MZ@ !L!This program cannot be run in DOS mode. $m Q % Q Q Q Q Q9 Q Rich PEdW" VL ) `AD$(.`8 rr.textMTV `.rdata&pZ@@.datat@.pdataT@@.rsrcp@@.reloc@BH\$Hl$VWATAVAWH E3AHHEHtHt HZ HvH\$XHl$`H A_A^A\_^D93LCSLL$PDB3HD9;HDG;kES(LC LL$PHpk'S8LC0LL$PHRk SHLC@LL$PH4kSXLCPLL$PHkSxLCpLL$PHjShLL$PLC`HjyrH WbD$PDBaHHuICL kAL+HIHtA ft fHIuMuHfD!HS`HÈD9#D3DqLCMtH a3aLC MtH a3aLC0MtH a3aLC@MtH oa3aLCPMtH Wa3aLCpMtH ?a3oaLC`MtH 'a3WaH\$WH HHHHz 0`H_ LCMtH `3`LC MtH `3`LC0MtH `3`LC@MtH w`3`LCPMtH _`3`LC`MtH G`3w`LCpMtH /`3_`HÈ;HHg 3H\$0H _H\$Hl$Ht$WATAUAVAWH E3HMELHپAHH;s"fD9(t fD9(t HH;rHH;rA;v-eH %`3DIHI0^IHuCAwM&:I5fD9+t4HHI^;w fD9+t HH;rHH;rIH\$PHt$`Hl$XHfD,IfDlILlH A_A^A]A\_H\$Hl$H|$ AVH@HH s#^E3S3HL$X^D$XH s>^3H cA8G)DH 3GDH 3GH D3FD3H FDH 3FDH 3FHL FsDt$0EFLt$(Htgl$ HfaL !EFHvH rH AL9qtdAHAH \tH ËHL9tu1HfD0HfDpHLpH L5HL pwDt$0HfLt$(AHωl$ `x L QAH4{H -wHL qDt$0HfALt$(HDD$ `HvL GDt$0HfLt$(AHD$ @g`3H\$PHl$`H|$hH@A^H\$Hl$WH H-H`X= qt4HL$@{[ qHi'HD$@H+pH;"%pH3t(3L)MtH9)wL;wHH;rڋW3Ʌ3L(`MtH9(`wL;wH;`H ZȸQkd+;`s^tHH eZADoAH AE3ILAQ JfZ 3H\$0Hl$8H _H\$WH eH%`t;rH eY$H oYHH ko<YH\$0H _H\$Ht$WH eH%`HHu3H o3YH9u%H=uH5H=F|˅t:LoIH9t H;rH`YH`IaICH`ICe@HXHHREH3H$L$ H3HD$0L$$HL$(L$8HL$ UH$H39HHL$HXAttH8tIHL$`HZeHT$H3HD$@HT$8HD$0HT$(HD$ L v`LH`H?3HXAuHHHOH%@SVWHHJDH3H$YAHHكds3E3HT$@AXAITȅxukD$pd3t$t;v=2u4H LD$0Hd$ A3kTȅx5|$4u 3Ʌx!t$(LE3D$ HH"TȋH$H38Hİ_^[H\$Ht$ WHH[CH3H$nHHHdsBHd$ DNYLD$0H΍VSDHkD$8d -3H5(YH;vK>uAHd$ LD$0AXHAQvSDxgHXH+D$8H=w AE3ExCHHD$(H%D$ H;LHHBE3HHRDAH$H36L$I[ Is(I_HHXHHWH AHPEHPL@HR=Eu-HT$8HL$0RtDLD$8HT$0HR؋H\$@H _LIKSVWH0AIS HICEICMC HISCR=Eu5HL$PH$Rt#HD$XDLD$hHD$ HT$PHR؋H0_^[H\$Ht$ WH DIHHB@HArHHHJ(HOHHHL$8H\$0sHHD$0t HHL$8AEuAHT$0HL$8EAȸQkd+; <s=t =u2ۊH$0H3"L$@I[Ik Is(I_IH;v3HAhHah@SHH-H3H$HJHL$0=Hd$HHD$0d$XLD$@WHD$PD$@0H D$`j>E3HT$p3EA@=؅xH$H9H+$H rHkCHܷHݷHη!=H :=eH %0LI~3҉D$ DI@J]=H$H3i!H[HHXHpHxL` UAVAWHHHMMHH9uHtoE3FH}HDD=u xxNFHuFH9}@u@H!}LMD$(HU HEE3|$ H<y2t 3L$I[ Is(I{0Mc8IA_A^]ËH}%LMHUE3<L$(HΉ|$ I<HMy3AtLǺ$HEAH׉HpHEHtHMyA3HMH}HH HG_HEt HH s G to3HM;E3HOAL;3҅yDkHL$(Hd$ MM;HPHuHO;D.HAtcEHEOHPLEH3c;Ew-3EHM#HPLEED}ܺ4;yHPC;yHh@H@HHH@HHGH@HHH@HHxH@HHHuHH@H HLPHH0HG0LBhoGHhIhHM;vH0PtHHiLEAHUHHD$(H\$ H=Hd$ HO8L *HXL H/:HH (:9HH H8H9 tI)HH HPHXHe8HLI[IkIsI{ AVHPeH%`H;H0uZHHLICL +EIcH7EIC IcICIc+#H\$`3Hl$hHt$pH|$xHPA^HHtHHG8HPSHHXu HHHS@HK Hw<HtHK`HtHvX<Hc`3HO88HuLhI6FAHV H;HVHN H8<HtHNHt H;H6I;uH3uH Xj7H8LHPI9@H9uLH +IP ;7HO17HO7HXHt Hn;HHHHHHI(D3iH;uH7S)LI[IkIsWATAUAVAWHP3E3E3HIDHL;v_ɰ@t?HFICL AI!{H.CICHCI!{ICMCLO At 39HcH#HHtD pDAD"uAHHGt HCu HFHHHOH%H=uOHK5HH9t#HxHOH9uiH99udHHHg8HK[5HDEHs@uHHHu]HK5CuHVH )HHOAHHH&HKH4HHw@Ht HG(HAKu HFHHHOHu HNHHHG(H+HEHG HHL MHHEu!AuEt3LG@HO 2HLO@LW tHHHPIRHZLJCu IAHIHOͫH%BHBICL {?M!CH?ICH]?M!CICM!CL3hHHt[ pHȋHHHHtHP L3H`u@t RH\$`Ht$hHP_LI[MCUVWATAUAVAWH`E3HMIDLL;v`ݫ@t@HALICHJ>M!sANICH'>M!sICMKL <At 3HL#IHHtD hHAHHHHuAHHhAthH{LE@M;HM M+IϺL}@Hu)LFHE@uHHHOH%HGLHtH}@HЀMAI LH}HNE0IHHNHD$X30L$IILL;sM!L;v+At3H|$XuMJ 7L+Ht,Ht HHHE LHH@LL$PH(3HPH$MD$HD$ LL$PAu0LL$P$A%EHD$X$Ht2HtHH1HPHP H@LJ $B(6HPMFA0$MFHPE3AՉD$ /HHtHU3fMHtYHtHM`HtH43He`HHJHtHHrHPHU H@HE`HB0Mu/Hu*H$uHPLEL|$ HL3H`MuAt IH$H`A_A^A]A\_^]HHXHhHpHx ATAVAWH IMI܋3HHuI hHȋ{HO-IHjLHtHX@HO-Mu4HPMG.HI;uIH@HuHH`I;u@t HH\$@Hl$HHt$PH|$XH A_A^A\H\$WHP=?Hu3H ¹,";H H3H;tHH HHH;u;tMH<DHT$HL 9Hd$@HT$8H9Hd$0HT$(H9HD$ H #=,H\$`HP_H\$Ht$WH 3HHtPH H`H\$03Ht$8H _HHXHhHpHx AVH Iq3HHtp pHȋ^Ht4HK+HHHHDDEHKj+Eu HPHuE3LEh,DH`AH\$0Hl$8Ht$@H|$HH A^̸H(HtHP+H(H(HtHP+H(HHXHhHpHx ATAVAWH MMD93HHD pHA HON*IHHHt&Ht HHH@ H@L` @HO*Hu*HPE3IHjMGMAH*H`H\$@Hl$HHt$PH|$XH A_A^A\H\$Hl$Ht$WATAUAVAWH0MMD:3HHD `HA!HKO)IHL$HHt>HtHHHPHP H@MtHB IMtB(A@@HK(HuHPMEML|$ A)@H`@H\$`Hl$hHt$pH0A_A^A]A\_H\$Hl$Ht$WATAUAVAWH0EMD*3HHD pHAHO?(IHD$HHt4HtHHHPHP H@Aij#B(A ʼnB(@HO'Hu/HPE3IHEMGDl$ EAH(H`H\$`Hl$hHt$pH0A_A^A]A\_@SH 9HHtHHc'HKc]'H [3H(Ht H`H(LI[IkIs WATAUAVAWHIIPIICHHD$ A@MCH'Ax)H$@uHuH|$XHH3Ht$`Et9Hu-HJHAUHD$(HtL$8HD$(HD$@D$8tLL$8MHHP[HHPHHHHLڃ`H``zͫtH}ztL$0mHJHBH+H@Hu'HAHHD$PHtL$0HD$PHD$8D$0u)AISIHD$PHtl$0HD$PHD$8D$0tLL$0M3HH@SH HHHH3HCLCLKCͫCHuHJJDHtH$HCHcH [HHXHhHpHx AUAVAWH MHHAH#LIo@I;HuHEH;HLŋILHtrLp@LIMHHNHhHQIE H9 t)HHPHHAHNu@uMǺII3H\$@Hl$HHt$PH|$XH A_A^A]H\$Ht$WH IIyHAHHHNHHGH9yuaH98u\HHAHNͫAK=ͫuLCHKHHH\$0Ht$8H _ù)H\$Hl$VWATAVAWH0IHHAEHAtpH$H;~MH=HG@H;0HhH;#tHNHt Hr"LLHHHH$AHLHEHxHHHPHD$pLL$xHD$ LFAD$pLGHPE3A׉D$ ztiLL$xLGHPAUtLLFHHI;w LV#OAuHFкH+LH 8=LHH LH3H\$`Hl$hH0A_A^A\_^H\$UVWAVAWHpH H3H$`MAIH+A HD$ L$HLȅ$H$H$H;t~H+AhLD$@HD$ HI軠ȅxVHT$hH;rLD$pLL;v?I;r4Hn+ALD$0HD$ HIuȅxH\$0{AAH$`H3 H$HpA_A^_^]L EL;rdL;r_HAIHL;HGD:u5HH;rMII;s-AHHH;uHI;r HD:uHI;r3H\$VWAWH0HHD$ D$PHd$`HtkHtfH"eH%`HpHLD$`3DzAD|$ HH;tH;x0uH@`Hd$PHEtHT$`AD$PH\$XH0A__^H\$WH0HHHt|HtwHˆ.y\$(D$ eHKH(y\$(D$ >H{ t"HHƶy \$(D$ 3, \$(D$ }3L *L**J]iH\$@H0_@SH0HHt,D$(D$ 3L )L)J]3HHtD$(D$ H׬HtD$(D$ HHtD$(D$ zH2HvtD$(D$ VH^HRtD$(D$ 2HH.tD$(D$ HH tD$(D$ H§HtD$(D$ HHtD$(D$ HHtD$(D$ ~HFHztD$(D$ ZH0[H8HtIHtDHz t9y03D$( L 9(D$ XL'J]1 23.3D$( L (D$ OL'J] H8@SH0H/H_t,D$(D$ {3L 'Lo'J]3H@H tD$(D$ HoHtD$(D$ HHtD$(D$ zHʨHtD$(D$ VHHtD$(D$ 2H"HrtD$(D$ HNHNtD$(D$ HZH*tD$(D$ HHtD$(D$ HHtD$(D$ ~HޢHtD$(D$ ZH0[H IH\$LL$ HT$UVWATAUAVAWHpL3E33MLHMtbH$H$H$HD$HIHT$@IHL$8H$HL$0H$HL$(H$HL$ H!\95P95N1DH%Hp~Hs HHsHH ]D950u!藈0uH ^@}H$ }L$L$}H=}}} x}L=}L%}L-}H}  H$H$HDLD%3ҍJ]IeH %0Li%H$3HD$hLH$HD$`H$HD$XH$Ll$PHD$HH$Ld$@HD$8H$L|$0Dz]HD$(A@AωD$ LL9%3AA_u.ƏHtHHxXHt`L!pX Ȍu uD .A]H njEtDLLB%3A7!