Wj j$$E'Sp9NAJ_}t
juz^[]̋UEE/EY'VEjjEjEuSu؉]uuu!]E}EWuuGPPuhuuuu!}u8E7jS*u4OCEt
;t3fOfGO_fvESWuh7P
;u(Ovg}uajjPuJMYSuEuuE9EuڋESuG;Eeh(jVbf$MF$~'R8ЉV$F@E3F$1F$}uFHBFOHBfGG=v
' Vs
'DxEK$C @X@wC
'DT=];EuSuuu
G9EuS띡'@ttj p(YEPs(Vj j$$t	@({Ej ǠY_}[t
juW}^t
juF}t
ju6̋UReSu؉]-CfuuPSuhW{H3VwfCf;K'9^'@PFY'uAx$hPK$Qj]ӋFWpuhJ$jj]ӋF$Wpuh<]39^t6;u#f$F$uu'@TN$f$u9OtG@$t9x t	G;uE;tH OuQW!^_EP Sj j$$N[̋Uudup$ju-3@]̋Uudp$juK3@]̋U4t*SVjVuuu&^[]̋USVu3W8]u9^tf9^v}Wvof9^w^;uG?P;uFNjVH_^[]̋UujuF]̋Uu8tjP]
3@]̋UW}w3@GiVP^t$E>FtFP$}VW3^_]̋UVut~t
FP$V%^]̋USW}3;39_E;t
GP,$3VO@@379]tiD8$f9tPWMifEN(MN,MN0MN43fF$fN&ftfuJ};tA@4;t:P8bffN&3ɉ]f;s#V8HUEU9Urf~&u*j^8Sj j$$fu3@fF&E fF&}^t
W($_[]̋VW3Wj?';tW V*Ą';tjWVȄ';tZh%V̄';tAWVЄ';t1WVԄ';t!WV؄';tWj@܄';uT5'5Ą'5Ȅ'5̄'5Є'5Ԅ'5؄'3_^̋UVuW3VG$}3F@_^]̋U]%,$̋U]%($̋U= 'tDS]VWS{7vu$YYt6;uEMFFS_^[]̋UVuWV3qN;t"US;Pr
;Ps]Xu;u3G[VQ_^]̋USV3jCρu3tEHf@@fu+W|W要FtEuWPZ
|/E}ffWFGHN1WpvyVs3_^[]̋UQQEP5$[}	eVW'W6t+@'V'th`'th'u	eShM$3CSWhM$SWhM$SWhM$SW5Y'SW='sPhM$SW{hhM$SWglhPM$SWSXh4M$SW?DhM$SV+0hM$jVhL$jVhL$j[SVhL$SVhL$SVhL$SVhhL$SVhLL$SVh4L$SVrt{h L$SVbtkhL$SVRt[hK$SVBtKhK$SV2t;hK$jV!t*hK$jh`'thK$jh`'u	e='sh*$Sh`'Et|5Y''jSEtbE 'p p5Y'WEp p5Y'VEp p5Y'h`'Ep p5Y'S[_^E̸'h'''$̋U
'VW'P	;Uw
x ;}w;u3_^]̋U}UuJ
}uJ 4'tdMV0tStKu$xvxvjqPpphPh(B&jRqPBp0h
hA&^3]̋UEPf@@fu+VF=w:SW|6W|؅t&WuSVuuuVSu5̄'_[^]̋UEp|]̋UVW'W,$uvt1HN1p4' tvvhN$I8v6W($_^]̋UV'V,$MIVH($^]̋UMAV0;SW`'M4' t8='(
w	='r#Ajqp0vvhPh(A&MO6jSHT$WPSP$W{E;u_[^]jh&TU3ۈ]
E܉]9]tT};tM]d@0pEPSj$EE;tM;Hu@0]EE+U38]tuj$̋USVWjch@.'`4'@X}utvWh4N$jj]x$WVuuӋ؅|dp$7vjC_^[]̋UVWjdh@.'4'@p}tWhXN$jj]x$EPW|dp$WujW_^]̋UQQSVWuuujy'W,$u3;t
NHW($;tVVy8D'@&5$39Xt7],3jSQօuEMQPј@&G|u3ۡ@&]9Xt7},3jWQօuEMQPEM@&9\u9c't09c't(EPp/tSSSuuhh(C&tdp$uuj
uuu_^[j h&R3ۈ]'W,$utuW($;u2qE;t@ }3@;u	F;uN]E4'tWFp(vhN$Sj]x$uWuVEuNF ;u
NF$uxH'uo*$WFp0$YYuWWEP$EPEPSS$E;|E;tH''hxN$Sj]x$uuuËe3ۉ]E
EQ3ۋE;tH ̋US]VW{u4'^uhhO$D4'tPsuhDO$jj]x$5$h4*$EPjC,PEP$uCw'C w'`h4O$EPjC,PEP$uC'C '/h*$EPjC,PEP$uCw'C w'j(<vu4't|uhN$eFCF^%F@fN N$'W,$''F0W5'($4'tuhN$jj]x$4'utuVuh'4' t"uVuh@'uVuh`'4'tuVuh'=D'@&3ɉM9Ht4{,jWQ$uEPV荓EM@&|uϡ@&3ɉM9Ht4{,jWQ$uEPVJEM@&|uσ=c't1=c't(EP+t3PPPVuhh(C&dp$Vuj;SuV[,SuV_^[̋U'tumt`4jj]̋UQQd@0@8u2EPERPERPjWQ}ee@mtMH4̡'tjjjj\h0&M '3AuVZ'@PtL$'3A39='tjh;$@/YYEtE}}u}EPH$3iV3}uuu$EEM9}t8uuuVWu$Vdp$uuuj5Ą'EL3ujhP&L39]u]P]uSu$ESPuS"r)EPuuurËe3@E3SPuSpEuEuuut$EEC8]t1uuSuudp$uuuj5Ą'E
L3jdhx&K '3G]SZ'@P
tL$'8395'tjh;$e-YYEtEuu]uEPH$339uuuPuuVu$EVPuVp)EPuuuEqËe3G}3VWuVLoEu}uuuu$EER};t?WuuuVuJuuVWuuuWuj5Ą'{J3̋Ujuujpuuju]̋Ujh4'w@3ҹ0'B]̋UVjoh@.'wp39c't EtPPPPPhhA&tuuuuuu^]̋UVhh@.'?wu@Ћuuu^]̋Ujh4'	w@3ҹ4'B]jh&9Ijh4'vp '3AuZ'@P苊t5$'3A='tjh;$*YYd@43;ueuu։EE }tjujuEHjh&|Hjh4'vp '3AuZ'@PΉt5$'3A='tjh;$'*YYd@43Queuuu։EE339ut!Vuju9uvVujuEHjh&Gj(h4'JupuZeu։EE }ujujuEGjh &CGjh4'tp '3AuZ'@P蕈t5$'3A='tjh;$(YYd@43;ueuu։EE }tjujuEFjh  &Fjh4''tp '3AuZ'@P؇t5$'3A='tjh;$1(YYd@43Queuuu։EE339ut!Vuju9uvVuju#EFjh@ &Ej)h4'Tspudeu։EE }ujuju"EEjh` &MEjh(8'rpueuYEE}tjujuVEEEJjh &Djh(8'rpueuuYYEE}tjujuEDjh &Djh(8' rpu03}uuYYEE*9}t+9}tWujuWujur3k9}uWujuEDDjh &Cjh(8'qpueuYEjujudCjh &Cjh(8'5qpuEeuYEE}tjujuECjh!&/Cj
h(8'ppueuYEE}tjuju8E'C,jh !&Bjh(8'kppu{euYEE}tjujuEBjh@!&eBjh(8'ppueuYEjujuiBnjh`!&Bjh(8'opueuYEE}tjujuEB	jh!&Ajh(8'HopuXeuYEjujuAjh!&NA3Wh9'npH'3AuZ'P蝂t'L'3A9='tj	h;$"YY37u}u։EE }tjujuE@jh!&@uEjh9'9nxH'3AuZ'Pt(L'3A='tj	h;$A"YY3FueuV׉EE039}tWujuWuj6KE:@u:jh!&?jh9'ympH'3AuZ'P(t(L'3A='tj	h;$!YY3;u@euu։EE }tjujuE?jh"&&?uEjh9'lxH'3AuZ'Pnt(L'3A='tj	h;$ YY3IueuuV׉EE039}tWuju@Wuj6E>ujh "&[>jh9'kpH'3AuZ'Pt(L'3A='tj	h;$ YY3;ueuu։EE }tjujuE>jh@"&=jh9'JkpuZeuEjuju!=̋USVWjh9'33jM@t1fuYQЋufuPujS_^[]jh`"&<j+h4'jpueuuu։EE!}tuujuE<jh"&<j,h4',j@E39uuuRuuuu$EVPuV
b)EPuuu~bËe3@E3VPuV`EuEuuuuU܉EE09utuuVuuuVuE<3	jh"&;j-h4'Hi@E39uuuRuuuu$EVPuV&a)EPuuuaËe3@E3VPuV_EuEuuuU܉EE!9utuuVuE6;37̋UVuu}h}pta3ɸ'A}tO}tI3ɸ'Au5Z'|t+3ɸ'A='tjh;$jYY̸#uuփ}t4't[^]̋U39w'u@Pjh4'uu5]̋Ujjh'uu]̋UVuug} pta3ɸ'A}tO}tI3ɸ'Au5Z'{t+3ɸ'A='tjh;$tYY̸)uuuuփ} t4'tZ^]̋U39w'u@Pjh4'uuuu)]̋Ujjh'uuuu]̋UVuuf}pta3ɸ'A}tO}tI3ɸ'Au5Z'zt+3ɸ'A='tjh;$lYY̸&uuuփ}t4'tY^]̋U39w'u@Pj
h4'uuu/]̋Ujj
h'uuu
]̋UVu ue}$pta3ɸ'A}tO}tI3ɸ'Au5Z'yt+3ɸ'A='tjh;$mYY̸,uuuuuփ}$t4'tX^] ̋U39w'u@Pjh4'uuuuu#]̋Ujjh'uuuuu]̋UjjEPVuuu$]̋U39EPuuV]%$̋UZ'W}WPwt='tjh;$MYY̸4SVu uuuuuuV$؅|jWj6g^[_]̋UZ'W}WPowt='tjh;$YY̸(SVuuuV$؅|jWj6^[_]̋UVW3Vh7'7cxZ'uPvt95'tjh;$XYYjX3SVj
]SuuVj2;u
Vuj3t[_^]̋USVjh7'bpZ']SPlvt='tjh;$YYjX3Wjj腺}Wuujj詺uVSj7_^[]̋USWjh7'+bxZ']SPut='tjh;$JYYjX3Vu(u$Vu uuuuuu׋uPSj6f^_[]$̋USWjh7'axZ']SP^ut='tjh;$YYjX3Vu(u$Vu uuuuuu׋uPSj6߹^_[]$̋UWjh7'axZ'uPtt='tjh;$>YYjX5VjjuVuujju
Wuj6X^_]̋USWjh7'`xZ']SPQtt='tjh;$YYjX3VjjjuVuujj莸uWSj6Ҹ^_[]̋USWjh7'`xZ']SPst='tjh;$/YYjX'VuVuuuu׋uPSj6W^_[]̋USWjh7'_xZ']SPOst='tjh;$YYjX'VuVuuuu׋uPSj6ܷ^_[]jh"&t1j	h7'_pjjeu։EE }ujujuEl1jjjh4'^P=c't
@&i+H̋Uj/h4'^@]̋Uj.h4'h^@]̋UVWhh@.'G^u@VЋ|juj60_^]jh"&d0jh9'^p3Wj}uuu։EE 9}tWujuiEX03Wj̋UVjh9']u@Ћtjuju脹^]̋U}tjuju^jh9'L]@]̋UW}Wuuu$E|rS39:'tc3$:'39tыR;t@kу:uC:'u.kH4'tQ0uhO$jj]x$E[_]jh#&.3Wh9'\pWj蔴}u uuuuuu։EE!}tWujuE.3Wj}jh0#&p.jh9'\pjjeu uuuuuu։EE }tjujugEV.jjjhP#&-jh9'[pjj蛳euuuuuu։EE }tjujuE-jj膳̋UEhX'$ph,'$0h P$uhP$uhO$hK3]jhp#&8-4'EM<u+39]t8uNG;8uNG;4'@t&dd
VWp$q h0P$Sj]x$]VhW*EuuuËeE3uSuudp$j5Ԅ't,̋USVWj#h4'Y}@Wuuuuuо؅54't;}t5~1EjPh@'u54'tujP?Pu_^[]̋USVj$h4'rYu$@u uuuuuuо؅54't9}t3}~-W}jWh@'Su54'tWjSuu_^[] ̋UVjh(8'Xu@uuuЋ~#}t4'tujVuu^]̋USVWj	h(8'Xu]u@Suо54't;~7}t1EjPh@'u54'tu?jPPuC_^[]̋UEPuuu]̋UEPuuuI]̋UVj_h@.'Wu@uuuЋ~#}t4'tujVuu^]̋UVWj`h@.'zWu}u@WuЋ~'}t!4'tu6jP?PuG_^]̋UEPuuu0]̋UEPuuuh]̋US3V8'Ajuo3A&95c't$}@t	}uVVVVuhSZ'uPYjt-3ɸ<'A95'tjh;$
YY̸W};tu9uuE4' tT9utVVVuWh}u97u4VVVVVhS97u95Lw't=`'vMuuuuWuL$;|"9uuuEuu07j5Ȅ'_^[]̋U3V@'Ajuju395c't(},@t	},uVVVVu,hhA&@Z'uPht-3ɸD'A95'tjh;$V	YY̸S] W};tu;uE4' t=9utVVVSWhhA&97u95Lw't=`'vM(u,u(u$SuuuWuu$;ƉE|9uuuu,u(37j5Ȅ'E_[^](̋U]%$̋U]%$̋U}uE-jjEPjuX$|dU3;P E3̋UEjup0uhhA&3@]̋UH'MSVu3WC395`'wWWVuuhHEPjEPWVjD$|IEtWWVuuhEtWWVuuhhA&3EM_^[̋UQ
H'3VMM3@;tfW};u3YS\;sVVVQWhhA&34###EPVuWt+9Mwuu;v[_^̋U4' tuuXjh4'@R@]̋U4' tuu%jh4'
R@]̋U4' tuujh4'Q@]̋U4' tuujh4'Q@]̋U4' t
jujh4'uQ@]jh#&#H'euu܋E|;w`}uZjVAtNeEEu	EFu;w)3r΋E	uPQËeEjh4'P@uu_#jh#&#H'euuE|F;wc}u]jVtQeEEfu	EFFu;w)3rˋE	uPQoËeEjh4')P@uu"̋U}u 39EtPPPPuhhA&]̋UVj*h4'Ou@uuuЋtE t
jujV<^]jh#&!3ۉ]3}4' tuuQ3FVuh`'{]܉];tA};t9_uwujh4'"O@uuuЉEE,9]t}uSujuEy!3ۋ}9]t_̋U4' tuuj h4'N@]jh#& 3}3ujuh`'}};t4@u;t9~u	3@FEj%h4'AN@uЉEEE 3u9}t~̋U SVuWEPjEP3W#VuD$;}$9=4'ZPVhxP$Wj]x$B}u!4' )WWWWuhEPu`9}UusEE;Et~4' ?;9x9}t}ujuh`'>;}WWWuuu hsEu
Et98t
hSE
`';v0+;r*='(
wt<M+W#PVRD#4' tWWWPVhhA&x_^[̋USVWju}]u3;t>;t:@U;tM;tD4' tIRRPQSh
hA&04' EtRRRWVhuSW6juSWVu`$E|}uujS76j5Ȅ'	E_^[]̋UVWju,3VVVujumuu$;|uVVVuj5Ȅ'课_^]̋U0F&3ʼnEVuW}xu	utztPh|PjV@$|Zjuc5<$h,Q$|Pքu;jh<Q$|Pքu'xjj40Q$uVhhX@&葿M_3^,Q$P|P<$űU4't39EuPPPPPhhX@&5]]̋U3W'AZ'}WP]t+3ɸ'A='tjh;$(YY̸.SVuuuuuV$؅|jWj6H^[_]̋UVWj!h4'IpZ'}WP@]t53ɸ'A='tjh;$YYd@433jjBuuuujjdtjWjV訡_^]̋UVWj"h4'HpZ'}WP\t53ɸ'A='tjh;$YYd@433jj裠uuuujjŠtjWjV	_^]̋UVWjh@.'HHuxtttV`V׋|
jujV_^]̋UVj$h@.'Gpjuuu^]̋UVj%h@.'Gpju\u^]̋UVj&h@.'Gpju.uu^]̋UVj'h@.'iGpjuuuuuu^]̋UVj(h@.'/Gpjuuu^]̋UVj)h@.'Fpjuu^]̋UVj*h@.'Fpjuduu^]̋UVj+h@.'Fpju3u^]̋UVj,h@.'qFpjuuu^]̋UVj-h@.'@Fpjujuuuu^]̋UVj.h@.'Fpjuuuuuu^]̋UVj/h@.'Epju\uuuuu^]̋UVj0h@.'Epju"uu^]̋UVj1h@.']Epjuuu^]̋UVj2h@.',Epjuuuuu^]̋UVj3h@.'Dpjuuu^]̋U SVWj4h@.'Du@3E;tjVDuWWWVj
5'9=c't);t%t WjEPWV8$;|h',$uVU;ߋ|;|u[Nh'($_^[̋UVj5h@.'D}pt
jujuuuuuuu^]̋UVj6h@.'Cpjuauuuuu^]̋UVj7h@.'Cpju'u^]̋UVj8h@.'eCpjuuuuu^]̋UVj9h@.'.Cpjuu^]̋UVj:h@.'C}pt
juuu^]̋UVj;h@.'B}pt
juWuuuuu^]̋UVj<h@.'Bpjuuuu^]̋UVj=h@.'UBpjuuu^]̋UVj>h@.'$Bpjuuuuuu^]̋UVj?h@.'Apju~uuuuu^]̋UVj@h@.'ApjuDuuuu^]̋UVjAh@.'yApju
uuuu^]̋UVjBh@.'BApjuuuuu^]̋UVWjCh@.'
Apju}39c't$@tuPPPPWhhA&εuWuuu_^]̋UQVWjDh@.'@xju2utEEPuuuu׋Et|";Es4'tujPuuQ_^̋UVjEh@.'#@pjuuuu^]̋UVjFh@.'?pjuu uuuuuu^]̋UVjGh@.'?pjuCuuu^]̋UVjHh@.'{?pjuuuu^]̋UVjIh@.'G?pjuu^]̋UVjJh@.'?pjuuu^]̋UVjKh@.'>pju|uuuuuu^]̋UVjLh@.'>pju?uuuuuu^]̋UVjMh@.'n>pjuu^]̋UVjNh@.'@>pju}t
juu,u(u$u uuuuuu^](̋UVjOh@.'=pju{}t
juku4u0u,u(u$u uuuuuu^]0̋UQVWjPh@.'=xjuutEEPuuuu׋Et|";Es4'tujPuu9_^̋UQVWjQh@.'	=xjuutEEPuuuuu׋Et|";Es4'tujPuu_^̋UQVWjRh@.'<xjuuuEEPuuuu׋|4'tuju6uJE_^̋UVjSh@.'<pjuuuu^]̋UVjTh@.';pjuwuu^]̋USVWjUh@.';x]39uvj4:F;urSu_^[]̋UVjVh@.'o;pjuu^]̋UVjWh@.'A;pju}t
juuuu^]̋UVjXh@.':pjujuuu^]̋UVjYh@.':pjuVjuLuuu^]̋UVjZh@.':pjujujuuuu^]̋UVj[h@.'<:pjuuuuuuu^]̋UVj\h@.'9}pt
juuu^]̋UVj]h@.'9pju\uuuu^]̋UVj^h@.'9pju%u^]̋USVWuub9X3G39}uH9uu('95't0V }t}u!,'95'tWh;$]YYWVuWVF;tVuju_^[]̋U39w'u@Pujh4'u@]̋Ujujh'u]̋UVhh@.'u8u @uuuuuuЃ}u}uVu uu>^]̋UVjh4' 8up3PPPuj	5'cu^]̋UVjh4'7up3PPPuj5''u^]̋USVW}7]$u\~vV~vjwVvvhM380.'tPSjEPSvjD$|9}u	}t*SSwVh3SSwVuhhA&_^3[̋U]%$(t
8~j$̋USVWjh@.'36Xdp$Z'tW'W.P(tJ@$tC@t0tN3ɅtF3jփ j#RQPhhXD&4udp$5@_^[]̋USVWjh4'35Xdp$&tW^&WN.'tJ@$tC@t0tN3ɅtF3jփ j#RQPhhXD&脪u_^[]̋UVWjh4'^5pwdp$&tW%W-uu_^]̋USVj3h4'u5uX
='prFVEjEEPjuEE8$|9utVVVVVh
hXD&譩4'tdVVVVp$hh(C&肩uu^[jh$&eed@$uFV{$vVEuwËeEBdp$$tV$Vz,dp$	>E̋USVWd=j ',u-EuFEFG$Vh&F'؅}V,_^[]̋UVdp$)$tV#V+^]%'̋UE'Eh&h.&'$]̋UVWj
h4'3xj V+ud@43QEuMFEFd@$QVFEh&PuFN׋uV+
jujW7_^]̋UMAI?͠'HB]̋UMAIH]̋UVuW3;tWWWPVhhX@&9?Š'
P9rt.;uY'tWWWWVhRh(A&צ_^]̋USjh4'1P؁ve4' tZ˺$uGVj)t.EWj`'W^FT$VWP$V_
Y'^[]̋USVWjh4'14' Xtd$uVj`'VT$uu!VP$Y't*d@4W3"WkVP$W٬W,)mu_^[]̋USjh4'04' XtO$uAVWj`'VX$uVP$_^uY'td@4W3	mu[]̋USj	h4'04' XtO$uAVWj`'VX$uVP$_^uY'td@4W3muu[]̋D$L$ȋL$u	D$S؋D$d$؋D$[%$̋US]Vs350F&WEE{t
N383NF38#E@fMUS[EMt_I[LDEEtE|@GE؃u΀}t$t
N38NV3:E_^[]EɋMcE9Xth0F&WӋfEMHt
N38QNV3:AEH9Sth0F&WT%$QL$+ȃYQL$+ȃYh&d5D$l$l$+SVW0F&1E3PeuEEEEdËMd
Y__^[]Q%`$%$%$SVWT$D$L$URPQQhx&d50F&3ĉD$d%D$0XL$,3pt;T$4t;v.4v\H{uhCCd_^[ËL$At3D$H3Uhppp>]D$T$UL$)qqq(]UVWS33333[_^]Ëjc33333USVWjjh&Qi_^[]Ul$RQt$]%$USVWUjjhd&u$]_^[]ËL$At2D$H3UhP(RP$R]D$T$SVWD$UPjhl&d50F&3PD$dD$(Xpt:|$,t;t$,v-4vL$H|uhDID_뷋L$d
_^[3d
yl&uQR9QuSQY'SQY'L$KCkUQPXY]Y[%$̋Uf'u6M9uHEt
Hw'<Vu3+Mq3^]̋UEPuuuuu|?}Hw'lhujuu<juuuuG]̋UHw'E]e$f$n$%o$$$3$$$8$ڰ$$$);%7;%<%]r%r%:s%s%t%~t%%Ւ%%ȓ%ϖ%Ӗ%3%7%%&%%%%%%%|R%e%%%%
%%%%e%%B%%%%%A%%%%r%'%%%%%%,%%%%v%@%T%%V%%%%%$%%%3%%&&T$p,l&&&&&&&'('4'P'j''''''($(8(R(b(~((((()*)L)Z)h)))))))*"*8*N*d*r********++*+D+X+l++++++
,&,:,R,z,,,,,,,,,,,-"->-V-f-z------.,.6.H.Z.j......//(/8/H/b//////00,0J0\0z0000001$1@1N1Z1p1111111RtlDllShutdownInProgressRtlInitUnicodeStringcRtlAllocateHeapRtlCompareUnicodeStringNtQuerySystemTimeNtQueryPerformanceCounterRtlInitializeCriticalSection DbgPrintDRtlRandomzRtlCaptureStackBackTraceRtlLeaveCriticalSection
RtlEnterCriticalSectionRtlUpcaseUnicodeCharURtlReleaseSRWLockExclusiveDRtlAcquireSRWLockExclusiveVRtlReleaseSRWLockSharedERtlAcquireSRWLockSharedNtQueryVirtualMemoryBRtlRaiseExceptionNtAllocateVirtualMemoryNtQueryEventNtQuerySystemInformationNtQueryInformationProcess@RtlFlushSecureMemoryCache&NtFreeVirtualMemory{NtProtectVirtualMemoryRtlLookupElementGenericTableAvlRtlInsertElementGenericTableAvlRtlDeleteElementGenericTableAvlGRtlFreeHeap!DbgPrintExRtlInitializeSRWLockUNtOpenEventRtlSetHeapInformationRtlInitializeGenericTableAvlRtlDeleteCriticalSectionRtlCreateHeapRtlDestroyHeapRtlEnumerateGenericTableAvlRtlSetUserFlagsHeapRtlSetUserValueHeapRtlGetUserInfoHeapRtlLockHeapRtlUnlockHeapNtReadVirtualMemoryRtlSizeHeapRtlValidateHeapLdrUnlockLoaderLock{LdrLockLoaderLockNtTerminateProcessLdrUnloadDllzLdrLoadDllRtlEncodePointersLdrGetProcedureAddressRtlInitAnsiStringRtlDecodePointerbLdrAccessResourcekLdrFindResource_UERtlFreeAnsiStringRtlUnicodeStringToAnsiString~LdrQueryImageFileExecutionOptionsLdrQueryImageFileKeyOption~RtlSetEnvironmentVariableRtlImageNtHeader3NtWriteVirtualMemoryRtlUnhandledExceptionFilterntdll.dll}memset{memmoveymemcpyN_wcsicmpI_vsnprintfK_vsnwprintfsscanfwcsstr9_stricmpQRtlReleasePebLock1RtlFindClearBitsAndSet?RtlAcquirePebLockNtQueryInformationThreadRtlEqualUnicodeStringNtQueryObjectNtDelayExecutionRtlInitializeResourceRtlDeleteResourceTRtlReleaseResourceBRtlAcquireResourceExclusiveCRtlAcquireResourceSharedmLdrGetDllHandleLdrQueryProcessModuleInformationNtCloseNtResumeThreadNtSuspendThreadjNtOpenThreadRtlNtStatusToDosError[RtlRemoveVectoredExceptionHandler]RtlAddVectoredExceptionHandlerRtlDeregisterWaitEx*NtGetContextThreadRtlWalkFrameChainNtSetEventNRtlRegisterWaitNtCreateEventNtClearEventRtlInitializeSListHeadRtlInterlockedPopEntrySListRtlInterlockedPushEntrySList*RtlQueryDepthSListRtlDeregisterWaitRtlInitializeCriticalSectionAndSpinCountRtlSplayRtlDeleteRtlTryEnterCriticalSectionRtlpWaitForCriticalSectionCRtlRaiseStatusRtlConvertSharedToExclusiveRtlConvertExclusiveToSharedP_wcsnicmpqiswspaceRtlEnumerateGenericTableWithoutSplayingAvlhLdrFindEntryForAddressFRtlReAllocateHeap+NtWaitForSingleObject)NtWaitForMultipleObjectsNtCreateKeyZNtOpenKeyLNtMapViewOfSectionNtCreateSectionfNtOpenSection%NtUnmapViewOfSection}RtlCheckForOrphanedCriticalSectionsRtlSetThreadPoolStartFunc_alloca_probeRtlUnwindn[J38222@P_]^\`@0\P@`!3?3_3y3333
454]4w4444455<5V5{555	