ČHyDLd%3A H$HpA_A^A]A\_^]LSVWATAUAVAWH0HH3H$ ML$IL$DHE3E$E EEAD9=D9=k.HHI HAD99tAHD9(HD‹HiD9<uHuEL$3ҍK]C DcEC tD{H ]7D9=-u8q-u)H 8L$3ҍJ]B3A`H zMz z OzzOzHzHYI%HzzL-KzH=LzL5MzL$L5FzL$L=?z3f=LC`McL$$H E3xHH;wu z$fDS($L$y)L xL#3ҍJ]DŽ$ AXL$L$L$L$H$H H$HtfD9tHH$HH$AȿWHDMtxH+IMMtxH$HIMH$aHH$HHH$IÉWFHu $E3D9$t D$sC tHwH$DŽ$HwH$A`u C eH%0H$H@$H$HD$xHHD$pHCPHD$hL|$`HC@HD$XLt$PHC0HD$HH$HD$@HC HD$8H$Ht$0HCHD$(L$ D LvH w$E3L wL$L$L$H$IH$HtD8tHH$HH$AHDMtx H+IMMtIHI$IAD$D$L$I;s|I;s F<D$HsFLL 3ҍJ]q L vI;sF<$E3DxL 3ҍJ]< E3L$L$H$A@eH%`D8@H$H$HCH$H$HC H$H$H$HC0H$L$HC@H$L$HCPH$DŽ$ !D$$L$0L$(DŽ$8HDŽ$@AVrfL$HH$H$PH$  1.A t(GH$HtHLhXHt`L@X ;H T6 39$tHELAt3ҍO] L!H5 yDLt3ҍO] ̋$EL3ҍJ]m  3H$ H3H0A_A^A]A\_^[H\$Ht$WH @H 3HHNHp8HxH;HH Q HC8HHLAIDθWIHI;DGExEDMt1M+H >H+KHtft fHIuMuHAzMtf2EyDL HL3ҍJ]7 H H9s8t HGHH+H@H VsH C sK sC0Hy H9Ht)HHKHXk HT H\$0Ht$8H _H\$Hl$H|$AVH H H- 3H;txL5r3LM+ƿIIDH9uMHrH=^ruBH=\ru8H=Zru.H=Xru$HS8HtH X t H3H;uH\$0H|$@Hl$8H A^LI[IsWH0HI3HI!A8u{HHH+ MCHAHHICkЅxj|$PtcH+ H4H}qHD$ HLD$XAH.Ѕx-HD$XH#I9XvI Aa HI9@IBHH\$@Ht$HH0_@SH0HHt@Hd$@LL$HD$(HT$@E3D$ HHD$HNxoHD$@H.HD$@XH HD$@HH9Qt)HHPHAHT$@HL$HHHHHBH HH0[H\$Ht$WH 3HHu35HIHrHHH;KvHHCH 0H;KwHHKHH\$0Ht$8H _LD$LL$ SVWH 3HBH=HWGx5HZHHLL$X3xHH;wu@<3@<3zHtH _^[H\$UVWHHPHH0Hy%HHM'LM83LE3HM8 HKMHHu e HU H{U uNuH YncHHK HEH *n<HH$ CHH mu AHM DL$(HhHL$ E3HH mHHM8 H\$xHP_^]H\$UHH0HHHMoLME3HUHcHMYHH#mHM1LME3HUH%HMHlHlHMLME3HUHHMHFHlHMLME3HUHxOHMHHlHM{LME3HUHo؅xHMgHXlH\$@H0]@SHHH3H$pLHD$`LL+LD$`3DIHtCftfAIIuMuIfAHL$`Hf9t HHuHtLHH+HD$`HHH+t1LLL+MtA ftfIHHuHuHfH Hkf$fjH\$@HL$PHL$8HT$`H\$0E3D$(?E3H\$ *HL$PHEHH$pH3HĀ[H\$H|$ UHl$HH6H3HEGHE H jHHME3HL$(LMHM'HL$ HHuUX9]uM3ɊT'tT ˍ r sbeLED HHM;u HtMH z3HMGH3L$I[ I{(I]H\$Ht$ WHpH>H3HD$`HH iDL*HL$@HHHD$@3Hf9PuUAT$(HD$@HD$ HHE3HkËHL$`H3?L\$pI[ Is(I_HHXHhHpHx AVH 3ۅt xHtMuy @  R:A;8uɃ(vIpH H^H^H^rHF H+HFF F$F(rHF0hH+ƽHFF4 H y H F0DMx~F8 ~NH~FX NhFx   HIHA @ I0H0A@@@IPHPA`@`IIpIHHuHHH 0IHA @ I0H0A@@@IPHPA`@`IIpIHHuH HHIHA @ I0H0A@@@IPHPA`@`IIpIHHuH LHJHB @ J0H0B@@@JPHPB`@`IJpIHIuH }8AwH ̉,w @;sdHHL wH+HFvAHLv0IpAHIBAHAHQMM;uH @Z;sHHH+HNH*H\$0Hl$8Ht$@H|$HH A^H\$Hl$Ht$WATAUAVAWH 3ILDDHMA;AHr u!MxIp IMpHMIIMuMpuMxuIpHXAA;fhH HH;LD9CAD90D9#8zH `FEEH {AzN zF(zN8 zFHzNX zFhzNx {HHI@ A H0I0@@A@HPIP@`A`IHpIIHuHIH &HI@ A H0I0@@A@HPIP@`A`IHpIIHuH IHHI@ A H0I0@@A@HPIP@`A`IHpIIHuHƘ HINHF @ N0H0F@@@NPHPF`@`INpIHHuH sMtUA $IGHσH;A?AG ,% AGAGMANIA;;L%rL<@C|ujH $6H=r8HK;lu'HMCDHMECDHH?L;uH фA;vr  H\$PHl$XHt$`H A_A^A]A\_LD$LL$ SUVWH(3HBH=HWGx5HZHHLL$hJxHH;wuf,^f,^zHtf.H(_^][LSUVWATAVAWHPHH3HD$HICE3MMcMMcMKMcBHISICED$>x@HT$ LD$(E3H,x&H\$(HtA3H;t/HcHC|HL$HH3HPA_A^A\_^][Ín;}<H DuAEHHtxE3H=tXHcոLcHJH;wL\H؅H[HMAHUH [K؅y H5[~LMALI[Hq؅\H0[HM>AHUH [؅y H5u[%LM?LZH؅HZHMAHUH [؅y H5ZLM@LZH؅HvZHMAHUH Z@؅y H5ZsLMBLFZHf؅QH-ZHM3AHUH EZ؅y H5:Z3H\$Ht$UWATAVAWHH HH3HE3LHoHfHHf9AuH&Of9{Ef-f9A7f9A-f9A&#f9A0fyJ}3LAHA0HBA AA7@aA*AW@AAA:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA*AP A*A:wA* @*A:wA*@*A:wA* ʈMAH A*A:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA*APA*A:wA* @*A:wA*@*A:wA* ʈMAH A*A:wA* @*A:wA*@*A:wA*AP"A*A:wA* @*A:wA*@*A:wA* ʈMAH&A*A:wA* @*A:wA*@*A:wA*AP(A*A:wA* @*A:wA*@*A:wA* ʈMAH*A*A:wA* @*A:wA*@*A:wA*AP,A*A:wA* @*A:wA*@*A:wA* ʈMAH0A*A:wA* @*A:wA*@*A:wA*AP2A*A:wA* @*A:wA*@*A:wA* ʈMAH4A*A:wA* @*A:wA*@*A:wA*AP6A*A:wA* @*A:wA*@*A:wA* ʈMAH8A*A:wA* @*A:wA*@*A:wA*AP:A*A:wA* @*A:wA*@*A:wA* ʈMAHA*A:wA* @*A:wA*@*A:wA* ʈMAH@A*A:wA* @*A:wA*@*A:wA*APBA*A:wA* @*A:wA*@*A:wA* APDˆMA*A:wA* @*A:wA*@*A:wA*AHFA*A:wA* @*A:wA*@*A:wA* шU3EAHMH3H\$PHt$`H A_A^A\_]H%H\$WH0MLA|3P3H9=Dt?H=/HT8DH9tHL9Pt.AK IHH9uAAHH98uIH\$@H0_MAH @H\t&H LH\$(HL$ MˍJZMHH\$Hl$Ht$ WH03Hu3H Ht9uHuH-0OHA@H}HAHHHAPHA`HOHtH9i tHA(H}PHtHA0HuPHtHAH}PHwHAHYPHcHAhHMPHOHA8HuH;HYXHHl$(DƉt$ L aHH L aHl$(DƉt$ HHL aHl$(DƉt$ H&HL aHl$(DƉt$ H;HL aHl$(DƉt$ HHHL aHl$(DFD$ HHHgL sHl$(DƉt$ HMHD sL wsHl$(t$ DH_Hω ZsH  GsL hvHl$(DƉt$ HH` "sHL >vHl$(DƉt$ H_HHl$(L vt$ DH\HL vHl$(DƉt$ HaHpL uHl$(DƉt$ HvHML uHl$(DƉt$ HH*L uHl$(DƉt$ HHL uHl$(DƉt$ HHL euHl$(DƉt$ HHLL$@Hl$(DƉt$ HHx L$@s@HH bH\$HHl$PHt$XH0_H\$Ht$H|$ATAVAWH`IHeH<%`󛱲AA;u0HoLOIIM9 tHH9X0tL9u @@2tu IuAAu ^E3A+A+A+ A;, AL#8LM L$L,z33x8LL$8E3HyH$x3HdHeHfnL |LH<H<H<H K< y3{}WttoyLD3ҍJ]c3L_ `DǍWH 0HHD3HeH %0HK HIHHKHCH GH GH9QtO)HHPHAHF=qeH %0qHD95D=D3HL$`<t$`H H"FHL$`p yD3HL$` HD$hHyFHD$pHEHD$xHHH$PHEQiHu%D%{TLA׍H]8<Hy*D%z#LDA׹]HzHHE3AY@DH.H3vyD%zLHOHt@ AEljHH +IHHL$PHHL$@qLD$@HT$P3OyDLA׹]3D=)L95y-H y-U?\H D AΉL$0=sHHa@HH@HALúH cHeH %0HQHHPHGZAƅHGHHHX?xt2xk ytXxQxHx?xL x]D$ D95luLALD5l~lyHuLeA׍H]UD95PtH 6D5:D95+Dt H C<H 5H (,"AL$`I[ Is(I{0IA_A^A\H\$Ht$WH IغH;uLËHH\$0Ht$8H _@VH t,u =oR3=HD$8H XH5EHH9pH9AH LD$8HqHT$@HHAHD$@HH;uH WH W=%H Ht,H%H ^ù)HHXHhHpHx AVH 3H  ntLf9MSt?L5iB6fB6HvHuf s  sH\$0Hl$8Ht$@H|$HH A^H\$Hl$Ht$WHPH=$IAHucHu HHHDt#tzL$LŋH3McutL$LŋHH?eH %`eH%`H$HD$@D"H Hl$8\$0 ?H=$H\$`Hl$hHt$pHP_H%eH%`ty -t5t3ø eH%`E3tHt'Ht"JtHt HtDDA AeH%`u3stHD$0H%7eH%`u3stH%H(eH%`tVHt x4t3H(H(eH%`tVHt 8~3H(H(eH%`Lu :3DAL>3M t!AArL] ̺H(H\$Hl$Ht$ WH eH%`Hu n3u`H =t4ՋL>>HI,t#ƒr3L3L΍J]g,t H =Hl$@H\$0Ht$HH _LI[IkVWATAVAWH@HAH+-SHRHMHMHICHMCAL\H+HH_RHD$ HLD$xAI|\L$x3HH|$0H;twHALD$0HD$ HI7\xoLL$8I;u.HMMI診xA?tFL$xH;r73Ht$ LJ]3҉L$ DLJ]AL\$@I[0Ik@IA_A^A\_^HHXHhHpWH H` IIAHH.[u=LL$HLHHx&HL$HHu ;HHT$PHtH H\$0Hl$8Ht$@H _H\$Hl$Ht$WH IIH3ZuV9u #E9v8Ls1HIH+HHIDHD;rԃs Hl$8H\$0Ht$@H _H\$WH0HHYu0d$PHxbH+LD$PHd$ HAH(H\$@H0_HHXHhHpHx AVH H3HHtCHHHH̆HNDwH@AEuEHHaAH\$0@H|$HHl$8Ht$@H A^%H(LHu UH<HT$ HD$(A9 H<AB HD$0H2;HD$8H}L$ DIH$;3H(̸%́9u A 3H\$UVWHl$HHH3HEpHH3HL$ 3DC@Ƽ3HL$`A贼?HD$`HD$Xt{?G$ <LFHO HGHVHL$0HO(HL$@HL$ HD$(HLD$ LD$PLFH\$8D$L D$HuE~vR KHGLFHVHL$ HFHGHD$ HD$PHD$L>t~ G؋HMpH3H$HĀ_^]H\$UVWH0eH %`sHD3HI03lHLD$PH=eH %`3LD$XHSHI0eH %`3ҋt$PHC(DHI0`HD$XHHueH %`3LD$XHHI0+H\$`H0_^]Åxʋ9vHHHi(HE0HNJt)\HDHuHtHH t;7r4rH|/HtH?HHL$ L E3HT$ H}/HHgHL$ dL E3HT$ HD@UATAUAVAWHPHl$0H]PHuXH}`HjH3HEE3AIHUILwDLEHNCHULI΁ͫHVALEC"3Lf8AHIU ;DkGЉUupt|DHBI;w HHH+IIL|$0MBUEŅAŃu Nc 8N 8AfALLA;rօc[LcRHLEAEϋH!B*HLEEI΋HA3AH.MfuMAfMfUU f;vfE‰CfD}pEDHI;w HH褷H+IHLd$0MHMAxZMAfD;s/LCƒu Nc N MfIf;rfD;tEuHrHHK3HMH3_H]PHuXH}`He A_A^A]A\]H\$Hl$LL$ VWAUAVAWH0LDeH %`MHM3HI0HHu H$3H$Aw"ML$II=@H$xbYLL$xH+HLI@xDH$t"L$HH$HwxAuHc.H.I;u3eH %`LH3HI0;H\$`Hl$hH0A_A^A]_^AtHI