VERIFIER.dllVerifierAddFreeMemoryCallbackVerifierCheckPageHeapAllocationVerifierCreateRpcPageHeapVerifierDeleteFreeMemoryCallbackVerifierDestroyRpcPageHeapVerifierDisableFaultInjectionExclusionRangeVerifierDisableFaultInjectionTargetRangeVerifierEnableFaultInjectionExclusionRangeVerifierEnableFaultInjectionTargetRangeVerifierEnumerateResourceVerifierForceNormalHeapVerifierGetInfoForExceptionVerifierGetMemoryForDumpVerifierGetProviderHelperVerifierIsCurrentThreadHoldingLocksVerifierIsDllEntryActiveVerifierIsPerUserSettingsEnabledVerifierQueryRuntimeFlagsVerifierSetFaultInjectionProbabilityVerifierSetFlagsVerifierSetRuntimeFlagsVerifierStopMessage @''@$hc'i4'!$!$B'(@&!$,4'H!$8!$='!$4' $ $D'!$c'4' $ $F'A&!$ $4'0 $ $@O'!$4'$$$^c'_4'@$ $:'B&$r@&s4'$$C&$|c'}4'`$H$O'$D&!$$A&c'4'$$PT'D&!$4'$$V'!$X`$$$0$$Л$@$0$P$$$p$И$$$$p$ $$@$$N@D_PEBNumberOfHeapsProcessHeapsProcessHeapNtGlobalFlag_HEAP_ENTRYSizePreviousSizeFlagsUnusedBytesSmallTagIndexLFHFlagsAgregateCode_HEAP_UNCOMMMTTED_RANGENextAddressSize_HEAP_SEGMENTSegmentListEntrySegmentSignatureNumberOfUnCommittedRangesUnCommittedRangesFirstEntryLastValidEntryNumberOfPagesNumberOfUnCommittedPages_HEAP_LOOKASIDEListHeadDepthMaximumDepth_HEAP_VIRTUAL_ALLOC_ENTRYEntryExtraStuffBusyBlockCommitSize_HEAPFrontEndHeapTypeFrontEndHeapSegmentsVirtualAllocdBlocksAllocatorBackTraceIndexFlagsSignatureTotalFreeSizeProcessHeapsListIndexEncodeFlagMaskEncodingSegmentList_HEAP_ENTRY_EXTRAAllocatorBackTraceIndex_RTL_PROCESS_MODULE_INFORMATIONFullPathName_STACK_TRACE_DATABASECommitBaseCurrentLowerCommitLimitEntryIndexArrayNumberOfEntriesAdded_DPH_HEAP_ROOTpBusyAllocationListHeadpFreeAllocationListHeadNextHeapNormalHeapExtraFlagsBusyNodesTable_DPH_HEAP_BLOCKpNextAllocpVirtualBlocknVirtualBlockSizepUserAllocationnUserRequestedSizeStackTrace_DPH_BLOCK_INFORMATIONStartStampHeapRequestedSizeActualSizeTraceIndexStackTraceEndStamp_RTL_STACK_TRACE_ENTRYHashChainIndexDepthBackTrace_LFH_HEAPSubSegmentZones_LFH_BLOCK_ZONEListEntryLimit_HEAP_SUBSEGMENTUserBlocksBlockSize_HEAP_USERDATA_HEADERSignatureSubSegment_HEAP_UCR_DESCRIPTORListEntryAddressSize_HEAP_STACK_TRACE_LOG_ENTRYTraceSize0
pT@H8P@@0 x8p|(((x8PH8h(0 @`@0<d( 0 0 (Hh@0$( ,0
 0@dxLPHLd`d 8@ 0 
7 h0
pT@H8P@@0 x8p|(((h8PH8h(0 @`@ 0<d( 0 0 (8h@0$( ,0
 0@dxLPHLd`d 8@ 0 
7 X0

 hLP8@0H@@0 


@P((h8PH8h(0 @`@ 0<@b( 0 h<,0 $(0
 XPj(0pHLd` 0($ 
5 X0

 hLP8@0H@@0 


@P((h8PH8h(0 @`@ 0<@b( 0 0h<,0 $(0
 XPj(0pHLd`d 8@ 0 
5 :$&%:$%:${%:$u%:$%|:$%l:$P%`:$Q%T:$%H:$Y%0:$%:$%9$%9$'%9$%9$͐%|9$%d9$֑%P9$$%49$ܓ%9$%9$0%8$Z%8$%8$%8$%8$%8$%8$%x8$b%d8$T%X8$c%D8$8U%,8$%8$%7$&7$%7$7%7$e%7$%7$%7$%|7$/%l7$`%X7$%D7$%(7$%7$7&7$q&6$&6$&6$
&6$;&6$&6$2&%$l&p6$&%$&\6$&H6$6&,6$v&6$&6$&5$&5$O&5$&5$&5$&5$_&l5$&\5$&H5$P&05$&$5$&5$&5$&4$T&4$&4$&4$&4$w&4$&|4$t	&l4$	&`4$
&P4$M
&@4$
&04$
&$4$&4$=&4${&3$&3$&3$7&3$n&3$+%3$%3$%3$%3$%p3$%P3$%D3$~%43$~%(3$~%3$h%2$uu%2$=%2$}%2$u%2$%2$`%t2$#%`2$u%L2$v%82$v% 2$w%2$w%1$%1$x%1$w%1$x%1$E%1$d%1$)f%1$U%h1$V%T1$N&81$^% 1$X%1$X%0$ Y%0$%0$%0$g%0$
&,:'8%w%%0$8%0$%0$9
&t0$&d0$&T0$&H0$M&@0$&40$s&(0$&0$&0$+%/$'%/$,%/$1%/$%/$%/$%/$%t/$S%h/$mT%L/$&</$O%,/$%/$%/$%.$B%.$u%.$%.$R%.$
&.$%.$F%.$x%|.$%h.$%T.$%D.$y%,.$,z%.$z%.$%.$%-$7%-$`%-$%-$%-$%-$|%-$%t-$L%d-$%t$Z%X-$%L-$g%<-$%,-$i%-$y%h$%-$%-$p%,$%,$k%,$%,$%,$L%,$%3$%3$j%3$%3$
%,$%,$)%,$%,$x%|,$%y%l,$uy%X,$z%D,$A{%4,${%$,${%,$@|%+$%+$d%+$%+$
%+$%+$%l+$2%T+$%D+$%4+$	%+$l%+$%*$e%l)$@.'*$4'$7'*$(8'*$8'*$9'p*$9'T*$9'4*$'?????????	

?????????	??	
???"#$%&'(?,-./012?6789:;<??????P?pqrstuvQ?z{|}~R??XYZ[\]^?bcdefgh?lmnopqr?vwxyz{|?????	?
???
??????
?? !"#$%&?*+,-./0?456789:?>?@ABCD?HIJKLMN?RSTUVWX?\]^_`ab?fghijkl?pqrstuv?z{|}~P?@ABCDEF?(#)#*#+#,#-#.#?2#3#4#5#6#7#8#?<#=#>#?#@#A#B#?F#G#H#I#J#K#L#?P#Q#R#S#T#U#V#?Z#[#\#]#^#_#`#?d#e#f#g#h#i#j#?n#o#p#q#r#s#t#?x#y#z#{#|#}#~#	?#######
?#######?#######?#######
?#######?%%%% %!%"%?&%'%(%)%*%+%,%?0%1%2%3%4%5%6%?:%;%<%=%>%?%@%D%E%F%G%H%I%J%	?)))))	)
)	?)))))))	?)))))))	?")#)$)%)&)')()	?,)-).)/)0)1)2)	?6)7)8)9):);)<)Expected minimum lock countExpected least significant bitI$H$H$H$H$H$tH$XH$4H$H$G$G$G$G$G$|G$hG$LG$,G$G$G$F$F$F$F$F$hF$PF$8F$ F$F$E$E$E$E$E$pE$TE$<E$(E$E$D$*$D$D$D$|D$`D$LD$4D$D$D$C$C$C$C$C$xC$`C$DC$(C$C$B$B$B$B$B$|B$hB$LB$4B$B$A$A$A$A$A$lA$TA$0A$A$@$@$@$ 
@ l)$  K
0H`x 8Ph(@9X:p;<=xy0H`x 8Ph345(6@7X8p9:;<RS	T	U0	H	`	x												
	
	 
	0
	@
	P
	`
	p
	
	
	
	
	
	
	
	
			 	0	@	P	`	p											 	0	@	P	`	p									
	
	 
	0
	@
	P
	`
	p
	
	
	
	
	
	
	
	
			 	0	@	P	`	pHxXdPd!2",% $$`&P(:69h<@Bf(E G	P]m0x~j(Ȋ
`>@*"(600 
^
"%+7@rHFMQZ>bT@ho qrwpz`~H؍ph 0Prȝl8F0R 84VS_VERSION_INFO@@?"StringFileInfo040904B0LCompanyNameMicrosoft Corporation~+FileDescriptionStandard application verifier provider dlll&FileVersion6.1.7600.16385 (win7_rtm.090713-1255):
InternalNameverifier.dll.LegalCopyright Microsoft Corporation. All rights reserved.B
OriginalFilenameverifier.dllj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	<AVRF: Terminate process after verifier stop failed with %X 
kThis verifier stop is not continuable. Process will be terminated 
when you use the `go' debugger command.
LThis verifier stop is continuable.
After debugging it use `go' to continue.
9AVRF: Formatting message failed in VerifierStopMessageEx
LAVRF: Noncontinuable verifier stop %p encountered. Terminating process ... 


=======================================
VERIFIER STOP %p: pid 0x%X: %S 

	%p : %S
	%p : %S
	%p : %S
	%p : %S

%S
=======================================
%S
=======================================



=======================================
VERIFIER STOP %p: pid 0x%X: %s 

	%p : %s
	%p : %s
	%p : %s
	%p : %s

%s
=======================================
%s
=======================================

FullDllsSize	SizeStartSizeEndRandRateBackwardUnalignDeCommitTracesProtectNoSyncNoLockFaults	FaultRateTimeOutAddr	AddrStartAddrEndRandom4TRUE for full page heap. FALSE for normal page heap.iPage heap allocations for target dlls only. Name of the binaries with extension (.dll or something else).%Page heap allocations for size range.Beginning of the size range.Ending of the size range.uDecimal integer in range [0..100] representing probability to make page heap allocation vs. a normal heap allocation.Catch backwards overruns.No alignment for allocations.(Decommit guard pages (lower memory use).Collect stack tracescProtect heap internal structures. Can be used to detect random corruptions but execution is slower.LCheck for unsynchronized access. Do not use this flag for an MPheap process."Disable critical section verifier.Fault injection.Probability (1..10000) for heap calls failuresQTime during process initialization (in milliseconds) when faults are not allowed.'Page heap allocations for address rangeBeginning of the address rangeEnding of the address range'Page heap allocations with probability.DFailed within the address range where the specified dlls are loaded.Doesn't fail within those dlls.Grace period as Milliseconds.	Wait API.Heap allocation.Virtual memory allocation.
Registry API.	File API.Event Manipulation.	Map View.Ole API."Disable automatic stack expansion.Traces6Maximum number of traces in the handle history buffer.Delay"Delay until rollover in (seconds).
AsyncCheck9Check asynchronous calls that require a persistent threadDllMainCheck<Check LoadLibrary/FreeLibrary calling when DllMain is active
ExecWritePage4Checking the usage of executable and writable memoryFillReadBuffereFills I/O buffer with a pattern before initiating the I/O, to catch bugs around uninitialized buffersForcePendingIOVProbability in parts per million for forcing STATUS_PENDING in place of STATUS_SUCCESSChecks for errors in lock usage. This might cause access violations when errors are located. A debugger is required to see the test results.Checks that applications and components use RPC correctly. Common mistakes and problems while using RPC are flagged. A debugger is required to see the test results.Checks that applications and components use COM correctly. Common mistakes and problems while using COM are flagged. A debugger is required to see the test results.Checks that applications and components use TLS (Thread Local Storage) APIs correctly. Common mistakes and problems while using TLS APIs are flagged. A debugger is required to see the test results.#Helps catch uninitialized variablesaDetects first chance access violation exceptions. A debugger is required to see the test results.Checks for handle errors. This might cause access violations when errors are located. A debugger is required to see the test results.GChecks the heap errors. A debugger is required to see the test results.Checks for adequate stack size by stopping stack growth. This causes a stack overflow error if the original stack size is too small. You can prevent this from happening by increasing the stack commit size.TChecks usage of virtual memory APIs. A debugger is required to see the test results.$Checks usage of dangerous API usage.Forces the GetTickCount API to roll over faster than they normally would. This allows applications to test their handling of timer rollover more easily.GChecks for dirty threadpool thread and other threadpool related issues.Low Resource Simulation also known as Fault Injection, tries to simulate an environment under low resources, such as out of memory.'Checks issues related to I/O transfers.VChecks that when a dll is unloaded there are no outstanding resources allocated by it."Dangerous call to TerminateThread.,Thread ID for the caller of Terminatethread.	Not used.	Not used.	Not used.This stop is generated if a thread (thread ID is parameter1) is terminated explicitly using

TerminateThread.This function is very dangerous because it introduces data corruption and

deadlocks (as per MSDN).2Potential stack overflow in low memory conditions.	Not used.	Not used.	Not used.	Not used.This stop is generated if the initial stack commit size of a thread is such that a stack

overflow can be raised in low memory conditions if stack cannot be extended.8ExitProcess called while multiple threads still running.Number of threads running.	Not used.	Not used.	Not used.This stop is generated if a thread calls ExitProcess while there are several threads running.

In such a case, internally TerminateThread will be called for each thread and this can create

deadlocks or data corruptions.%LoadLibrary is called during DllMain.Dll Name (use du to dump).Dll base address.	Not used.	Not used.xThis stop is generated if the code inside DllMain calls LoadLibrary or FreeLibary. It's the

behavior forbidden by MSDN.%FreeLibrary is called during DllMain.Dll Name (use du to dump).Dll base address.	Not used.	Not used.xThis stop is generated if the code inside DllMain calls LoadLibrary or FreeLibary. It's

the behavior forbidden by MSDN.KSetProcessWorkingSetSize is called with MinimumWorkingSetSize = 0xFFFFFFFF.	Not used.	Not used.	Not used.	Not used./Please use MinimumWorkingSetSize = (SIZE_T) -1.KSetProcessWorkingSetSize is called with MaximumWorkingSetSize = 0xFFFFFFFF.	Not used.	Not used.	Not used.	Not used./Please use MaximumWorkingSetSize = (SIZE_T) -1.MSetProcessWorkingSetSizeEx is called with MinimumWorkingSetSize = 0xFFFFFFFF.	Not used.	Not used.	Not used.	Not used./Please use MinimumWorkingSetSize = (SIZE_T) -1.MSetProcessWorkingSetSizeEx is called with MaximumWorkingSetSize = 0xFFFFFFFF.	Not used.	Not used.	Not used.	Not used./Please use MaximumWorkingSetSize = (SIZE_T) -1.%Thread cannot own a critical section.
Thread ID.Critical section address.+Critical section debug information address.,Critical section initialization stack trace.This stop is generated if a thread (thread ID is parameter1) is terminated,

suspended or is in a state (worker thread finished a work item) in which it

cannot hold a critical section. The current thread is the culprit.

To debug this stop use the following debugger commands:



$ kb - to get the current stack trace. If the current thread is the owner of

the critical section it is probably calling ExitThread.