Hc@,HH ?HcQ,HH\$Hl$Ht$ WATAUAVAWH0H=H3MHDKD;G,sG,AfCMG4HSDO0AEljD$ HZ?GDAwDO@HSDƉD$ HKGLDDOHHH͉D$ >?t@s<uK<uKDg`D$LEI $AEHI3MHSI $EGG4HDO0D$ c>GDHT$pDO@DH͉D$ H>GGLDDOHHH͉D$ >GTHS DOPDH͉D$ =G\DDOXHH{ D$ H=IELkI1$G4LkDO0AEĉD$ IH=GDHT$pDO@DH͉D$ =GE3AH+LD$HwLLD$HIx9LD$HMLL$P׉D$ I3҅9uPfuD$PrHD$XDcHC"L$PHLHcfHD$XHDADt$4HD$PJH@ KH0C @@K0HPC@@`KPHpHC`HKHuHH$LMtLˋ׉D$ x3HM`H3˩HxA_A^A]A\_^[]@UHHl$@HHHHH3HEpA@3IxAIL [A#HU(E8LA@ I؉EAHM HO8HEPI@ HG8HHQUfUHMhDVtDW(W(I@(HL_FAA,G,L_0HG AI,FA+M LEDLU8Vt1Ft8V $tHLL+LE3LUF8V HHEHD$(MHE@HHD$ E3҅TL F AA,EAH9MXH AEHt9HUAH D$0DT$(DD$ LE0V7L Hc E3҅H9E0AEEHt9HUAH D$0DD$(LE0DT$ 6L s H bAEEHt9HU0AH D$0DD$(LEHDT$ 6L  H E3҅LEL9EHAEEHt1HU0LEH AD$0DT$(D\$ 6L LEE3҅yfD9UAA,HHGHW HGAA,o,H+HWG(LChHS`HCXlt ECTL 3 UfEfSTAȃ?H AEEH}Ht:H AD$0HDD$(LEDT$ 55L HE ȅ E EEHt+H ADD$0HDT$(LED\$ 4L b aMAIcQ,EAHiAH;vDiMA+DуuAMAEA,3UHHf#ffAfAfE+fAfA#HEPAI,H}HAH;w HHkLE@H+LE HcHHt$@LEHHHUPI;DLH H2kEHMXLKpH։D$ HJ D@,}3Ʌ>9KPt8McE\LMXLHHqHCh9w#HHcH,HHEPHHH;EHdEfCTLEL] E3Ҋ<F$t D8V L;C0vu(;t;HKDq(HC(HHyLq A,Hy0HCXHtLChHS`HM H3H]PHuXH}`LehHe0A_A^]@UATAUAVAWH`Hl$0H]`HuhH}pH H3HE HILEIHMDIAI;wIHDClH+LEI@H|$0I;wIHH+3Llj]Lt$0+BH HUAHEŋDD$ +D9uLc$8L$8D9uLc<8L<8D9uLc,8L,8H^3HDB@_HF(3HAC,L{0HN <HF HHC8LFhHV`HFXg3t hHFhWH]t+HEE3Ht$(MIHD$ Hf~T(D9}LMMIHe*H ytApuNc$0N$0y|AxuJc0J0uJc 0J 0H<Mu I;H^3HDB@?HF(3HAC,H{0HN HF HHC8LFhHV`HFXG3ɅHFh8wCH]t0HEE3fNTMHHt$(HHD$ wxHFh8w AD;}3HM H3˚H]`HuhH}pHe0A_A^A]A\]@UATAUAVAWH`Hl$0H]`HuhH}pHH3HE(HlILEIHMDIAI;wIHDH+LE I@H|$0I;wIHӞH+E3LLuLd$0(,HEFHUHϋDD$ (uLc<8L<8uLc,8L,8H^3HDB@`HF(3HAC,L{0HN =HF HHC8LFhHV`HFXh3ۅt pHFh_t5HELMIHt$(L}MIf^THD$ /L}HP,HII;LM IMII'H $ uJc J ,(uJc J H<I;H^3HDB@5HF(3HAC,H{0HN HF HHC8LFhHV`HFX=3ۅHFh8w@HELMHt$(MHHD$ If^TlxHFh8w Lu3HM(H3ėH]`HuhH}pHe0A_A^A]A\]@UATAUAVAWHHl$0HHHHH3HEPH\UILMHLHM@DIHHt eH %`LH3HI0)LHu fLLHIr%؅*H3IDËDDkuADHIH;r AՁreH %`NHn3HI0HHu HY]Dz,A7DHLEI;w HHH+]HLHM8MDL\$0L]0MLB fEB( fE uLm HIHH#IL$HE H DfA;Ht}B,MH+MI HHM@ILU $؅}uIcIf3f;us fA;wHtHGLELU L]0H2LEDMLU L]0HM8AEDMAHLHM8AsuHEHHtH8AEueH %`LH3HI0ҴeH %`MH3HI0HMPH3荔HHHHe`A_A^A]A\]H\$Ht$WH@d$ IL:LKAE@,MIpH<H4HHL$0NxHHtLCHHx3H\$PHt$XH@_H\$Hl$Ht$WH Ip3IHH^DB@H耘HF(3HAC,Hk0HN ]HF HHC8LFhHV`HFXt6HFh8s+HMHLOLGɃHw x3H\$0Hl$8Ht$@H _U@UVWATAUAVAWHHl$@HHVH3HE`HIHEH]LfDEDDg fUDeIAI;w HHGH+HLt$@M!HgpH`HelAwHDhHUPL$ AIO4HrH]PIH]PAwELEPIH_3HDB@HG(3HAC, HEPHC0HO ܎HG HHC8LGhHW`HGXt H}PH LF3HDIHUP1bHLF I΋HUPD6HjLFI΋ HUPD$ H>LFI΋(HUPD,HeXE3H 0HUPLEXAwMLEXIsLEXF(HG(HF, `HEPHF0LO Mu3AIvADd$ ItHG HF8HGXHtLGhHHW`HGh8=HV3ɋHUPHMPAwMLEPIHMPHGH_3HDB@یHG(3HAHC, IHK0HO 訌HG HC8HGXHtLGhHHW`ΧGHUH AEG EHEIHG(HEȋEHEHG HEHGXHEHG`HEHGhHELuHuH$HĀA_A^A]A\_^]3H\$UVWATAUAVAWHH@E`LH3Ex IIpLALEHDKAԉ]HIAHHH]PIH]PAwELEPIH_3HDB@>HG(3HAC, HEPHC0HO HG HHC8LGhHW`HGXBt 6H}P3HDB@ӊHLFI΋HUPDcHLF I΋HUPD7HLFI΋ HUPD$ HpLFI΋(HUPD,mHeE3H<0HUPLEAwMLEILE(F(HG(HF, `HEPHF0LO Mu3AI訉ADd$ IHG HF8HGXHtLGhHHW`HGh8H3ɋHUPHMPAwMLEPIHMPrH>HeXH;IE3LmXAwMLEXI)H_3HDB@͈HG(3HAC, HEXHC0HO 覈HG HC8HGXHtLGhHHW`̣L9mX3HDB@dHLFI΋HUXDHYLF I΋HUXDVH-LFI΋ HUXD$*HLFI΋(HUXD,pHMLm0HUXLmAwMLEI7LEF(HG(HF, @HEXHF0LO Mu3AI:ADd$ I8HG HF8HGXHtLGhHHW`NHGh8wEHI͋HUXHMXAwMLEXIHMXx HF3H$H@A_A^A]A\_^]H\$UHHpH3HE(E3HD$(LMHOHD$ 0}}HbLEHeAHd$ HˋHUHSxlLEL9EuSHAHe HHd$ HILE x)LEHMIH;M u ILEHUHI3H$Hp]H\$UVWATAUAVAWH$@HHH3HH8HH@HfDD$FAfT$DE3H\$xH|$pADADžAD3AAT$HLAT$HE3E|$VDt$PEH3蟄HxHHLHD$PLEHADž3Lt$ c|$PA3ED$HMp(ED3H]pH H}xHH H8L HEpL(EH@ADž03Lt$ ͜{HLA0Lt$ 3HDhH_Dl$H̞?HHu )HHH D@DHHt6L$0HDD$(HDL$ LD$LA HH<y\$LD@;DHGًH\$LHt%L$0HDD$(HDL$ LEAM qIHHHt WeH %`LH3HI0HD$`Hu $HULLH ؅HHHt eH %`LH03HI0THEHu HLEH3DE;wo|$HHL$`uAŋ AH HMD$I $A@HHN 3H9uDt$HAAAIH;rDl$HE3L95~W0EHEHEHHEHD$xHEHHD$pHEPHD$@HEXDt$@HuDmLuLuLu Lu(fE0Du@fDuDLu`u HSHEHH P$D@ DHHt9T$0HHDD$(LEDL$ A2 H KHEPD@DHHt2T$0HHDD$(LEDL$ A H H}A@AL950H}u3ALEHH ؅k}[H L4AILEHr ؅4}!MHM3HEHMHE3HEEuHT$pHHELD$@HD$xHME33T$@tUHXHEXu8w,LEIHT8wLEIHT$@E3\HLD$hILD$hMAwELD$hHcLt$hMHM3~HEHMHE3ELug~HT$pHHELD$@HD$xHME3%|$@Dt$Dt+LL$hHEDD$FAHHD$()|$@tHE3H LD$XHLD$XHAAw'ELD$XHnH cHH|$XHfD;sH+ HH+E3H|$XHDDd$LAE3DHL$`Au AHcAH3H]HMDB@}3H]AEHH]|HT$pHHELD$@HD$xHM|$@w;t'LMHEDD$FHT$DHD$(|$@tAEA;AE3AeH %`3LEHrHI0eH %`3LD$`HQHI0HH3^wH$HA_A^A]A\_^]ûHHXL@PUVWATAUAVAWHhHHLEE3MWLu3DuLLuEN0LuDMAELt$ EܖeH%0LuHH@H9Mu HڮHt H95֮LLMH9E3DHAIv=eH %`3LEHHI0IADeH %`3HHI0'HEHHueH %`3LEHHI0H$0HA_A^A]A\_^]ÅxLL;vPtHu4HHtIE3D9vv~I(AH'LMHeLEEHeHMY9H]HUHH7HHIPAD;vreH%`eH %`HUwLd$@D"HT$8UoT$0 IDHHtIAE3D9vvL(AH5LMHeLEEHeHMgGH]HUHHEHHxIP+AD;vrmH\$ UVWAVAWHl$H`HEH3HEP3MLH9YH 3HHwHA HL$0ixHHT$PHD$0HL$PFD$8FD$=uWeH %`3LD$0HHI0H\$0HkMIH΅teH %`3LD$0HHI0H\$`Hl$hHt$pH|$xH@A_A^A\H\$WH@H[IMLڿ Ht"LL$pDII\L$p#HD$0HD$ H7HL$0xH;EH\$PH@_H\$Ht$WH HAHD9D$Pw"E3HuDD$PH>Hu3H\$0Ht$8H _H\$Hl$VH0|$`AIHwXH9gtDL$`Lx:HI3x+DL$hT$pA;D$`wT$ H HD,H\$@Hl$HH0^H8Hd$(E3Hd$ E33ҹ]HHuL3ҍH]'3=H%HH%tH eH%]%HoH`HiHjH[Պy2LDȍJ\H JH%<`yH8HHXVHP3L@HHXHXHXDKSxH9\$ht HCH:H VAJHeH %`HHIӋHtH\f+fw fxH HHL$0LL$`3LD$03.xGH9\$`t@HHL$@!HL$`L }E3HT$@H hHHH [H\$pHP^H(H EHtH%2L˦MtH 3H%H(HHXHhHpHx AVHE3HL95oAAFHS?E3Hi(eH%0LB(LHHHH HLHHHHLHHDHCHD AV JfuH 3H(AHq! H;?HWH A60H Hw(v0HCH FLOLLt$0PHD$(H|$ uLt$(LL$PE3HD$ 0HHxg|$tu |$xtVHLHD$HL {HCHHD$@HHD$8H3H|$0HD$(HGHD$ r  H8tH@L3HD$ DύJ]ԇAA;u7L AAHKLt$0Lt$(HL$ H tuHtk@teHhX!uWeH%`D8puHD84%u>HHTHtHSE3H  HL!H3L$I[IkIs I{(IA^H$H\$WH0eH%0HZHHH;HBut#HJHLHL$(3LHD$ J]3HH+HHH;HGHtHѺѺH[H;rH\$@H0_H\$WH YHH wH ?%Ck=+؋HHHH9At)HHGHyH H8H\$0H _H%'@SH HH 8K =C BK0 GHHCH9ZuH9uHH [HBH [H%)H\$Ht$WH ٸ?