The current thread should have released the critical section before exiting.

If the current thread is calling TerminateThread or SuspendThread then it

should not do this for a thread holding a critical section.



$ !cs -s parameter2 - dump information about this critical section.



$ ln parameter2 - to show symbols near the address of the critical section.

This should help identify the leaked critical section.



$ dps parameter4 - to dump the stack trace for this critical section initialization.4Unloading DLL containing an active critical section.Critical section address.,Critical section initialization stack trace.DLL name address.DLL base address.This stop is generated if a DLL has a global variable containing a critical section

and the DLL is unloaded but the critical section has not been deleted. To debug

this stop use the following debugger commands:



$ du parameter3 - to dump the name of the culprit DLL.



$ .reload dllname or .reload dllname = parameter4 - to reload the symbols for that DLL.



$ !cs -s parameter1 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the leaked critical section.



$ dps parameter2 - to dump the stack trace for this critical section initialization.9Freeing heap block containing an active critical section.Critical section address.,Critical section initialization stack trace.Heap block address.Heap block size.This stop is generated if a heap allocation contains a critical section,

the allocation is freed and the critical section has not been deleted.

To debug this stop use the following debugger commands:



$ !cs -s parameter1 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the leaked critical section.



$ dps parameter2 - to dump the stack trace for this critical section initialization.



$ parameter3 and parameter4 might help understand where this heap block was

allocated (the size of the allocation is probably significant).1Double initialized or corrupted critical section.Critical section address.DAddress of the debug information structure found in the active list.!First initialization stack trace."Second initialization stack trace.Usually this stop is generated if a critical section has been initialized more

than one time. In this case parameter3 and parameter4 are the stack trace

addresses for two of these initializations. Some other times it is possible

to get this stop if the critical section or its debug information structure

has been corrupted. In this second case it is possible that parameter3 and

parameter4 are invalid and useless. To debug this stop:



$ !cs -s -d parameter2 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This might help identify the critical section if this is a global variable.



$ dps parameter3 and dps parameter4 - to identify the two code paths for

initializing this critical section.2Free memory containing an active critical section.Critical section address.+Critical section debug information address.,Critical section initialization stack trace.	Not used.This stop is generated if the memory containing a critical section was freed

but the critical section has not been deleted using DeleteCriticalSection.

To debug this stop use the following debugger commands:



$ !cs -s -d parameter2 - dump information about this critical section.



$ dps parameter3 - to identify the code path for initializing this critical section.



In most cases the lock verifier detects immediately leaked critical sections

contained in a heap allocation, a DLL range, a virtual memory allocation

or a MapViewOfFile mapped memory range and issues different stops in these cases.

So there are very few cases left for this verifier stop. The lock must be

in a memory range freed by kernel-mode code or freed cross-process by APIs

like VirtualFreeEx. Most typically this stop will  be encountered if a previous stop

(e.g. LOCK_IN_FREED_HEAP or LOCK_IN_UNLOADED_DLL) was continued by

hitting `g' in the debugger console.Corrupted critical section.Critical section address.;Invalid debug information address of this critical section.:Address of the debug information found in the active list.Initialization stack trace.UThis stop is generated if the DebugInfo field of the critical section is

pointing freed memory. Usually another valid DebugInfo structure is

found in the active critical section list. Without corruption the two

pointers should be identical. To debug this stop use the following debugger commands:



$ !cs -s -d parameter3 - dump information about this critical section

based on the current contents of the debug info structure

found in the active list (this structure is rarely corrupted so usually

this information is trustworthy).



$ !cs -s parameter1 - dump information about this critical section based

on the current contents of the critical section structure (the structure

is corrupted already so sometimes this information is NOT trustworthy).



$ dps parameter4 - to identify the code path for initializing this critical section.



Dump the critical section at address parameter1 and look for the corruption

pattern. With good symbols for ntdll.dl you can use the following commands:



$ dt ntdll!_RTL_CRITICAL_SECTION LOCK_ADDRESS

$ dt ntdll!_RTL_CRITICAL_SECTION_DEBUG DEBUG_ADDRESS&Invalid critical section owner thread.Critical section address.Owning thread.Expected owning thread.$Critical section debug info address.,This stop is generated if the owner thread ID is invalid in the current

context. To debug this stop:



$ !cs -s parameter1 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the critical section.)Invalid critical section recursion count.Critical section address.Recursion count.Expected recursion count.$Critical section debug info address.TThis stop is generated if the recursion count field of the critical section

structure is invalid in the current context. To debug this stop:



$ !cs -s parameter1 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the critical section.2Deleting critical section with invalid lock count.Critical section address.Lock count.Expected lock count.Owning thread.This stop is generated if a critical section is owned by a thread if it is deleted

or if the critical section is uninitialized. To debug this stop:



$ !cs -s parameter1 - dump information about this critical section.

If the owning thread is 0 the critical section has not been initialized.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the critical section.,Critical section over-released or corrupted.Critical section address.Lock count.Expected lock count.$Critical section debug info address.This stop is generated if a critical section is released more times than the

current thread acquired it. To debug this stop:



$ !cs -s parameter1 - dump information about this critical section.



$ !cs -s -d parameter4 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the critical section.!Critical section not initialized.Critical section address.$Critical section debug info address.	Not used.	Not used.This stop is generated if a critical section is used without being

initialized or after it has been deleted. To debug this stop:



$ ln parameter1 - to show symbols near the address of the critical section.

This should help identify the critical section.(Critical section is already initialized.Critical section address.$Critical section debug info address.@First initialization stack trace. Use dps to dump it if non-NULL	Not used.(This stop is generated if a critical section is reinitialized by the

current thread. To debug this stop:



$ !cs -s parameter1 or !cs -s -d parameter2 - dump information about this critical section.



$ ln parameter1 - to show symbols near the address of the critical section.

This might help identify the critical section if this is a global variable.



$ dps parameter3 - to identify the code path for the first initialization of this

critical section.



$ kb - to display the current stack trace, that is reinitializing this critical section.=Freeing virtual memory containing an active critical section.Critical section address.,Critical section initialization stack trace.Memory block address.Memory block size.This stop is generated if the current thread is calling VirtualFree on a

memory block that contains an active critical section. The application should call

DeleteCriticalSection on this critical section before if frees this memory.



$ kb - to display the current stack trace, that is calling VirtualFree.

The probable culprit is the DLL that calls VirtualFree.



$ !cs -s parameter1 - dump information about this critical section.



$ dps parameter2 - to identify the code path for the initialization

of this critical section.>Unmapping memory region containing an active critical section.Critical section address.,Critical section initialization stack trace.Memory block address.Memory block size.$This stop is generated if the current thread is calling UnmapViewOfFile

on a memory block that contains an active critical section. The application

should call DeleteCriticalSection on this critical section before if unmaps this memory.



$ kb - to display the current stack trace, that is calling UnmapViewOfFile .

The probable culprit is the DLL that calls UnmapViewOfFile.



$ !cs -s parameter1 - dump information about this critical section.



$ dps parameter2 - to identify the code path for the initialization of

this critical section.2Current thread does not own any critical sections.Critical section address.4Number of critical sections owned by current thread.Not usedNot used,This stop is generated if the current thread is calling LeaveCriticalSection but,

according to the internal verifier bookkeeping, it doesn't own any critical section.



If parameter2 is zero, probably this is a bug in the current thread.

It either tries to leave a critical section that it didn't enter, or maybe

it is calling LeaveCriticalSection more times than it called EnterCriticalSection

for the same critical section.



If parameter2 is not zero (it is a negative integer number) the internal

verifier data structures are probably corrupted.6Using critical section that is private to another DLL.Critical section address.	Not used.Not usedNot usedThis stop is generated if the current thread tries to use a private lock that lives

inside another DLL. For example a.dll tries to enter a critical section

defined inside ntdll.dll. Private locks cannot be used across DLLs.1Invalid handle exception for current stack trace.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.	Not used.This stop is generated if the function on the top of the stack passed an

invalid handle to system routines. Usually a simple kb command will reveal

what is the value of the handle passed (must be one of the parameters -

usually the first one). If the value is null then this is clearly wrong.

If the value looks ok you need to use !htrace debugger extension to get a

history of operations pertaining to this handle value. In most cases it

must be that the handle value is used after being closed./Invalid TLS index used for current stack trace.Invalid TLS index.!Expected lower part of the index.	Not used.	Not used.This stop is generated if the function on the top of the stack passed an invalid TLS

index to TLS system routines. Usually a simple kb command will reveal what is wrong.

The typical bug here is to assume a certain value for a TLS index instead of

calling TlsAlloc. This can happen either by thinking that you always get

value N therefore there is no need to call TlsAlloc or more frequently

due to an uninitialized variable.3Invalid parameters for WaitForMultipleObjects call.!Address of object handles vector.Number of handles.	Not used.	Not used.This stop is generated if the function on the top of the stack called

WaitForMultipleObjects with NULL as the address of the array of handles

to wait for or with zero as the number of handles. A simple kb command

will reveal the function calling this API incorrectly.=NULL handle passed as parameter. A valid handle must be used.	Not used.	Not used.	Not used.	Not used.hThis stop is generated if the function on the top of the stack passed a

NULL handle to system routines.&Waiting on a thread handle in DllMain.Thread handle.	Not used.	Not used.	Not used.This stop is generated if the current thread is currently running code inside

the DllMain function of one of the DLLs loaded in the current process and

it calls WaitForSingleObject or WaitForMultipleObjects to wait on a thread handle

in the same process. This would most likely lead to a deadlock because the thread

handle will not get signaled unless that second thread is exiting. When the second

thread will call ExitThread it will try to acquire the DLL loader lock then call

DllMain (DLL_THREAD_DETACH) for all DLLs in the current process. But the loader lock

is owned by the first thread (the one that is waiting on the thread handle) so the

two threads will deadlock.!Incorrect object type for handle.
Handle value.&Object type name. Use du to display it/Expected object type name. Use du to display it	Not used.This stop is generated if the current thread is calling an API with a handle to

an object with an incorrect object type. E.g. calling SetEvent with a semaphore

handle as parameter will generate this stop. To debug this stop:



$ kb - to display the current stack trace. The culprit is probably the DLL

that is calling into verifier.dll;



$ du parameter2 - to display the actual type of the handle. The handle value

is parameter1. In the example above, this will display: Semaphore.



$ du parameter3 - to display the object type expected by the API. In the example above,

this name will be: Event.