%CHH 3k=+gH HHH H9pt HH;uHH :H\$0HHt$8H _H\$Hl$Ht$WH H-}3H-|H-meH%`eH4%0MHKxWE3ȃuL3ҍO]\[H5HFHHH  H9ht)HjHcH-dHPHIHH΀H\$0Hl$8Ht$@H _̃=uu3eH %0aH@SH@HHHʟH;eL %0LC M;u IIHH9Kt)IAHH Hd$0QHD$(HCHD$ TpHCHHHH9Bu]H9uXHHJLC8MtH 3=teH %0HH L3H@[ù)H\$Hl$ VWAVHPHqH3H$@ZAH+E3HHL93u E3HD9w45H LD$pALt$ xrE3HT$pH tYH LD$@A0Lt$ 3ǃx:eH%0HH@H9L$Pu&LLt$0H Lt$(E3Lt$ nHH#&DLLt$0H Lt$(Lt$ snH$@H3dL$PI[0Ik8IA^_^H(=u3HL$02HD$0H ,DQAkdD+AwHd$8HT$83@;H(@SH 3H w؋H [H\$Ht$H|$AVH0IHHTE3u^H ttHAƉD$ s/H3L4HD$XtLHHD$ H %H\$@Ht$HH|$PH0A^@SHP MMDѻHH;H+I;eH%0H;xreH%0H;Pr0eH%0H;xyeH %0JH;x_E3AEAAtCA6eH%0eH %0LD$0LºH@HD$(HxHD$ eH%0H ͡HL$HLH.HxHD$@HHD$8HڡL\$0HD$(LL$ L ܡheH%0eH %0LD$0Lº H@HD$(HxHD$ XeH%0eH %0LD$0LºH@HD$(HxHD$ "E3A؃u#LD$0LD$(LºL\$ H jHP[H\$Hl$Ht$WH IIHt+LLH׋-LHLLH׋ LHHH\$0Hl$8Ht$@H _HHAt;A!t2HALHd$0HD$(HH HD$ +j3HHLI[WHpAHHu3ICE3ICMK3IC0HJ|xFD$`u<H#H;vH+H;s&Hd$0H Hd$(E3Hd$ LËiH$Hp_@SH0Hd$ LD$HDKS{x 3H9\$HËH0[LI[IsWHPICIICHh|؅y&L$MtV3Ht$ LJ]{=LL$@L;t3H$Ht!3Ht$0HD$(LzH|$ J]{AHt$hH\$`HP_@UHH@HeHǕHMmzLM3LE3|ȅ!HBHM{HMLM E3HU{ȅHE H&HMH{HMLME3HU{ȅHEH HMHb{HMLME3HUU{ȅxHEHHMH)+{HMLME3HU{ȅxHHEH՞HMHjzHMLME3HUzH^HIEHPH@]@UHH@HeH[HMyLM3LE3{H`HMnzHML E3HU^zHOHM=zHML E3HU-zxVHBHMzHML E3HUzx)H5HMyHML PE3HUyH@]H\$Ht$WHpHhH3HD$`E3HT$ 3EA@xUHyyH zH HzH5H^xHH@xHHzHH$zHHzHH@zH H xHeH%`H H $xH eH%`H 'wH H wH TL$(H HHHEH藤wIu$u Hmm1HfH jHEuHpH sHGH+H iH HL$`H3[L\$pI[IsI_@SH L !LI;uaL(MwxsH=L H @M\M;H IL;MCMHH;uS=PwLLLL LiMt`Z2H [M9TrRKI9DsGHP*H;u7L LMt+LH @M\M;rH IL;MCM‹H @IH{uL Lɯ3ҍJ]vHH [̺H$H DB~IA HI0@ A@H0IP@@A`HPIpI@`IHHu IA HI0@ A@H H0@@3H%H%H%HIA HI0@ A@H0IP@@A`HPIpI@`IHHuHJHHH}HHHPHyHHHľHHH3HHHHHH'H@ IH0A @@I0HPA@@`IPHpIA`IIH@ IH03A I0HhHiHjH( N3HH 53HH 3HH HHHH 3HHth 3qHHtO 3XH-Ht6 3?H$Ht 3&HHt3 H(H\$Ht$WH Hw3`ɺLi0eH %`IhHI0qHHt̉8HpHt"HHqyH /rL3\r3HH\$0Ht$8H _H(H ]H aH -H AH U|H ApH dH XH L3HHHɎHHHHHHH(Ht6SH HyHt HqeH %`L3HI0NqH [HH\$Hl$Ht$WATAUAVAWH E3ML9iAM@Hمt H[pAACA33t$Hi0H8HfD9)tHCtALAHi0ߍAHK@HωD<oHD$pfl8L|PAHDXfA+HD$xHD`LdHfDl:fA;wTHtJHHPHtAHEŋHfD:fD;*s Mk&AEI HDHDhD;rfD9l:u6E3L4MFhAQ J>ofuH$fD|:IFhfD:t HK"oH\$PHl$XHt$`H A_A^A]A\_@USVWATAUAVAWH$HH^H3HIHT$hHH\$HLLD$PH4MHL$XVnLkXAIHL$Xan3u HC8AHu'D%ML3ҍH]nD%t#HD$(LHC03MHD$ J]nH HL$pmHHMmHHMmHDHMmHHMymHҨHMhmHHMWmAHL$pIfmuHC0HC@H݊AHMI8muHC0HيC@HAHMI muHC0HC@HAHMIluHC0HC@HAHMIluHC0HC@HTAHMIluHC0HC@H)AHMI[luHC0HC@HRH lDB@lLHuD%LHC8H IFHC0IFH-I^ HC8IF(H@HA~8AF G iAALMhf;u AC>A;rHt$h3D$HD;t AE;rdhHHh~GL IH;1r H;|,+HcLcGHcHHIII1jCHc׉8HHD$PHHHt HD(BhHH3cLHA_A^A]A\_^[]@SUVWATAVAWHpHWH3H$`ILLMHH gHzE3HHt!HH@H9YNH9EHHAH kmgHtHH gL3gD8%GH AL9at9IHHUXAfu I>HH ËHL9duH AL9at9IHHUXAfu I>H=H ËHL9duD9%0t=D9%t4HL$@[t&Ld$0H [Ld$(LMLd$ )TeL %0 LIMIHD9%tyeuoD9%ʜtfHH 2H|$PLt$`rjHT$PH xfHT$PHH sfHĂH 7jHtHtleubH eHt; L ɉ +LcHHcHcHHIIICgH <veH$`H3IHpA_A^A\_^][ù)HMLFLI;t LHM9HwI@ H@IHI;vI3HHXHpPWAVAWH`ML@H dIHHD$HH dHu2(^HHD$8Ht@4u s8uK8t'HC t$(H@PHD$ LKL3ҍJ]dMNjIHCL hAшD$0u K8C<u K8D$0C@u{HHuoHK HHI`euVHHL$PvcLL$@LD$P33d$xHD$@Ht HLu3ҍJ]"dH|$8HtO4D$0L\$`I[ Is0IA_A^_HHHAuJ8 EuJ8 H 9t9tw9!to9u7yv1Hy v*Hd$0PH@LILA(HD$(HL$ H +LB LHd$0H FH@HT$( M@`HD$ RP3HHH\$Hl$Ht$WATAUAVAWH@E3ML9-MHDtwHHfD9,ZuHCH=w]H bH,]LźaHHt8LHHKHL$hLHL$0LH ALt$(L|$ (L\$@I[0Ik8Is@IA_A^A]A\_LA3H aH%$bH\$Hl$Ht$WH@Hq(HH HtJ=( w =r5HM PHEHd$0DC LK(HD$(HA`H HD$ NHHHGH9yu|H98uwHHAH FxcHGHHHH9BuIH9uDHHJH 6cH aL3L rL3ҍJ]UH rHt33LJ]TH(H\$Hl$Ht$WH 3H-ǫyHt$3H6LL3ҍO]TQHt<Pu2=[ou)Hd$0H `Hd$(LHd$ L>H\$PH@_H\$Ht$WH@H3HHtHHu$9=nuH!|$0LH!|$(H!|$ L IeH%`H;HAH rt(H!|$0LH!|$(H!|$ E3H >ZH 1PHHHu.9Unu&H!D$0H [H!D$(LH!D$ L =H OH\$PHHt$XH@_H\$WH ,Ht.WOu$H \OHH EOH\$0H _@SH@eH%0HًAH;tVHCH;BHu C |E3 Ht2HX(,Hd$0LLcKHCHD$(HL$ H NLcKH HLLd$0 HD$(Ld$ 71HJDx`K AԿ;…u E3I׋f s(HD$hE3eL%0HHD$ M@H8 s9L\$@AI[0Ik@IA_A^A\_^H\$Hl$Ht$WH eH,%0AHٍV' seL%0HM@Hs-Hu#3Hu&H~HH3H"HtHx(@PH>xbDC E3AAEuE3AIH_5 s(HD$8E3eL%0HHD$ M@H  sH\$@Ht$HH0_@SH (AH;u =s;v HH [nHH [u@SH (AHA;u =5s;v HH [rHH [H\$WH AHB=3Ʉuo9 ZtgHt&eH%`HtHH9t!H;reH %`3H2H 5=DLH %=H\$0H _H\$Hl$Ht$WAVAWH0H,H3H$ H[3EMHHD$ ^H| @BweHOMtE3EtIH9tAHE;rHW pt9HGHtHD Ã@sHOHtHL u+H$ H3 L$0I[ Ik(Is0IA_A^_HT$HL$SVWAVAWHHH0D3HL$h$3DCHL$@$E3=tH|$ LL3ҍK-U<L!|$ DL$3HJ1>y3AAD$@NL$PF D$`3DpH$H$DuCHGHw HL3Hd$0Hd$(LHD$ LH Q(rHH\$@H;D$hKL$xC $E3H$H$H\$@Eu%HHd$0HD$(H|$ L˺tHL$hHHHd$0H\$(BL$L9D$PuG|$Ht@HtHVL$3Hd$0HD$(H|$ LκH W'EEqAHA_A^_^[H(3=,pr"LMtQ,IIH(H%>HHt IH=H(H\$VH H 9Dƺ93HH@D3Ha"H 9SD8LI@ HH n9SD8L[I@(HIH@SHIH@HIH@HIH HHIH IH(HHHIH HuH V8HT@H@L_I@ HtH 8L38LI@(HtH 8L38LMtH }838HnH\$0H ^H(7t2HCHt=STtx0H(DL$ DD$HL$SUVWH(HHLEt&c<CDH{D?u BHKD;u2CNHt-HE3IH;tAH ЄuDL$hLT$PHD$XHmHH;t^뤋 rHH;t' r HH@t$`@Ht$PLLz3HZ]6Lz3ҋ6Lz3ҋv6Lz3ҋe6LNz3ҋT6Ly3ҋC6E3LHֹ2@t$`@t C<;C@vC@H(_^][H\$Ht$H|$L E3EAAʋILMtCrޅt2ˋIH HtIB8HxHA8H9xtnH HuuMMuwAv=MAIIHP8HC8HHH9JuCHu&AIA@A;rʰH\$Ht$H|$AAX2H\$WH HB!BHHHHH+HHHHkH+HHHX H9tHH H9xtHH;u3H\$0H _HH\$Hl$T$VWAVH IIH`HtE3LH׹L3MuE23A8IIFAI~LL$H H@MF8HJP3In8HB!BHHH+HHHHkH+HHHx IF(HH9yt)HHxHAHAHt H H\$@AHl$PH A^_^H\$DL$ T$UVWATAUAVAWHPIƄ$L@2H 32Hۉw9uH k2E@ww vH -2t HD$(HLH oHD$0L1E3Lt$@MH L-!HHHuA3HDB(HHB!BHHH+HHHHkH+HGHI](HH9Zt)E3HHHXHBAHLT$(H*@IE3HHu]E3E3IԹM L$MIE3LT$0u@HuIhL-%HE3HNHL$8L9Wt H9wtfDWGAfAHwfGHfA;oD$HiL}IL;t(HZHHC8L;`u KHA#D:tGH;uHL$8GEHE3IEVE3҄L-dA3HC8IWM?H9B8u"BH3CHuuAHnE3EZL;uLGII;t5D$HZHS(L9uHC8L;`uKHA#D:I;uD$3LT$@APII|AfHAANHE3HT$8II~8AED AFHIFH@HAfH$A#A FHD8$upHJHIFH9JtQAK)LpAI>8HWH?L9u,HC8H9B8u"BH3CHuuAHO E3EZI;umHHHHBHHGHIN(H9Bt)HHAHJHfD_fv  IAHtHAHus EHD [HHs@D^ F H^w E\dEH HtXHPHPVIHA @ I0H0A@@@IPHPA`@`HIpHHHu H{PLL$ LǍJ|-HHt H@PHPH$HHC8H8OHG @ O0H0G@@@OPHPG`@`HOpHHHuH|$(HD$@Ht HL|$0Mt IHt HH ?,H$HPA_A^A]A\_^]H\$Hl$T$VWATAUAVH0ILwE3H AX,IHH[@fu HwLILƹdH~H H_AfA+fFHOLfDH9s8Dj\HC8HcH(uX3LIqJ]`,HC8Luq3H|$(MH@J]HD$ 9,LC8LIֹM@HʂH9s8t HHucHHCHuDj`KHcHHL9gtHGDhHtH9x@t HHGHuHtLe@G uH L8LL$hJ*H b*H\$`Hl$pH0A^A]A\_^HB!BHHH+HHHHHkH+HHHP(HH;u3H9HtHH@SH y HuHytHLE3HCHHHH9BuH9uHHJHH [4)H\$Ht$WH03H b)Ӄ uML r'3AIt&AH9HH9OulH9xufHHHHHH q)H )Lƺ )H ̀HD)L H ՀAA0)L v3PAIzAH9HH9OuH9xuHHHHO)L 38AI$AH9HH9OuH9xt)t0tu8AAAAA;Av*AA$AAA;AvAAAAAAA;A vAA Ht4IAH 0H;rII!IILFnMI3Ht$ J](H z'H\$@HHt$HH0_H1E3t^t0HDB'HL HI9QtYAH)HH(L API9Qt1)HHH(L A8I9Qt)L HQIIH L)@H\$H|$UHHPHE3HEH=~HEHHEHEHEHEHEHEHEHEHE&H-~D[A v^HH LH9QI9HLLMIPLEM9LALML AIHMD w@v^HH LH9QI9HLLMIPLEM9LALML AIHMD@w@v{HH LH9QuaI9Hu[LLMIPLEM9u@LALML IHMD@w2))))))Hj%H]H %LCH3%HEH;uH]H %LCH3%HEH;uH]H k%LCH3%HEH;uH$HC|H$H\$`H|$hHP]HX={H {H{L{L {t'LL$0LLD$(LjHT$ 3ҍJ]% HOH?KH;uHC(HHHH9Bu(H9u#HHJHH\$0Ht$8H _)H\$Hl$Ht$WATAUAVAWH HzLH9H;Ho3H?H9uuf}rwDkDLuM>2IOM?QHD;vA+= v A+Ձ sgM;us4f}r(I6E3f}rHNH69AI;uD{8I;iH\$PHl$XHt$`H A_A^A]A\_H9LIMPMXMISLHBI9RH9LIBHIHHLPI9udHLRIHPM;uHALHPI9@uNH9uILIPHA8fPHA(LHPI9@uvH9uqLIP)))LAI1LPHIRLLJI9Su#I9uMMKI"H"Ib I;us))@SHB@LHAHA@HAPHPEQ~JHB @ J0H0B@@@JPHPB`@`IJpIHIuHPAIPJHB @ J0H0B@@@JPHPB`@`IJpIHIuA@HtaH AHMHIJHZHHCLLPI9CI9MMSLQH MZM9unLLXIIBI;uI8tI@HHHH9BuRH9uMHHJI@8fHI@(LHHI9Au/H9u*L III[))))@SH0$V;HvHH8fHL$  H ~vL ovE3HT$  x H=Uvu3HfHL$  H @vL uE3HT$ s x H=uu3HeHL$ I H vL uE3HT$ 5 x H=uu3ۅt?U3ۋH0[H(HHtHI0H@ "H(HHXHhHpHx ATAVAWH 3AMLLMtA8s@vA8CDDƋDH DB@HH(H cAHHHHx8HgHgHgHg Hg(Hg0g8G<G@HMt-HH8IDI~tHK8HAHC HHAHS8LC@E3HB0HC(H@HB0AQ JLcL{0k<H sf@0HtH tH9Ht)HKH sHHXHsH ML3zHl$HHH\$@Ht$PH|$XH A_A^A\@SH HH hsHHCH9ZuDH9u?HH FsHBLC83H H L3H [H%)@SH0eH%`HHHYH&cHL$ HSXAHL$ uHC0HRC@HpRHIe@H@HHHuHrHrHrH wry؅xH i.H RH0[@SH HH Qf(r"HKH L3H [H%HH QH [H%@SH HHIHt XHcHKHt 3JHcH Ht dH#H [HHXHhHpHx AVH0HIH QILHHuUH PD@ :HHHHD$ AE3yH L33Ht[HHNH~LHSMD$(L$ tyo8HH&HfHL$`HtHCH B8H\$@H|$XHl$HHt$PH0A^H\$UVWHpHZ H3H$`H(pHHHHHZAHT$`H+H o`LL$`LDɃ{@uZeH %0LU@eH%0LELL$PLM0PHAHH pHt$HLD$@D$8Hd$0HT$(LT$ oOH$`H3H$Hp_^]@SH (OHمu t.Cu(HoHteH %0HLËIHH [H\$Hl$Ht$WHNHHu GHoHH.z~@ui|$htieH %0LM@eH%0LEPHD$hD$PHD$`HD$HAHH LD$@D$8Hd$0HT$(LL$ LM0\nOE3D$ E3HL$`3H`L$I[IkIs I_́=prGeH%0HH+Hv+3H9u H9uH9uu3MHt3H9QrJH9AsÃyuLA0MtI9r J I9r3H\$Hl$Ht$WATAUAVAWH`IH3LHDBHL6eH%0LHHLNH^,3HHt1H@8Hu$H WDGHtHC8HNHHpHHHX8HL3IH4~@L3DH3LALDHGLL3DH3eH %0D9tK@HHHCuA3H|$ A0LD$0HJyF H~(KD$\F HD$PHF(9}~E33slKt klp9P}rXeH%0H9~@u HN0HuH9N0t k k9}reH%0H9ht k keH%`HeH%0HHHH9Ju kokEuEu EuEtKEuEtK9{@Nj3L\$`I[0Ik8Is@IA_A^A]A\_H\$Hl$Ht$WAVAWHHH3LHnHx8HaB@L=eH %09t2G@u,LN0HF@LFH\$0IH\$(HD$ FO@HHHG%3H\$ A0LD$`HJDU D;$tUeH %0LN@Hc$LFHЉD$PAHIDT$HLD$@D$8H\$0HT$(LL$ LN0OH$H9E(A0H\$ L$3HxiH$H9$tWeH %0LN@H$HE(LFHT$PHD$HAHILD$@D$8H\$0HT$(LL$ LN0OA9~%GuHUH9tAE33jO9]8t6Gu,HcE8HN@LN0LFH\$0HD$(HL$ IOGuFt=eH%0HN@LN0LFH\$0HHD$(HL$ IToGApu\D95yrSeH%0H9]@u HM0Hu3H9M0t-LN0HF@LF H\$0IH\$(HD$ o ouFD95kyr=eH%0H9ht+LN0HF@LF H\$0IH\$(HD$ oouNeH%`LeH%0HPHI9Pu+LN0HV@LFIH\$0H\$(HT$ ? o9_Ë3L$I[ Ik(Is0IA_A^_HH\$Ht$WHpHHHr<tLD$ HHdHS0HH\<tHT$ H賌HtH@8HtH`L\$pI[IsI_HH\$Ht$H|$AVHpMHHHr<tLD$ HHMHS0HH<tHT$ H%HtH@8HtH`L\$pI[IsI{ IA^HHHXHpHxLp AWHEMHHHre<tLD$0HHEMHS0HH5<tHT$0HhJHtH@8HtH`L$I[IsI{ Ms(IA_HHHXHpHxLp AWHMMHHHr <tLD$0HHAH$HL$ MMHS0HH&h <tHT$0H}HtH@8HtH`L$I[IsI{ Ms(IA_Ht|H\$WHpHHy <tLD$ 3HHK0H <t HT$ HHMۉHtH@8HtH`H$Hp_HH\$Ht$WHp@HHyX <tLD$ 3H@HK0H/ <tHT$ HbDHtH@8HtH`L\$pI[IsI_@SH HHK0Ht\H m L3H [H% H\$Hl$Ht$WH HHo(H HwHHK3HH;uH Hi H L3H\$0Hl$8Ht$@H _H% @SH H2HKHtH L3H [H% HtEH\$Ht$WH Hr0HHZ(HAHtHHHMH\$0Ht$8H _HHXHhHpHx AVH HH3H 8ISm9'Lpt(DKLHHHHtHx8H-HLHHIy HtH|H\$0H|$HHl$8Ht$@H A^H\$Hl$Ht$WAVAWH0HL3H IISg/9]&Lxt'E3LHHFHHtHx8H- HLLHII y HtHH\$PHl$XHt$`H0A_A^_H\$Hl$Ht$WAVAWH0HL3H ɢIISho9%Lxt(DKLHHHHtHx8H-JHLLHII: y HtHH\$PHl$XHt$`H0A_A^_H\$Hl$Ht$WAVAWH0HL3H IISi译9$Lxt(DKLHHHHtHx8H-:HLLHIIz y HtHGH\$PHl$XHt$`H0A_A^_H\$Hl$Ht$ WATAUAVAWH0LL3H EMIM3ۍWj9$H$H@HD$pt(DOLIIHHtHh8H5$L9#t(H DB0HHt LH5aDHD$pMLHl$ IIm y HtH:=o#t:xHt1LcHL{ IEHC0`GHtH L3GH\$`Ht$xHl$hH0A_A^A]A\_H\$WH HkH 趏HH@ ؅xHEH\$0H _HHXHhHpHx ATAVAWH0LL3H IISlJ9x"H|$pL`t(DKLHH[HHtHx8H- HLH|$ LIII y HtHH\$PH|$hHl$XHt$`H0A_A^A\H\$WH HHnH 蓎L@HtHH8HtHIHt H9yuHYHHIH\$0H _H%c @SH HٺoH {*HH@1 Ѕx'蚁HtHH8HtIHAHtH<H [HHXHhHpHx AVH HH3H ASp衍9 Lpt6DKE3HHHHtH5@HDDHHIay HtH.H\$0H|$HHl$8Ht$@H A^H\$Hl$Ht$WATAUAVAWH@LLrH 2IIیE3D9= LhH AWEG(HHEOE3HH$Ht+HCH5YA@HDL;L{L{H bL3IHt@$HK M>Lωl$(LƉT$ III,yC3M>HQ4/$LωD$(LƋ$IԉD$ IIL\$@I[0Ik8Is@IA_A^A]A\_HHXHhHp WH0H`HH3H țUst9-HxtwHt5u+HD$PLLHD$ HHxHH\$PHN HH1uHtHtx#Hu3H?HHHH\$@Hl$HHt$XH0_3 H\$Ht$WH HuH Қ聊=HxtlH yDBPHHtGH HHH`H`HIH HH(HKPH:xH!3HHHH\$0Ht$8H _HHXHhHp WH0H`HH3H Uv褉9-HxtwHt5u+HD$PLLHD$ H-HExHH\$PHNPHHauHtHtx#Hu3HHHH&H\$@Hl$HHt$XH0_3 H\$Hl$Ht$WATAUAVAWHPLHxH MM蛈E3D9-LPLT$@$$@t*t&Ll$0H jLl$(DDLl$ H IDB8HH&AE3IIBHtiL+L=LkALk@HC0LH{(DHO(~HOHHCH9Jt)HHHHBHHO(VH L3IHM,$HS8$MHD$@Mljt$0I$l$(L$ HOPbHO(M,$HSL LBI9Qu"I9uMHO(MA3HF):$MΉD$0MNj$IԉD$(Hϋ$D$ IL\$PI[0Ik8Is@IA_A^A]A\_H\$Hl$Ht$WH0HHzH AAc=DDH@t HV8HMPHHNH\$@Hl$HHt$PH0_HHXHhHpWAVAWH0H` HL3H 4I؍Uy݅9- LxIN(oHGLHPI9@H9LIN(IPHHt5u+HD$hLLHD$ HHAxHH\$hHW8LINPIYuHtHtx-Hu'3H)LHIIH\$PHt$`Hl$XH0A_A^_E3H\$WH@H3H ʯ3藄HPxHtHH8Ht HYHtK<HH{x@HtDC8LL$HeH %0LL$0E3Hd$(Hd$ DAHH r%HtcL\$pHI[IsI_H\$Ht$WHpHcHٺ)H HH@Hd$ LD$@A03HˋHL$xE3HL$0H LLID$XHd$(Hd$ 萅L\$pI[IsI_HHXHhHpHx AVH@I3H M3LMƋ׋H@3HL$HDHL$0DH THl$(Lt$ Hl$XH\$PHt$`H|$hH@A^HHXHhHpHx AVH@IH M~LMƋ׋H@HL$HDHL$0DH Hl$(Lt$ SHl$XH\$PHt$`H|$hH@A^HHXHhHpHx AVH@DHٺH eII}LLAHH@Hu3LT$HSeH %0ELT$0Ht$(Hl$ DAHH 袃H\$PH|$hHl$XHt$`H@A^HHXHhHpHx AVH@DHٺH II>}LLAHH@<Hu3LT$HSeH %0ELT$0Ht$(Hl$ DAHH ?H\$PH|$hHl$XHt$`H@A^@SH@HcٺH |H@LL$HeH%0H LL$0Hd$(DJD@HH\$ kH@[HA`Hu IH;v3L HII;vM9L HJMII;w3IHIL;H\$WH H ')LD$@H3ۅy;H )Hx#H (LD$@HHH\$@HH\$0H _@SH HJ(HHtu HVDH }(HHH [H%'@SH HJ(HHtu HUHMH )HC0LHPI9@u=H9u8HCH (LIPH 'HHH [H%)H\$ HL$UVWATAUAVAWH@3LnH$HkpH$H IHH$;LHJH$vAt+ttA A A A A IUf9jXv8eH%`HR`HX HKx^HtH;CxtH{ImHD}XAf953f9t,E3HE` Hf9u HfD9+uL$A;u( 3f,f3H:HHHt-Hft!t Hfuf93Sf9EXw @ƽQA#DEXH[HM`A+IHcH~sy D{A;~33@ńuJeH%`H@@I;$t7IMAML$M$IHt$0HA0HD$(HA`H |HD$ vH$IH*H$H$HLH qH %IUH( H$H@A_A^A]A\_^]H\$WH0H HHhH{Hd$ L LoHHH\$@H0_@SH0 s؅ft؅H H V$3HD$ 0ADJ0؅xT$H|H $$2HH $H HM$#%#H0[H\$WH = t+u!=#tiHtt@@t@DH\$0H _H\$WH =? t+cu!=H#t}iHttH@tHDH\$0H _@USVWATAVAWH$HpHH3H`E2Hc=IHLL$(D$ G9=",hHtH@H$# HuDx AuHH\$0H|$PHD$`vuhHt HxPA3HuH*PHE2HZH "HT$PH "H-HkpHH LILL$ EHT$0HK HH|$ AH3σH3HHHH w"AHT$(H !GHHuCHD$(LL$ EHD$0HT$0H !