$ !htrace parameter1 might be helpful because it will display the stack

trace for the recent open/close operations on this handle.:Unloading DLL that allocated TLS index that was not freed.	TLS index2Address of the code that allocated this TLS index.$DLL name address. Use du to dump it.DLL base address.This stop is generated if a DLL that allocated a TLS index is being unloaded

before freeing that TLS index. To debug this stop:



$ du parameter3 - display the name of the culprit DLL;



$ .reload xxx.dll=parameter4 - reload symbols for the culprit DLL (if needed).

xxx.dll is the name of the DLL displayed in the above step;



$ u parameter2 - disassemble the code that allocated the TLS. This should

point to the function that allocated the TLS but forgot to free it

before the DLL was unloaded.!Corrupted verifier TLS structure.TEB address.Expected TEB address.
Thread ID.Expected thread ID.This stop is generated if the internal verifier structures used to

store the state of TLS slots for thread are corrupted. Very likely this is

due to some random corruption in the process.Using an invalid TLS index.	TLS index	Not Used.	Not Used.	Not Used.\This stop is generated if an invalid TLS index is used. In most cases, it's because

code is still using this index when TlsFree is called.



Here is an example for the threadpool thread.



T1: Dll loads and TlsAlloc

T1: Queue callback

T1: Skipped waited/cancelled callback

T1: TlsFree

T2: Callback runs and calls TlsSetValue

T1: Dll unloads@Freeing virtual memory block with invalid size or start address.Allocation base address.Memory region size.	Not used.	Not used.This stop is generated if the app verifier detects a VirtualFree or a DLL unload

with an invalid start address or size of the memory allocation.



In the case of DLL unload this probably means a memory corruption inside the loaded DLL list.



To debug this stop look at the current stack trace and the memory address and size

that is about to be freed and try to determine why they are invalid.Incorrect virtual alloc call.#Pointer to allocation base address.Pointer to memory region size.Not usedNot used*This stop is generated if the app verifier detects a VirtualAlloc call with an invalid

start address or size of the memory allocation. To debug this stop look at the current

stack trace (kb) and the memory address and size that is about to be allocated and try

to determine why they are invalid.Incorrect map view call. Pointer to mapping base address.Pointer to view size.	Not used.	Not used.This stop is generated if the app verifier detects a MapViewOfFile call

with an invalid base address or size of the mapping. To debug this stop

look at the current stack trace (kb) and the memory address and size that

is about to be mapped and try to determine why they are invalid.Probing invalid address.Start address.Memory block size.Invalid address.	Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call with an

invalid address (e.g. a kernel-mode address, instead of a normal user-mode address)

for the memory buffer to be probed. To debug this stop look at the current stack

trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended

up with an invalid address. Many times, the address is plain bogus, e.g.

an uninitialized pointer.



MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs:



In a preemptive multitasking environment, it is possible for some other thread to change

the process's access to the memory being tested.



Dereferencing potentially invalid pointers can disable stack expansion in other threads.

A thread exhausting its stack, when stack expansion has been disabled, results in

the immediate termination of the parent process, with no pop-up error window or

diagnostic information.



Threads in a process are expected to cooperate in such a way that one will not free

memory that the other needs. Use of this function does not negate the need to do this.

If this is not done, the application may fail in an unpredictable manner.



Because of all these reasons, we recommend to never use these APIs.Probing free memory.Start address.Memory block size.Address of free memory page.	Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call for a

memory allocation that is free. This is very bad because it is possible that,

in some other cases, this memory was already reused for some other allocation.

Since the current code path (kb) doesn't own that memory, it could end up

corrupting someone else's memory, with disastrous effects.



To debug this stop look at the current stack trace (kb) and try to determine

why the caller of the IsBadXXXPtr function ended up probing free memory.

The address could be plain bogus (e.g. uninitialized pointer) or maybe

already freed memory. If the memory was already freed by one of the

VirtualFree or UnmapViewOfFile APIs, `!avrf -vs -a parameter3' will search

for a log of stack traces of the code paths that allocated/freed that address

and display these stack traces if they are available. This might show the stack

trace that freed up this memory. More often, the memory is an already freed

heap allocation. To check for that possibility, `!avrf -hp -a parameter3' will

search for a log of stack traces of the code paths that allocated/freed that

address from/to the heap and display these stack traces if they are available.



MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs:



In a preemptive multitasking environment, it is possible for some other thread

to change the process's access to the memory being tested.



Dereferencing potentially invalid pointers can disable stack expansion in

other threads. A thread exhausting its stack, when stack expansion has been

disabled, results in the immediate termination of the parent process,

with no pop-up error window or diagnostic information.



Threads in a process are expected to cooperate in such a way that one

will not free memory that the other needs. Use of this function does

not negate the need to do this. If this is not done, the application

may fail in an unpredictable manner.



Because of all these reasons, we recommend to never use these APIs.Probing a guard page.Start address.Memory block size.Address of guard page.	Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call for a

memory allocation that contains at least one GUARD_PAGE. This is very bad

because it is very possible that this GUARD_PAGE is the end of the current

stack of a thread. As documented in the MSDN library: Dereferencing potentially

invalid pointers can disable stack expansion in other threads. A thread exhausting

its stack, when stack expansion has been disabled, results in the immediate

termination of the parent process, with no pop-up error window or diagnostic

information. To debug this stop look at the current stack trace (kb) and try

to determine why the caller of the IsBadXXXPtr function ended up probing a GUARD_PAGE.



MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs:



In a preemptive multitasking environment, it is possible for some other thread

to change the process's access to the memory being tested.



Dereferencing potentially invalid pointers can disable stack expansion in

other threads. A thread exhausting its stack, when stack expansion has been

disabled, results in the immediate termination of the parent process,

with no pop-up error window or diagnostic information.



Threads in a process are expected to cooperate in such a way that one

will not free memory that the other needs. Use of this function does

not negate the need to do this. If this is not done, the application

may fail in an unpredictable manner.



Because of all these reasons, we recommend to never use these APIs.Probing NULL address.	Not used.	Not used.	Not used.	Not used.oThis stop is generated if the app verifier detects an IsBadXXXPtr call with a

NULL address. To debug this stop look at the current stack trace (kb) and

try to determine why the caller of the IsBadXXXPtr function ended up with

the NULL address. This is typically the sign of someone not checking the

return value of one of the memory allocation functions. For example the code

below is incorrect:



int main (void)

{

PVOID p;



p = malloc (1024);

Use (p);



return 0;

}



void Use (PVOID p)

{

if (IsBadReadPtr (p)) {

return;

}



//

// p is safe to be used here.

//

}



This code should be re-written as this:



int main (void)

{

PVOID p;



p = malloc (1024);

if (NULL == p)) {

return -1;

}



Use (p);



return 0;

}



void Use (PVOID p)

{

//

// p is safe to be used here.

//

}



MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs:



In a preemptive multitasking environment, it is possible for some other thread

to change the process's access to the memory being tested.



Dereferencing potentially invalid pointers can disable stack expansion in

other threads. A thread exhausting its stack, when stack expansion has been

disabled, results in the immediate termination of the parent process,

with no pop-up error window or diagnostic information.



Threads in a process are expected to cooperate in such a way that one

will not free memory that the other needs. Use of this function does

not negate the need to do this. If this is not done, the application

may fail in an unpredictable manner.



Because of all these reasons, we recommend to never use these APIs.8Probing memory block with invalid start address or size.Start address.Memory block size.	Not used.	Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call with an

invalid start address (e.g. a kernel-mode address, instead of a normal user-mode

address) or invalid size for the memory buffer to be probed. To debug this stop

look at the current stack trace (kb) and try to determine why the caller of

the IsBadXXXPtr function ended up with an invalid address or size.

Many times, the address or size are plain bogus, e.g. an uninitialized variables.



MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs:



In a preemptive multitasking environment, it is possible for some other thread

to change the process's access to the memory being tested.



Dereferencing potentially invalid pointers can disable stack expansion in

other threads. A thread exhausting its stack, when stack expansion has been

disabled, results in the immediate termination of the parent process,

with no pop-up error window or diagnostic information.



Threads in a process are expected to cooperate in such a way that one

will not free memory that the other needs. Use of this function does

not negate the need to do this. If this is not done, the application

may fail in an unpredictable manner.



Because of all these reasons, we recommend to never use these APIs.1Unloading DLL with invalid size or start address.DLL memory base address.DLL memory range size.$DLL name address. Use du to dump it.	Not used.This stop is generated if the app verifier detects a DLL unload with an invalid

start address or size of the DLL memory range. This probably means a memory

corruption inside the internal ntdll.dll loaded DLL list.AFreeing memory block inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects a VirtualFree for a block of

memory that is actually part of the current thread's stack (!).



To debug this stop look at the current stack trace (kb) and try to understand

why the function that called VirtualFree thought that the memory block was

dynamically allocated or mapped but that was actually memory allocated from the stack.7Incorrect FreeType parameter for VirtualFree operation.(Incorrect value used by the application.Expected correct value 1.Expected correct value 2.	Not used.This stop is generated if the app verifier detects a VirtualFree with an

incorrect value for the FreeType parameter. The only two acceptable values for

this parameter are MEM_DECOMMIT and MEM_RELEASE. If VirtualFree is called

with any other value except these two, VirtualFree will fail to free the memory.

To debug this stop look at the current stack trace (kb): the caller of VirtualFree

is probably the culprit.9Trying to free virtual memory block that is already free.Memory block address.	Not used.	Not used.	Not used.This stop is generated if the app verifier detects a VirtualFree for an address

that is already free. To debug this stop look at the current stack trace (kb)

and try to determine why the memory is already free but the application is

trying to free it again. `!avrf -vs -a parameter1' will search for a log of

stack traces of the code paths that allocated/freed that address and display

these stack traces if they are available. This might show the stack trace that

freed up this memory.AIncorrect Size parameter for VirtualFree (MEM_RELEASE) operation.'Incorrect size used by the application.Expected correct size (0).	Not used.	Not used.This stop is generated if the app verifier detects a VirtualFree (MEM_RELEASE)

with a non-zero value for the dwSize parameter. When using MEM_RELEASE ,

the only acceptable value for this parameter is 0. If VirtualFree is called

with any other value except 0, VirtualFree will fail to free the memory.

To debug this stop look at the current stack trace (kb): the caller of

VirtualFree is probably the culprit.7Unexpected exception raised in DLL entry point routine.DLL name (use du to dump it).)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.Verifier dll descriptorThis stop is generated if a DLL's entry point (DllMain) function is raising

an exception. One example why this is bad is: if DllMain(DLL_PROCESS_ATTACH) is

raising an exception, the Windows DLL loader will:



- Catch and hide the exception;

- Unload the DLL without calling its DllMain(DLL_PROCESS_DETACH).



So in many cases the DLL allocated some resources already, then it raised the

exception, and it will not have a chance to release these resources on

DllMain (DLL_PROCESS_DETACH).



To debug this stop:



$ du parameter1 - to display the DLL name;



$ .exr parameter2 - to display the exception information;



$ .cxr parameter3 followed by kb - to display the exception context information

and the stack trace for the time when the exception was raised;



$ parameter4 is the address of an internal verifier structure and doesn't

have any significance for most of the verifier users./Unexpected exception raised in thread function.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.	Not used.This stop is generated if a thread function is raising an exception. This

is bad because the whole process will be killed.