#HHt/@8t$ tH`HH@HLBHCHI9t)HCH@HHL@IHBH*H !HIHnH /!y|$ t #!HtEuHNHOH`H3(HpA_A^A\_^[]@SUVWAVHPHkH3H$@HyMHd$ @2HL$(H HcLD$0HD$@HT$0H  HHuHT$ H HHtpHkpHH)HHT$(LHK HH@HM@uHT$ H >HHuHH @H$@H3HPA^_^][H\$Hl$Ht$WH0=IIH1#=eHtH@HR@HuHE3LƋH=u^LL$ Hl$ LƍWHLL$ LƍWHLL$ LƍWHumLL$ IuE3L3HuHE3ۃuE3L3Hu*E3ɍW uE33LHu X KH\$@Hl$HHt$PH0_H\$HL$WH =zH=|cHtH@H@HuH >HT$0H HH HeHtHHHE3L3HH;uHH HT$0H cHH H\$8H _H\$WH H LD$@H;A3ۅy;H tHx"x#H WLD$@HHH\$@HH\$0H _Hy`uIH;v3ø@SH HJ0HHt HGIH HHH [H%lH\$Ht$WH0HFHHhIH;Hd$ LLHHH\$@Ht$HH0_@SH0i؅&k؅x~HQH %3AHD$ DJ@؅xHHH tHd$ L L"HH %H0[H(3Ʉt39 vlEH(H\$Ht$WHHWH3H$HH }l=Hp_vRHGH|$PHD$`eH%0HHHHHL$XH VLL$@AHT$PH |$@HtHHL HoHu*HL$`eHHFH?tNeH%0H;xreH%0H;xr-Hd$0H oHCLHd$(QLKHD$ HKHD$XHCHt HYFHT$`HSHH MwHHdH$H3<L$I[Is I_H\$Ht$WHHwH3H$HmHHL$pH HT$pH RHH;eH %0HH1HQHHHT$HHNHT$HHHHsHHd$0H WnHd$(SHd$ LOLD$pH;t+Hd$0H nHd$(E3Hd$ LúPw=ZLL$@AHT$pH _|$@Ht@eH %0HQHHPHDHKHCL HEHDljHH WH$H3YL$I[Is I_H\$Ht$ WHHH3H$HHL$PH HT$PH qHHeH %0HDHQHHT$(|$0d$@HHD$8HHHKLL$ DFHT$(|$ Hu$ HH2CDΉ HL$8fHtsHHNH/H :H$H3L$I[ Is(I_H\$WH HٺH 'xg=Hxt8t/HHH HS HHH\$0H _H\$WH HٺH wVg=sHxt5t,HHH;3H HHH\$0H _H\$WH HٺH 'wf=Hxt?t63HHH@tHO@ HHH\$0H _H\$WH HٺH vFf=cHxtHL$@HHwHHT$@HHuZHT$@HGxHHgxH |hHd$0HLL$@UH@LD$`HD$(HHD$ HHD$@4D9pt.Hd$0H 1hH@RHd$(L LD$`HD$ EtCuHT$@H7HHHH H$H3þL$I[(Ik0Is8IA_A^_H\$WH HٺH sc=Hxt.4t%HDHHh HHSH\$0H _H\$WH HٺH Wsc=#Hxt,t#3HDBjHH? HHH\$0H _HHXHhHpHx AVH0HH麒H rAInb=Lpt%tE3HЃDLHHI;H\$@Hl$HHt$PH|$XH0A^H\$WH`Hd$xHك=H\H H\$@aHGHHHKHT$@Ht,Hd$0H eHPHd$(LLHT$ TH`HoHT$xH eHH{H2H =H\$pH`_H\$UVWAVAWHHjH3H$=MIHD8+Hl$PH\$HH0H HD$HHT$PHzH HHtHT$PH HH MH%=oHHs[Hd$0LAtHOLHL$(VHHL$ HGMHD$(WHHD$ H cqHH-Hd$@HT$@HHHuHKHt H:H HSH)H$H3莺H$ HA_A^_^]HHXHpHx UHhHHH3HEG3LMHHuAHVWHMHEDNXHD$ LEVYHMNj-yT E3CHUf+HfEHCfuH HHMHM x fMf; rf f#HMGH3荹L$I[Is I{(I]H\$Ht$H|$UHH`HEHH&H HEHM3jxgHMxZH HM@xEHHM/x4HEE0WHELEHuغE@HEL\$`I[IsI{ I]H\$UVWAVAWH$@HHH3HHD$0LH#E3HD$8HXAHL$0z؅xQIHL$0f؅x=HD$0D$X0WHD$hLD$XL|$`D$p@HD$x5؅H$HL$HAHHD$@HD$(LMAD$ HT$H؅xE}uu"}uAL|$0HT$0HM.rHy%t HI؋HH34H$HA_A^_^]H\$UHl$HHkH3HEGHHJHMPHEAHD$(LM/HUD$ H(AD9M3E;Ev%DL$(EHUHEE3HHD$ gHHMHHMHHMHUHHUHyHUHlHUH_HMGH3H$HĠ]@SH@= HeH%`HP BB`D$ HD$(uHDD$ AJ Etfy\t HuD+HL$8AfDD$0A;u0HT$XHL$0xHL$X7HL$XxH H@[H8E3D9ZD9 H%EHH+HKY8m4HAH DuWD9t*A@ D D HL 3DD$ DAH8@SH0HHI@Ht3HK8Ht0y&L `iLD$(3HC8HD$ J]HK Ht0Jy&L 'iLD$(3HC HD$ J]HLMtH 3H L3H0[H%@SH H oHFHH H9Ht)HKH @HHXHbH [H%H\$WH HHHH HCH9Yu H9uHHAHH\$0H _H%)HHXHhHpHx AWH =H3L3MEH +eH=L=.HH?H9sHukp H9s0uHH/HI;uH H .H=QL=J.HH?H9sHukp H9s0uHHHnI;uH uGH5-HH=mH-fHHH?HHWH;uHuH\$0Hl$8Ht$@H|$HH A_HHAHL3HIHML+III;LGMtH3HH@I;rHHHXHhHpHx AVH0H3H 33E3H'H  HH;t H3H;uPHSHߺH'Hk@H!s@Hs8L!s8Kp t HAH EHtAuHHt 3HHt/Hy"L qeLj3҉D$(Ht$ J]H\$@Hl$HHt$PH|$XH0A^HLH L@HPHHSUVWATAUAVAWHE3D9AEDT$@DT$DALT$hALT$XLT$`MH$L$H*M0IL!MmLt$PHD$HHuHu M3t HH  H dH]H;tUH$H9At H H;u=HALI HQ0HD$XHLL$hHT$`@q(tA(t H |uHuMu H9|$HaH$H .3L0cL HL;tKIM9u AuM 3H!|$0IH!|$(H XMIMƺHD$ ͷH E3HeH%0$ L;xreH%0L;hst MD$DeH%0L;xr.eH%0L;`sM;D$@IIIBHMLEH AHH5DpLD$pWD$p0$Lt$xHH D$ L$eL %0I@;y D!L!w Lt$PMHH̓y1L 6bL3҉D$(Hl$ J][H3E3D$ E3HO8yLwL a3҉D$ J]HW8HO@D$(LXL$ LyLg붃eH%0HHHH$gpHHG(HD$HHGXD$@HD$XHG0HD$`HGhHD$hLE3LDd$DHOHoHLwPLDDHtHG`H3HA薰E3HAP >uHHLuHHLHt#H$HG8H@tHHMtH$H HH$H8H$L9|$HtH8H$HGxHAtD9=t]wUtCH Lƺ&HHt)H$LHH`HHLDHDHHĨA_A^A]A\_^][HH\$Hl$Ht$WH@HHHH >IHH;t HH;up=uHA6#;{xu 0t A =H  DCAi@BD+D;~st-HL$HeH%0LHL$0Hd$(Hd$ D@HH ,T)ȃ t ttA(t @ttA(A9(R3HC kp7-'HCxHHtDHm/9/uH HDH\$PHl$XHt$`H@_H\$WH HAHHHDHOXHGPOpCHH\$0H _H\$Hl$Ht$WH 3H aIHHH  HH;t H3H;uH*HbH ]HuCH=iH@HH H;t HH;u HHHHLCXHHC`̓KpQHH\$0Hl$8Ht$@H _HHXHhHpHx ATAVAWH0LH5YH33MILHH  HH;t H3H;u HHTHSHt$pHH V0HyH r HH;t H3H;uH%HH HudHt_H H2H + H9p0t HH;uHh H HtUMHt$ LIIH9H*LILCXIHC`Kp Ht$ H*H\$PHl$XHt$`H|$hH0A_A^A\H\$Ht$H|$AVH =HHH H6L5/*HHH9~huHHHcI;uH =tjH qHH5H;t=LHI9x0uII@L9AuL9uH3HAH Ź)H 6H\$0Ht$8H|$@H A^H\$Ht$WH =~HtwH HAH5:H;tJHHH9xt:H9xuHHHH9Bu H9uHLHJ3H 0뼹)H,H d H\$0Ht$8H _@SH HH 8 RH H H9Ht)HKH HHXH~ H [H%HHXHhHpHx AWH =pAHH1L=6 EHH H  H9{t HI;ufH DB0@HtKHHHHKHHHK HH K(H(HK0HH0H L9yt)HLxHAH H  3@tyH Hq  H9xt HI;uFHxu;Hx0u4HHHH9Bu H9uHLHJ3H ,^ )H,H H\$0Hl$8Ht$@H|$HH A_H\$WH0H4H3H$ ApHeH%0HHHH9KuH|$@,HK 3Ht!HT$PDŽ$ HI$LL;s3Hd$0HHD$(H KHCLHD$ 蠪3\u'LIkH9t Mº뢃uLI:H9uϸH$ H3踠H$HH0_H\$Hl$Ht$WH H9tu^Gpt uOpuHGxHHt*t GpOpuDH蹤HOHHtGpu u3ھ-tN+tA+t4+t'+t+t ;u=- 4-+-"----H\$0Ht$@Hl$8H _H\$Ht$H|$AVH@=dIHH ǺH0 L5) CpLI;w8H7I;v/Hd$0HHD$(H IHCLϺHD$ LI;w8H7I;v/Hd$0HHD$(H HHCLϺHD$ ڧHI;RH H\$PHt$XH|$`H@A^H\$Ht$WH =JHtXHtSH uHH5$H9{ukpu H.HH;uH /qH\$0Ht$8H _HHXHhHpHx AVH`HH RIIoB HT$hLp$]t&=U tH cո̸$Lˋ$LƉD$PH$HD$HIƉL$@$L$8$L$0$L$(H$HL$ Hݼ؅xLD$hE3HAQL\$`I[IkIs I{(IA^HHXHhHpHx AVH@HH QIIOA սHT$HLp\t#=5tH C̸@L$xLˉL$(LƋL$pՉL$ IH؅xLD$HE3HAQH\$PHl$XHt$`H|$hH@A^HHXHhHpHx ATAVAWH`HH$MEv@$$$L`=tct[tV%!= uHLD$xHt$XH wE\$PE3ɉ|$HHD$@Hl$8Hd$0Hd$(Hd$ ^ pHT$xZt2=tH TeH%0@hH`3ҍJH$MHT$0Eljt$(H͉\$ I3H؍J=HtL$E3HAQtHL\$`I[ Ik(Is0I{8IA_A^A\LHhE3L9GABDDHD$hICHw`ESICH$ICȋ$D$($D$ HhHhHD$hHD$PH[D$HHD$8H$HD$0$D$($D$ HhHHXHhHpHx ATAVAWH`HH$ME>$$$L`=tct[tV%!= uHLD$xHt$XH C\$PE3ɉ|$HHl$@HD$8Hd$0Hd$(Hd$ HT$x?Xt2=ptH ~eH%0@hH`3ҍJH$MHT$0Eljt$(H͉\$ I3H؍JHtL$E3HAQHL\$`I[ Ik(Is0I{8IA_A^A\LHhE3L9ABDDHD$hICH^ESICH$ICȋ$D$($D$ HhHhHD$hHD$PH D$HHD$8H$HD$0$D$($D$ HhH\$UVWAVAWHH`HEPLH]XH LHUHE@H]8LELMH;=u`Lxt=.@tDƺHDHE8t$0HD$(LMHHE@ILEHD$ HU6HMpHLMHILEHUHL$@HMhHL$8HM8t$0HL$(HM@HL$ IEPHtFH c39]XtLEXHHUP]XH 6x;uH@}PuJt0J@t#%}+ƃƅu*EPH$H`A_A^_^]H\$Hl$Ht$WHPHHH zJII#:L$LD$HH$H@LT$@L$LT$8DD$0LHL$(H$HL$ H=uIt/Hl$hH\$`Ht$pHP_H\$UVWHH`HE@HHE0H IHEHHU HE(LELM8U9d$0LM8LEHHUHXHE(HD$(HE0HD$ HM`HLM8HLEHUHL$@HMXHL$8MPL$0HM(HL$(HM0HL$ HE@HtFH 8r39]HtLEHHHU@Y]HH M;uH}@uHt.H@t#T%}+ǃDžu(E@H$H`_^]H\$Hl$Ht$WHPHH!H JHII7L$LD$HH$H@LT$@L$LT$8DD$0LHL$(H$HL$ H=uGt-Hl$hH\$`Ht$pHP_H\$UVWATAUAVAWHl$HHEg3HUHHUOH |GLMDS}LELEWDLM_DHEH]791HuwDmoH@HEt}HU?A@upHtkH zH;r_H vH;sSL&H 'aHHH;tHHH;y(uL9uHAH +Eu?HE߉\$0HD$(LM_HEHLEWHD$ HUO0HUOLHELEWLM_HULELMHEgL$HHHL$@ML$8HHt$0Dl$(HD$ HEEOMtJH E9]gtLEgIHUOh]g}OH YuI AuHtL&uEt+H$HĐA_A^A]A\_^]H\$UVWATAUAVAWHHpLe`3HHUHLLEPH ^ELMXS~Le`MH]M4H@HEEh= t@HE\$0HD$(LMXHE`ILEPHD$ HUHH}HHEhLuPL}XLe`MωL$HMHHHL$@MxL$8HMpHL$0I͉D$(HELd$ sE`HtHH 9r]htLEhHHU`]h}`H ΪuHuDt$*H$HpA_A^A]A\_^]@USVWAVHH`HEPHHUHH D3HEPHuLE@LM83t$0LM8LE@HHUHHXHEHD$(HEPHD$ RMpLLM8HLE@HUHL$@MhL$8M`L$0HMXHL$(HMPHL$ H<E8MtHH 95;uPtLEPIHU8uP]8H UuI^uBt(H`A^_^[]H\$Hl$VWAVH03HHHl$`H BIMUp2LL$pLD$`LL$ HLHH@b9-x=HL$`HHH H$H uH;t HH;u{xtHGHH 8z;tWH aHH H;t HH;u{xtHPH(H A#;u+HKXHL$`{xtHKpHHL$`H\$PHl$XIH0A^_^HHXHhHpHx ATAVAWH@LHٺH 1AIA30L$LD$IDT$(HH@LD$ D9-D#=97v7397DIK\&HH HiH bH;t HH;u{xtHHH }t[H HH H;t HH;u{xtHHiH du+HCX3KD&{xtUHKpH;7H\$`AHl$hHt$pH|$xH@A_A^A\H\$Hl$Ht$WAVAWH HHHH h?E3 /97Lxt%H SDC8QHHHHEEHHIީ=t2xHt)HHsHk HtH L3ѥH\$@Hl$HHt$PH A_A^_HHXHhHpHx AVH0HH麃H >AM..t$`DMƉt$ HHH@$=9tYxU)uAtJuCH DB0=HHt%Hh)uAH( uIHBHHl$HH\$@Ht$PH|$XH0A^HHXHhHpHx AVH HH麄H =T-HHH@Xxa=gtXeH %0HyHH ǣH0L5)HHH9i(uH9yu KI;uH OH\$0Ht$@Hl$8H|$HH A^H\$Hl$Ht$WH HHH <I,=HhtSH HLzI;t&HHH;x(uLHtDH9u> HpHXxH ڢLHHHH\$0Hl$8Ht$@H _H% HpI;tH\$Hl$Ht$WH@3H QMS+Hh<Ht9~ HK=eH %0HIHHHtHH L3Ht`H@8HtWH@HtHHtLK0E3HtLCE3HK@HHHd$0Hd$(H#HT$ H 1wHH\$PHl$XHt$`H@_H%H\$Hl$Ht$WH HH ;L*Hh)Ht8~ H&eH %0HIHHHtHH mL3HHH\$0Hl$8Ht$@H _H%GH\$Ht$WHPHd$pHٺH K)HHp=prmHd$ HD$pAHD$@LD$@D$LHD$HxAQ x1H|$pt)Hd$0H /Hd$(E3Hd$ E3 9t3Hd$0H 0eL%0E3Hd$(Hd$ M@H訍HH:H\$`Ht$hHP_H\$WH@HH wJ(LD$H H AE3LD$0LHd$(Hd$ HX.HHH\$PH@_H%H\$Hl$Ht$WAVAWH@HL H III_(H dLxDB8HHueH%0@h3Hp LHhLeH %0HQHH$HP($HL$(IΉP8T$ HHx0IHHuH ҞL3LD$XE3HAQձHH\$`Hl$hHt$pH@A_A^_H\$Ht$H|$AVHpHH;!AA;ux{vrH{ v#Hd$0HFLKLC(HD$(H\$ h=C,tkHd$(LL$@HS(E3HHD$ 0xB|$du |$ht1MLHd$0HFLHd$(HD$ H 0L\$p3I[IsI{ IA^@SH0Hكd$ c6@teH%0HHHHKH6HK HC$D$ Ht8~ HeH %0HIHHHtH`L3H ̜eH %0HIHxeH %0HIHD$ H0[HHXHhHpHx AVH eH4%0HILH YDB8HHuBHh H LpLHFHHHG(H|؅yH L36PHl$8H\$0Ht$@H|$HH A^H\$WH ;Ht8~ H8eH %0HIHHHtHH L3HH\$0H _H%bH H HHdH%H\$Hl$Ht$WH@H >43#HhjHt9~ HKkeH %0HIHHHtHAH L3ߚHt`H@8HtWH@HtHHtLK0E3HtLCE3HC@HHHd$0Hd$(H#HL$ H B)襇eH %0HIHeH %0HIH HH\$PHl$XHt$`H@_H%H\$Ht$ WHH7H3H$HcH;u Hu HHD$@ALD$PHD$ xsE3H5HL$PHLuNE3HHL$P3u5Hd$0H -Hd$(HLL$XHLǺHDHD$ zH$H3|L$I[ Is(I_HHHHH1t73Hu+HD$0H X-HD$(E3E3HD$ HHHHH\$Hl$Ht$WH@AIH ԝHT$HI >HT$(Hhm7t7>=tH eH%0@h3C3ҍJLË׋H`3H؍JHtLD$(E3HAQVHH\$0Hl$8Ht$@H _H\$WH HٺH 7,HxHCHw=tHcHHHǖxLD$(E3HAQ轩+@t(u%}+u H\$0H _H\$Ht$WH@HH%H +.3HHXTHHH%E3HcHtLcHD$HeH %0LHD$0HAHH AHD$(H\$ Ht$XH\$PH@_H\$WH@H&H *3HHXHHHL$HeL%0E3HL$0HcIHHLHL$(H H\$ E H\$PH@_H\$Ht$WH@HH'H O*3HHX$HHHE3HcHtLcHD$HeH %0LHD$0HAHH HD$(H\$ Ht$XH\$PH@_HHXHhHpHx AVH@L(H )AIOIHXrLL$pLLL$ DIH4HL$HeL%0E3HL$0HcIHHMHL$(H SH\$ Hl$XH\$PHt$`H|$hH@A^H\$Ht$WH@HH)H (3HHXHHHE3HcHtLcHD$HeH %0LHD$0HAHH HD$(H\$ 2Ht$XH\$PH@_H\$WH@H*H G(3HHXHHHL$HeL%0E3HL$0HcIHHLHL$(H H\$ H\$PH@_H\$Ht$WH HH+H '^HHXHHHH\$0Ht$8H _H%BH\$WH H,H W'HHX)HHH\$0H _H%H\$Ht$WH HH-H &HHXHHHH\$0Ht$8H _H%H\$Hl$Ht$WH HH.H &IFHHXiH\LHHHH\$0Hl$8Ht$@H _H%HHXHhHpHx AVH0L/H &AIIHXLL$`LLL$ DIHH\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH0HL0H %II.IHXQLL$`LLL$ HLIHH\$@Hl$HHt$PH|$XH0A^H\$Ht$WH HH1H $HHXHHHH\$0Ht$8H _H%H\$Ht$WH HH2H $NHHXqHHHH\$0Ht$8H _H%2HHXHhHpHx AVH0L3H 6$AIIHXDLƋIHΎH\$@Hl$HHt$PH|$XH0A^H\$Ht$WH HH4H #nHHXHHHH\$0Ht$8H _H%RHHXHhHpHx AVHp`3HHHDB(r3H F#V5LpHtUVH HD$xV H 6E3HD$0LH!t$(H!t$ HtH!t$ DN0LD$@3H95txH "HIw؅xx HL$Xt H xx HL$X(L\$pI[IkIs I{(IA^HHXHhHpHx AVH@HH6H %"AALpHt HHHL$xDHL$(DŋL$pHӉL$ IHH\$PHl$XHt$`H|$hH@A^HHXHhHpHx AVH0L7H v!AIIHXBLL$`LLL$ DIHH\$@Hl$HHt$PH|$XH0A^H\$WH H8H HHXHHH\$0H _H%HHXHhHpHx AVH0L9H AI?IHXbDLƋIH.H\$@Hl$HHt$PH|$XH0A^H\$WH H:H ' HHXHHH\$0H _H%ŠH\$Ht$WH Hٺ;H HpHt HHHH\$0Ht$8H _H%_HHXHhHpHx AVH0Hٺ<H fAALpHt H-HL$`DHL$ DHˋIH\$@Hl$HHt$PH|$XH0A^H\$Hl$Ht$WH HH=H IHHXLHHHH\$0Hl$8Ht$@H _H%bH\$Ht$WH HH>H oHHXAHHHH\$0Ht$8H _H%HHXHhHpHx AVH0HL?H II IHXLL$`LLL$ HLIHH\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH0HL@H uII IHXALL$`LLL$ HLIHH\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH0HLAH II IHXLLHIH|H\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH0HLBH eAI IHX1DLHIHH\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH0HLCH AI IHXDLHIH|H\$@Hl$HHt$PH|$XH0A^HHXHhHpHx AVH@HAHDH bI HLp139 t0Cu&HL$0DHL$(E3HL$ H 7oHL$pDHL$ LHHIH\$PHl$XHt$`H|$hH@A^H\$Hl$Ht$WAVAWH@DHEH II? HLxbH$HtH HL$0HD$0LHD$ LIAHLD$0HtLx)L;s$tHD$XE3HHD$ HFYH\$`Hl$hHt$pH@A_A^_H\$Hl$Ht$WH HHFH If HHXLHHHH\$0Hl$8Ht$@H _H%BHHXHhHpHx AVH@LGH FIIIHXHT$xLL$HHL$pLL$0LHT$(HL$ IH\$PHl$XHt$`H|$hH@A^H\$Hl$Ht$WH HHHH IVHHXyLHHHH\$0Hl$8Ht$@H _H%2H\$Hl$Ht$WH HHIH :IHHX LHHHH\$0Hl$8Ht$@H _H%‚H\$WH HJH HHXHHH\$0H _H%rH\$Ht$WH HHKH .HHXQHHHH\$0Ht$8H _H%HHXHhHpHx AVH@LLH IAIHXT$pDLL$xILL$(HÉT$ LϋH\$PHl$XHt$`H|$hH@A^HHXHhHpHx AVH@LMH IA/IHXRT$pDLL$xILL$(HÉT$ Lϋ H\$PHl$XHt$`H|$hH@A^H\$WH HNH HHXHHH\$0H _H%HHXHhHpHx AVH`HHOH IINHLpqHt 3Hb$L΋$LňD$HHӉL$@IH$HL$8$L$0$L$(H$HL$ HL\$`I[IkIs I{(IA^HHXHhHpHx AVHpHPH IIoHLpHt 3H$Lˊ$LƈD$XՋ$D$PH$HD$HIƈL$@$L$8H$HL$0H$HL$(H$HL$ H~L\$pI[IkIs I{(IA^H\$Hl$Ht$WAVAWH@DAHQH IHLxH$Ht L$0HD$0DHD$ LIAHP~L$0Ht x+;s'AtHD$XLHHD$ HE3RH\$`Hl$hHt$pH@A_A^_HHXHhHpHx ATAVAWHPLHRH IEHL`H$Ht L$@$HD$@HD$(LIĉt$ EIH`}L$@Ht x+;s'QtHD$hLHHD$ HE3QL\$PI[ Ik(Is0I{8IA_A^A\H\$Hl$Ht$WAVAWHPHHSH MAHHXH$HD$@L$MHL$(DHD$ HHHEDT$@v|؅x)vtHL$hE3DD$@AHL$ IPD$@L\$PIk(Is0AI[ IA_A^_H\$Hl$Ht$WH HHTH *IHHXLHHHH\$0Hl$8Ht$@H _H%{H\$Ht$WH HHUH nHHXHHHH\$0Ht$8H _H%R{HHXHhHpHx AVH HVH VLptH݋H H[HuHՋIH\$0Hl$8Ht$@H|$HH A^H%zH\$WH HWH HHXHHH\$0H _H%rzH\$Hl$Ht$WH HHXH zA&HHhIHt H7DHHHH\$0Hl$8Ht$@H _H%yH\$Ht$WH HHYH HHXHHHHH\$0Ht$8H _H%yH\$Hl$Ht$WH HHZH A6HHXYHLDHHHH\$0Hl$8Ht$@H _H%yH\$Hl$Ht$WH HH[H IHHXHHLHHHH\$0Hl$8Ht$@H _H%xxHHXHhHpHx AVH@HL\H u AAIHXADL$xDHT$pIDL$(HHT$ DHwH\$PHl$XHt$`H|$hH@A^H\$Ht$WH HH]H HpHt 3HHHHH\$0Ht$8H _H%pwHHXHhHpHx AVH0L^H v AIIHXBDLƋIHwH\$@Hl$HHt$PH|$XH0A^H\$WH H_H  HHXHHH\$0H _H%vH\$Ht$DD$WH IHHكd$@HYHx|$PuNHu 