To debug this stop:



$ parameter1 might be significant for the type of exception. E.g. an

exception code C0000005 means Access Violation;



$ .exr parameter2 - to display the exception information;



$ .cxr parameter3 followed by kb - to display the exception context information;1Unexpected exception raised while probing memory.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.Not usedThis stop is generated if we get an exception during an IsBadXXXPtr call. This means

that the memory buffer we are probing doesn't actually have the protection

assumed by the caller, or that the memory was freed already, etc. See the

discussion above about other stop code (PROBE_INVALID_ADDRESS,

PROBE_FREE_MEM, PROBE_GUARD_PAGE, PROBE_NULL, PROBE_INVALID_START_OR_SIZE) for

more examples of why using the IsBadXXXPtr APIs is not recommended.



To debug this stop:



$ parameter1 will typically be C0000005 and that means Access Violation;



$ .exr parameter2 - to display the exception information;



$ .cxr parameter3 followed by kb - to display the exception context information

and stack trace at the time when the exception was raised;Trying to reset NULL address.	Not used.	Not used.	Not used.	Not used.This stop is generated if the app verifier detects a VirtualFree (MEM_RESET) call

with a NULL first parameter.  MEM_RESET should be used only for already

allocated memory, so NULL is not a valid first parameter in this case.FFreeing heap memory block inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects a HeapFree, for a block of

memory that is actually part of the current thread's stack (!).



To debug this stop look at the current stack trace (kb) and try to understand

why the function that called HeapFree thought that the memory block was dynamically

allocated or mapped but that was actually memory allocated from the stack.DUnmapping memory region inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects an UnmapViewOfFile, for a block of

memory that is actually part of the current thread's stack (!).



To debug this stop look at the current stack trace (kb) and try to understand

why the function that called UnmapViewOfFile thought that the memory block was dynamically

allocated or mapped but that was actually memory allocated from the stack.Incorrect RTL_RESOURCE address.Address.	Not used.	Not used.	Not used.jThis stop is generated if the application is trying to use NULL or some other

incorrect address (e.g. a kernel-mode address) as the address of a valid

object. RtlInitializeResource (NULL) is an incorrect API call that will trigger

this kind of verifier stop.



param1 is the incorrect address used and the culprit is on the stack

trace (display it with kb).!Invalid critical section address.Address.	Not used.	Not used.	Not used.hThis stop is generated if the application is trying to use NULL or some other

incorrect address (e.g. a kernel-mode address) as the address of a valid

object. EnterCriticalSection(NULL) is an incorrect API call that will trigger

this kind of verifier stop.



param1 is the incorrect address used and the culprit is on the stack

trace (display it with kb).1Attempt to execute code in non-executable memory.Address being accessed.Code performing invalid access.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from

an address that is non-executable or free.



To debug this stop:



$ u parameter2 - to unassemble the culprit code



$ .exr parameter3 - to display the exception information;



$ .cxr parameter4 followed by kb - to display the exception context information

and the stack trace for the time when the exception was raised.=Unexpected exception raised while initializing output buffer.Buffer start address.Buffer size.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if we get an exception while initializing a buffer specified

as output parameter for a Win32 or CRT API. This typically means that the specified

output buffer size is incorrect.



To debug this stop:



$ .exr parameter3 - to display the exception information;



$ .cxr parameter4 followed by kb - to display the exception context information

and stack trace at the time when the exception was raised.9Unexpected exception when trying to find heap block size.&Address of the heap block being freed.Heap handle.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if we get an exception while calling HeapSize for a heap block

that is being freed. This typically means that the specified heap block address is

incorrect or the heap is corrupted.



To debug this stop:



$ .exr parameter3 - to display the exception record;



$ .cxr parameter4 followed by kb - to display the exception context information

and stack trace at the time when the exception was raised.0Freeing memory block with invalid start address.$Address of memory block being freed.&Expected correct memory block address.	Not used.	Not used.{This stop is generated if the program calls VirtualFree (MEM_RELEASE)

with an lpAddress parameter that is not the base address returned by

the VirtualAlloc or VirtualAllocEx function when the region of pages

was reserved;



To debug this stop:



$ kb - to display the current stack trace, that is calling VirtualFree.

The probable culprit is the DLL that calls VirtualFree.2Unmapping memory block with invalid start address.'Address of memory block being unmapped.&Expected correct memory block address.	Not used.	Not used.qThis stop is generated if the program calls UnmapViewOfFile with

an lpBaseAddress parameter that is not identical to the value returned

by a previous call to the MapViewOfFile or MapViewOfFileEx function.



To debug this stop:



$ kb - to display the current stack trace, that is calling UnmapViewOfFile.

The probable culprit is the DLL that calls UnmapViewOfFile.<unexpected exception raised in threadpool callback function.Exception code(Exception record. Use .exr to display it&Context record. Use .cxr to display itNot usedThis stop is generated if a callback function in the threadpool thread is raising an exception.



To debug this stop:



$ parameter1 might be significant for the type of exception. E.g. an

exception code C0000005 means Access Violation.



$ .exr parameter2 - to display the exception information.



$ .cxr parameter3 followed by kb - to display the exception context information.code in non-executable memoryAddress being accessedCode performing invalid access)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from

an address that is non-executable or free.



To debug this stop:



$ u parameter2 - to unassemble the culprit code



$ .exr parameter3 - to display the exception information



$ .cxr parameter4 followed by kb - to display the exception context information

and the stack trace for the time when the exception was raised.Creating executable heap.	Not used.	Not used.	Not used.	Not used.gThis stop is generated if the application is creating an executable heap.

This can be a security risk.Allocating executable memory.$Page protection specified by caller.	Not used.	Not used.	Not used.hThis stop is generated if the application is allocating executable memory.

This can be a security risk.@Attempt to execute code in non-executable memory (first chance).Address being accessed.Code performing invalid access.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from

an address that is non-executable or free.



To debug this stop:



$ u parameter2 - to unassemble the culprit code



$ .exr parameter3 - to display the exception information;



$ .cxr parameter4 followed by kb - to display the exception context information

and the stack trace for the time when the exception was raised.8The priority of this threadpool thread has been changed.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.Current Priority.^threadpool thread (%x) having executed Callback (%p) has an altered thread priority (%i -> %i)ZThis stop is generated if the thread priority is changed when it's returned to threadpool.8The affinity of this threadpool thread has been changed.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.Current affinity.cthreadpool thread (%x) having executed Callback (%p) has an altered thread affinity mask (%p -> %p)ZThis stop is generated if the thread affinity is changed when it's returned to threadpool.2Unprocessed msg in the msg pool of current thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.\threadpool thread (%x) having executed Callback (%p) has outstanding window message (%x: %x)This stop is generated if any message left as unprocessed when this threadpool thread

is returned to the pool. It's dangerous since it will be processed in a totally different

context./Unclosed window belonged to the current thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.ithreadpool thread (%x) having executed Callback (%p) has valid hwnd (%x: %s) which could receive messageshThis stop is generated if any window is kept alive when this threadpool thread

is returned to the pool.$ExitThread() on a threadpool thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.This stop is generated if ExitThread is called on a threadpool thread.It's forbidden since 

it will make system unstable. It will cause resource leak, hang or AV.KThread is in impersonation state when it's returned to a threadpool thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.This stop is generated if call back function change the thread token to impersonate another

user and forgot to reset it before returning it back to the threadpool.6A function which requires persistent thread is called.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.Some Microsoft Windows APIs need to be called inside a dedicated or persistent thread.

In the threadpool you should generally avoid using thread local storage and queuing

asynchronous calls that require a persistent thread, such as the RegNotifyChangeKeyValue

function. However, such functions can be queued to a persistent worker thread using

QueueUserWorkItem with the WT_EXECUTEINPERSISTENTTHREAD option. A kb in debugger will

reveal the caller.%Thread is in dirty transaction state.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.Transaction Handle.eThis stop is generated if call back function forgot to close or reset the current transaction handle.?This threadpool state has unbalanced CoInit and CoUnInit calls.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.Balanced Call counts.RThis stop is generated if call back function calls CoInit and CoUnInit unbalanced.The parameters for the timer object are inconsistent. Period should be 0 when WT_EXECUTEONLYONCE is specified when creating the timerPeriod specified.Flags specified.	Not Used.	Not Used.This stop is generated if the period to signal the timer is not zero when the timer is set to signal only once with the WT_EXECUTEONLYONCE flagKThe loader lock has been held by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.This stop is generated if the loader lock is held within the callback and is not released when the thread is returned to the threadpool.KThe preferred language is set by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.This stop is generated if the preferred language is set within the callback and is not cleared when the thread is returned to the threadpool.LThe background priority is set by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.	Not Used.This stop is generated if the background priority is set within the callback and is not disabled when the thread is returned to the threadpool.)TerminateThread() on a threadpool thread.	Not Used.	Not Used.	Not Used.	Not Used.This stop is generated if TerminateThread is called on a threadpool thread. It's forbidden since 

it will make system unstable. It will cause resource leak, hang or AV.BThe stack was unwinded when asynchronous I/O operation is pending.*Address of stack variable used in the I/O.Current stack pointer.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.iThis stop is generated if the application issued an I/O operation

that uses a stack variable and has not waited for the I/O to complete,

thus leading to stack corruption.



To debug this stop:



$ dps parameter4 to display the stack trace when the I/O was issued.

Parameter1 indicates the stack based address and parameter3 the thread

that issued the I/O.CThe stack was corrupted when asynchronous I/O operation is pending..Address of the stack variable used in the I/O.Current stack pointer.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.iThis stop is generated if the application issued an I/O operation

that uses a stack variable and has not waited for the I/O to complete,

thus leading to stack corruption.



To debug this stop:



$ dps parameter4 to display the stack trace when the I/O was issued.

Parameter1 indicates the stack based address and parameter3 the thread

that issued the I/O.1Using a freed address in a pending I/O operation.Address used in the I/O.Address being freed.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.This stop is generated if the application issued an I/O operation

and freed the memory used in the I/O before the I/O completed

thus leading to memory corruption etc.



To debug this stop:



$ dps parameter4 to display the stack trace when the I/O was issued.

Parameter1 indicates the address used in the I/O. Parameter2 indicates the address

being freed and parameter3 the thread that issued the I/O.YAn I/O status block (OVERLAPPED) is reused while associated I/O request is still pending.-Address of the I/O status block (OVERLAPPED).$Original thread that issued the I/O.$Stack Trace when the I/O was issued.	Not Used.kThis stop is generated if the application reused an I/O status block (OVERLAPPED) while an I/O request

using that I/O status block (OVERLAPPED) is still pending.



To debug this stop:



$ dps parameter3 to display the stack trace when the original I/O was issued.

Parameter1 indicates the address used in the I/O and parameter2 the thread that issued the I/O.KUsing an unsupported flag, FILE_ATTRIBUTE_NOT_CONTENT_INDEXED on CreateFileReturn Address.	Not used.	Not used.	Not used.9CreateFile while writing %hs%ws with flags %08x %08x %08xOld version of the MSDN erroneously documented CreateFile as supporting FILE_ATTRIBUTE_NOT_CONTENT_INDEXED.

If this flag is intended it should be set using other API functions such as SetFileAttributes.



$ ln Parameter1 to find the caller of CreateFile.A heap allocation was leaked.oAddress of the leaked allocation. Run !heap -p -a <address> to get additional information about the allocation.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.jThis stop is generated if the owner dll of the allocation was dynamically unloaded while owning resources.A HANDLE was leaked.}Value of the leaked handle. Run !htrace <handle> to get additional information about the handle if handle tracing is enabled.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.This stop is generated if the owner dll of the handle was dynamically unloaded while owning

resources.



To debug this stop:



Run !htrace parameter1 to get additional information about the handle.An HKEY was leaked.Value of the leaked HKEY.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.mThis stop is generated if the owner dll of the registry key was dynamically

unloaded while owning resources.!A virtual reservation was leaked.Leaked reservation address.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.tThis stop is generated if the owner dll of the virtual reservation was dynamically

unloaded while owning resources.A BSTR was leaked.iAddress of the leaked BSTR. Run !heap -p -a <address> to get additional information about the allocation.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.jThis stop is generated if the owner dll of the SysString was dynamically

unloaded while owning resources.*A power notification was not unregistered./Address of the power notification registration.XAddress to the registration stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.xThis stop is generated if the dll registered for power notification and was dynamically

unloaded without unregistering. 555P0181@1H1P1X1`1113?4G567777777788%898G8W8k88888888889999'919>9H9^9e9o9}99999999999::1:::X::::::::G;S;`;o;~;;;;;;<<G<_<p<v<<<<<<<<= =&=/=;=C=I=q=}======
>>+>:>I>Q>[>e>y>>>>>>???1?7?z??????????`:0D00001#1)191H1O1`1k1r111111111212h2t2z2222222223333#34 4.4=4F44445 585=5O555555666 6)66767d7777*8?8]8i8z888>9X9s9999===E?pg112899::;;22N2~2222223334(4H4N4W4\4b4|44444444445\56a7z777M8e9u9z9999999999:::%:.:{::::\;;;;;;;;;;K<<<<<<<?=x??0000&0/0E1O1V1]1f1o13)4J44K6[6a6g6v66666666667
7x88M<<<<<<===(=1=I=U=^=g=p============	>>>$>:>C>L>U>^>t>}>>>>>>>>>>>>>?(?-???H11/12225~68899`:::*;D;l;|;<<<<<<=m=w====0
0000'1,161h1m1w1111111'2G2L2V2e2222222223333?3D3N3]3}33333333334&4+454D4d4i4s444444444*5/595n5s5}5555556
66#6C6H6R6a6666666666777;7@7J7Y7y7~7777777778
8-828<888888889
999$9)9.949:9@9F9K9P9V9\9e9m9v99999999:
:: :.:o::::::::::;;2;h;y;;;;<<Z<`<f<s<y<<<<<<<<<<<<<<<<=
===!=*=2=;=D=====0>B>>>>?"?,?2?<?X?b?h?m?w?0011#141?1H1Y1l1w1112
22O2Y2n2u2~2222222233O3l3u3~33333444 4)43494a4m4s4x44444445
55C5I5T5555556A6O6[6f6::r;|;;t<<<<<<<<<===)===X=]=b=l==========>8>?>>>>>>>?t?~?????>0y000000	1111~2222233353J3U3n3333333344444466666667727G7N7T7777888899l;;<<<<<<=%=0=;=A=P=i===========>$>>>I>T>Z>i>>>>>>>>>>	???5?>?J?T?\?b?h?r?z???????????????00
0000(000<0F0N0T0Z0d0m0y000000000000y1?88888888899)9/9E9K9a9g9|9999999999999:::!:-:4:>:G:N:X:g:t:{::::::;<;I;;;;;;<:<D<e<o<<<<<<<==&=/=>=D=M=U=d=u=============
>>">,>8>V>s>>>>>?-?9?B?I?O?Y?c?j?p?z??????????<0@0D0H0L0000000011A1M1c1o11111111122-292P2\2s2222223e3o3w333^4444O7U7q77778888888899999$9+92999A9I9Q9V9[9`9f9p9z999:::":.:`:l:x:::$;;;;;;;<<<"=a==?:??`.0001151I1f11112,2B2[2222223
4{455u67"7^7~789:Q:o:Y;;<=>?3?b??py0031c111122.333444#5Z55"6667O77888888:F;L;t;~;;;;;;;<	=*==='>q>>>?? h07111K2}22233 4n445o555676\6F7B8Q99::W:~:::;;w<<<=8==>!>C>>?%?t???0L0
1F1N1`112d2}222223'334444444444455555!5)5-5K5P5Y5b5555555555566)666a6j6q6666666677A7O7U7^7k7u77777777777777
88n8y8889,929I999999999:::7:G:l::::::::;;;;S;[;a;r;;;;;;;<<*<0<G<R<]<c<<<<<<=====>w>}>>>>?.?F?w??????@S0[0c0k00000000011+101P1U1v111111111122"2-2u222222222222222222222222333!3'3e3p3u333333.4D4P4V4a444445W5d5n5x555555555566$646j6t66666666667	7
7777!7'7+71757;7?7D7O7T7]777777777777777777778	88"8-82898@8G888888889-9D9Z9n9u999999:::: :&:S:^:g:t:z::::;^;;;;;;;;<<"<(<-<V<m<t<z<<<<<<<<<=&=-=<=A=z==>i>>
?/?6?=?D?K?R?Y?v??????P0
000.0?0F0L0Q0}000000011*141111132`2t2222
33O333334	4v44445A5v555556626=6E6J6v666,7>7D7I7N7m7x7~777778>88888889
9,979G9N9T9Y999999&:,:A:b:p:~::::);~;;;;;;<0<l<q<{<<<<<<<=%=3=8=\=n=v={====.>>>E>K>Q>t>>>>>>>?q?????`+01000	111.191>1J1V1a1f1o1Q2z22223!3-33333
4^4e4z444455#555:5?5s5556S666662777777888)8.8;8G8Q8\8g8s8}88888889+9=9B9G9L9R9]9c9h9n9|999999999::R:f:::::';1;k;;;;;<<@<<<'===$>G>>>??p 02z22W3344445~5556,6666&7:7S7778%868K8^88.9x999:8:]:{:::::,;J;y;;;;+<H<p<9=I=d=i=w=|=======%>5>U>>>>??3?w??????,G0W0w0000/1:1z122:222223W3_3e3k333334,484A4L4S4i444444444445
55&555555555666[6b6g6p6v66666777*70757@7T7w7777777728B8M8V8c8888888888999)9;9r9999999::&:0:7:I::::1;;;<2<E<====	>O>d>p>>>>?
??,?8?L?Q?j?????40
00%000>0H0e0r0}00000$1,191D1J1P1n11111111122%2,2D2s2222222222333'3B3O3Y3b3m3s3~333333'4Q4{444445,5\5i5555K6{666677$848B8H8N8`8!9'99999::*:6:::::;;;B;G;N;`;g;m;;;;<?<<<'=-=L=S=X=b=============>>+>f>>>>???????1070C0J00000000$1B1_1k1r1111111122223333'3L3W3^3z3333334 4'4M4X4r4444444444%5G5O5`5h555555555666616=6G6g6S7798S8l88888889	99+949>9m9u999999:A:L:::::4;V;k;q;w;};;;;;;;;=====
>)>B>>???)?5?@?w??%0n000111122234 525^555666666477%9[99_::::::::;;';1;<;G;R;];h;s;;;;;	<4=M=\=k=y=======>>->A>U>i>~>>>>>>>??.?>?N?^?o?v??????????D00"060N0S0X0]0c0t0{001,111112"282?2S2z22222223I3333334$464@44444445$5Z5i5q555556>6S6\666666666Q7c7n777777777777788$878E8[8t8{8888888888889
99*969O9j9y9999992::::::;;@;^;;;;K<<<<<<<<=>===@>O>i>y>>>>?"?.?;?J?Z?g?q????00$0.0001$111@1P1]1g11111
22$22233s3333n4z444,5855556O6[666
77'767H7U7^777777
88888888859I9V9e9w999:::(:::G:Q:::;c;o;;;<<<<======>4>?>a>>>>>>>?0?;?c???????050@0e00000001:1E1p11111252_2w2222222V3c3z333344d4q44444
55q5~555566&6s666666R7`7i777778m88888'9<9M9W9o9|999h:t:::::;#;.;u;;;;<=<T<c<<<<<=E=u====4>_>>>0?F?L?w?????00A0d0000000011K1_1g111112[2y2222%3Y333334.4I4a4|444415U5`55"6@66666M7e7|777-878D8M8d888@9P9z9999:>:]:::: ;1;6;J;h;v;;;;;;<<#<-<T<<<<<<!=.=F=Q=[==>@>n>>>
?8?i???0@0z0001I1y11111111;2u2223?33334X4444595j5556Y6666 7]777!8888L9999%:X:::;F;;;	<@<w<<<<<<B=P=r===>$>?>>>>?)?D?Y??	00001B1Z1h111e2n22222223P3334404V4s44444444555'5,5N5|55555555666#646?666788e888888	9:B:X:::A;[;d;;;;
<V<|<<<<<<<<<= =@=`=|=====> >@>`>>>>>>>>>? ?(?,?H?d?h?t??????? \080X0x00000181X1x11111282X2x222222223(3H3h333333334$4(4@00000X0\0`0h0l0p000000(1,10181@11111111$2(2,20282@222222(3,30383<3@3333333,4X4\4`4h4l4p44455555 5p5t5x55555555555566666666 6$6(6,6 @>H>L>T>X>`>d>l>p>x>|>>>>>>>>>>>>>>>>>>>>>>????? ?$?,?0?8?<?D?H?P?T?\?`?h?l?t?x???????????????????????0800000 0(0,04080@0D0L0P0X0\0d0h0p0t0|0000000000000000000000111111$1(10141<1@1H1L1T1X1`1d1l1p1x1|111111111111111111111122222 2$2,20282<2D2H2P2T2\2`2h2l2t2x2222222222222222222222233333 3(3,34383@3D3L3P3X3\3d3h3p3t3|3333333333333333333333444444$4(40444<4@4H4L4T4X4`4d4l4p4x4|4444444444444444455555 5(5,54585@5D5L5P5X5\5d5h5p5t5|5555555555555555555555666666$6(60646<6@6H6L6T6X6`6d6l6p6x6|6666666666666666666666777777777777777777778888(80848<8@8H8L8T8X8`8d8l8p8x8|88888888888888888888999 9$9,90989<9D9H9P9T9\9`9h9l9t9999999999999999999:::$:(:4:8:D:H:T:X:d:h:t:x::::::Ph8l8p8t8x8|88888888888888888888888888888888899999999 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9h9l9p9t9x9|9999999999999999

Anon7 - 2022
AnonSec Team