9(t:3H Uq(Hr#=tH +q̺3|HHuD$@3豄tE3LAQHH\$0Ht$8H _H8LL$83H9֎PDHD$ H8H8LL$8H D$ H8H\$Hl$Ht$WAVAWH@LHٺH V IID$LD$ID$HH@D|$0DT$(DD$ LtHuH;uDEHIDH\$`Hl$hHt$pH@A_A^_H\$Hl$VH H I_|$PHhtTCwEHT$( ut*=tH 2o̸*HHt|$Pt tH\$0Hl$8H ^H83H9D@ADL$D$ H8H8LED$ H8HHXHhHpLp AWH0HDHL$` AA,|$pLxtTCwEHT$8 tt*=tH qn̸1DDHAIr|$pttH\$@Hl$HHt$PLt$XH0A_HH3H9DPAD‰D$0HHD$ HHHHHD$0HD$ HHH\$Hl$Ht$AVH H IA|$XLptT`CwE]HT$( Bs}t*F=tH 'm̸-DƋHIq|$XttH\$0Hl$8Ht$@H A^H83H9kDHADL D$(H8H8L D$(H8HHXHhHpLp AWH0HDHL$hAA|$xLxtT2CwE'HT$8 rGt*=etH k̸9L$`DˉL$ DAHIDp|$xtAtFH\$@Hl$HHt$PLt$XH0A_HH3H9DPAD‰D$8HPHD$(D$pD$ HHHHHeD$8HD$(D$pD$ HHH\$HL$WH @HL$0IDHL$0L@nH\$8H _H\$Hl$Ht$WH0AHE3хHAADDH֋H\$@Hl$HHt$PH0_H%pnH\$Hl$Ht$WH@H 1pAHT$HI^t#=tH j̸LH$DHD$0LƋD$xՉD$(HHD$pHD$ m؅xLD$HE3HAQQ}H\$PHl$XHt$`H@_H\$Ht$WH H voIHT$( t#=tH Wi̸*LËHl؅xLD$(E3HAQ|H\$0Ht$8H _H\$Hl$Ht$WH HH3H ]I9 nHT$(Hh t#=#tH -h̸A3ҍJy{LHHHl3ҋ؍J{uLD$(SHE3{H\$0Hl$8Ht$@H _H\$Hl$Ht$WH HHH If mHT$(Hh t#=PtH Zg̸A3ҍJzLHHH l3ҋ؍JzuLD$(SHE3{H\$0Hl$8Ht$@H _H\$Hl$Ht$WAVAWHPHLH IA mHT$hLxD t#=ytH f̸mH$Lˋ$DH$IHL$@H$H|$8HL$0$L$(IΉT$ Hk؅uLD$hPHE3zL\$PI[ Ik(Is0IA_A^_H\$Hl$Ht$WAVAWHPHLH IA lHT$hLxD t#=ytH e̸mH$Lˋ$DH$IHL$@H$H|$8HL$0$L$(IΉT$ Hj؅uLD$hPHE3yL\$PI[ Ik(Is0IA_A^_H\$Hl$Ht$WH HHH I kHT$(HhK t#=tH d̸A3ҍJwLHHHPi3ҋ؍J xuLD$(SHE3IxH\$0Hl$8Ht$@H _H\$Hl$Ht$WH HHH I LjHT$(Hh{t#=tH ,d̸A3ҍJwLHHHh3ҋ؍JLx3ҍJkL$xL$(L$pL$ DDHII]H3ҍJkHtLD$HE3AQHlHH\$PHt$XH|$`Lt$hH@A_@SH ٺH H@H [H%\H\$Hl$Ht$WATAUAVAWH@MMHH=WlD$E3D9-Btt1AGu&Ll$0H YLl$(EE3Ll$ gE y]HT$ht-=D9-ξtH VW̸HtMtA t.Ll$0H Ll$(MLLl$ D$D|$(MMĉ\$ HH:Wx0u,HL$hWLHL$0H ytDL|$(LL$ ML\$@I[0Ik8Is@IA_A^A]A\_Ë$u4L9.wLl$0H Ll$(E3E3Ll$ &DLL9.CD9-r6H9_$HHXHhHpHx AVH@HAIHyHtkHtfE3t3E L!t$0DL!t$( HD$ A@RHD$HLLHD$(H͉|$ ; At)Hd$0LHd$(LHd$ H CDLHHUx0Eu+HL$HAVLLHL$0Hd$(H rH|$ VH\$PHl$XHt$`H|$hH@A^H\$Hl$Ht$WATAUAVAWHPMIHL=WWHD$39pt1AGu&H\$0H H\$(EE3H\$ B ZHT$xSt,=L9ztH S̸L$HtMt] t.H\$0H oH\$(MLH\$ }A$$MD|$HLƉ\$@HՉD$8IH$Lt$0HD$(H$HD$ Wx0u,HL$xWMLHL$0H pDL|$(LT$ L\$PI[0Ik8Is@IA_A^A]A\_H9U9oIH97$.H\$WH@HHٺ>Hd$(E3Ƀd$ LHAQ)HHV؅x-HL$HHL$0E3Hd$(LHd$ H pH\$PH@_H\$Ht$WH@HAغH覹Hd$(E3Ƀd$ LHAQH DDHHH@EV؅x-HL$HHL$0E3Hd$(LHd$ H WoHt$XH\$PH@_H%UH%ULI[IkIs WAVAWHIICMHD$(IHD$ 0MKHE3HHVQE3y+D9=3҉D$ LLJ]Q|$`u P E3Lƺ HtVA0L|$ LD$p3HQy $eH%0AH@@H9$AUMuD$h:#$M9>LL$HI; HD9x0H$Ht"uDGH [LL$HL|$0LL|$(H UL|$ u |LL$XMHH;vHHH@H\$0H _H%QH\$WH  HHt HtH MHHH@H\$0H _H%FQH\$WH 4 HHt HtH ~HHH@H\$0H _H%PH\$WH  HHt HtVH HHH@H\$0H _H%P@SH x Ht H 4HH@H [H%5PH\$ HT$HL$VWATAVAWHpHHD%E3HH$LyLI;wWEuRAVHytBD$@uAHH$I;w 3HIHsH$H$H jHHH@nOH$HpA_A^A\_^HT$HL$SVWATAUAVAWHpHHD%±E3EHH$LyM%}+u譻$HĀA_A^_^[@VWATAUAVAWHXHg1H3H$@MIDHHL$hT$HLD$`L$Hd$PH LhL$PH$ "G[tr4=utH AAtBDŽ$$H$H$H$$H$ A3HHͤHt>uHHLEAL3HALH$E3LH3O=AL$E3EH|$`H3*L$Ht$hD|$HL$L$M3HWH$MLAHIL_DAHD$PbLt$PHMtMIL$L3IDSH$HD$0Ht$(Ld$ MLH g]HlL$L3HR@t&%}ȃuHD$PH$@H3#HXA_A^A]A\_^H\$WH HHyHt*eH %`L3HI0@LD$(L3HHVHL$(nHB.H\$0H _H\$WH HٺH 'HxLD$(E3AQHUHL$(HHBHHH\$0H _HHXHpHxLp AWH0IIHDH NLxLD$8E33H \UHL$8HL$`HL$ LLHAI"B+H\$@Ht$HH|$PLt$XH0A_HHXHpHxLp AWH@AIHDH LxLD$HE33H THL$HHL$xHL$(HL$pHL$ DLHAIxAH\$PHt$XH|$`Lt$hH@A_H\$WH HLHH3E3蠿LD$(L3HH\$0H _TH\$Ht$WH H3H SIH@pLH׋H\$0Ht$8H _H%@HHXHhHpHx AVH@HٺqH IIOLp39_Xt,s&HD$0H {HD$(E3E3HD$ )HL$xLHL$(LHL$pHHL$ IƋ@H\$PHl$XHt$`H|$hH@A^H\$WH HٺH eH%`HxH;Z0t HT$(H"THHH\$0H _H%?@SH HٺH JH@HH [H%D?H\$Ht$WH HڋHd$@H HpHT$( o@t7=¡tH R:eH%0@h3BHL$(HӋH>HHD$@HtLD$(E3AQHMHH\$0Ht$8H _HHXHpHxAVH AHHH` H LpHT$( ?t7=٠tH i9eH%0@h3bLD$(E3AQHPHL$(DHHI=HHD$HHtLD$(E3AQHHuHLHH\$0Ht$8H|$@H A^H\$WH H*H HXLD$(E3AQH"PHL$(HHH<HHtLD$(E3AQHKHH\$0H _H\$Ht$WH HڋHd$@H yHpHT$( =(t7=BtH `7eH%0@h3BHL$(kHӋH<HHD$@HtLD$(E3AQHKHH\$0Ht$8H _HHXHpHxAVH AHHH` H !Lp1HT$( =?t7=YtH w6eH%0@h3bLD$(E3AQHHNHL$(nDHHI;HHD$HHtLD$(E3AQHHuH JHH\$0Ht$8H|$@H A^H\$WH H+H '薿HXLD$(E3AQHMHL$(HH{:HHtLD$(E3AQHvIHH\$0H _H\$WH H3H Z HxHL$(OHH:H HtLD$(E3AQHHHH\$0H _H\$Ht$WH HHH 莾HpHL$(HHH9HHtLD$(E3AQHHHH\$0Ht$8H _H\$Ht$WH HHٺH _HpHtLD$(E3AQHLHL$(;HHH8HHtLD$(E3AQHGHH\$0Ht$8H _H\$WH HٺH vHxLD$(E3AQHKHL$(HH[8eH\$0H _H\$WH Hٺ H WHxHL$(LHH7HHtLD$(E3AQHFHH\$0H _H\$WH Hٺ H 薼HxHL$(HH7HHtLD$(E3AQHFHH\$0H _H\$WH HٺH w&HxHL$(lHH7H'HtLD$(E3AQHFHH\$0H _H\$WH HٺH 趻HxLD$(E3AQHIHL$(HH6H\$0H _H\$WH HٺH FHxHL$(HH?6HGHtLD$(E3AQH:EHH\$0H _H\$WH HٺH 'ֺHxLD$(E3AQHHHL$(HH5H\$0H _H\$WH HHd$83H cHx,HT$( 6t'=Ct H I03@HL$(dHH5HHD$8HtLD$(E3AQH DHH\$0H _HHXHpHx AVH HH`H1H B葹LpZHT$( 6?t'@=qt H w~/3XLD$(E3AQHXGHL$(~HHI.4؉D$03LD$(E3AQtHH"CH\$8Ht$@H|$HH A^H\$Ht$WH HHd$@H Z詸HprHT$( 5Wt'X=t H }/3BHL$(HH[3HHD$@^HtLD$(E3AQHQBHH\$0Ht$8H _H\$Ht$WAVAWH ALHd$@H1H ϷLxHT$8 E4}t'~=t H |'.3[LD$8E3AQHEHL$8DIHIi2؉D$@nLD$8E3AQtHH]AH\$HHt$PH A_A^_H\$Ht$WH HHd$@H ٶHpHT$( O3t'=t H {1-3BHL$(HH1HHD$@HtLD$(E3AQH@HH\$0Ht$8H _H\$WH HH LD$(E3HHXAQ"DHHH\$0H _H%0HHXHhHpHx AVH E3HH ZAAAV螵HhHt!fuHwAVLD$(HE3CHH|0tfuLD$(E3HAQx?H\$0H|$HHl$8Ht$@H A^H\$Ht$H|$AVH I؋H-H LpHL$(HH\$0Ht$8H|$@H A^HLH L@PHHSVWATAVAWHxMIDHH`.H SL`Ld$XHu3HHt;u HH2/LAH+HHD$PE3LH3胭?Ht$PE3DH$H3_L$D$H$Ld$XL$L3HAH$MLAHI.HL$L3HHuH=HHxA_A^A\_^[HL@PHHSVWAVAWH`IDH` /H LxL|$HHu3HHt?u HH-LAH*HHD$@E3LH3-7Ht$@E3DH$H3 D$H$L|$HL$L3Hw@H$LAHIG-PuL$L3HCHL$(HH+H\$0H _H\$HT$HL$VWAVH`HLuJ<HI+Et?uHHt ?uHHH2@t9eH%0HHeH%0\$0H|$(L$ DH@LWv3ҍJ],'LúHH$L$eL%0H$HD$0Hd$(Ht$ MM@HH DxH$H`A^_^H\$Hl$Ht$WAVAWH@$H AI!Lc$DL$LDt$(H@L|$ *Hc؅= tQMtLE~GHT$XH y}Avu,=ܾt$HD$XLIHD$ MHAIHl$hH\$`Ht$pH@A_A^_H\$Hl$Ht$WAVAWHP%H AI1L$DLc$LL$H@LT$8L$LT$0Dt$(L|$ (Hc؅5tJMtEE~@HT$hH o|Dju#5нtHD$hLIHD$ DIL\$PI[ Ik(Is0IA_A^_H\$Hl$Ht$WH0HHH II3LLHHH@1(Hc؅~/Ht*+tHL$8LHL$ AHHoHl$HH\$@Ht$PH0_H\$Ht$H|$AVH0LH H II蒬LLIHH@'Hc؅=tN~JHtEHT$8H {Au*=ft"HD$8K6LHD$ MAHHt$HH\$@H|$PH0A^LD$LL$ H(LL$HxH(LD$LL$ H(LL$HH(H\$Hl$Ht$WH0HH`H IIcLLHHH@a&Hc؅~/Ht*[tHL$8LHL$ AHHHl$HH\$@Ht$PH0_H\$Ht$H|$AVH0LHaH IIªLLIHH@%Hc؅~3Ht.t"HL$8K6HL$ LHMAHt$HH\$@H|$PH0A^LD$LL$ H(LL$HH(LD$LL$ H(LL$HH(@SH@3AA;tDH GDH iAA?ILI9PtAHI;u *t&LH 4RE3H\$0H\$(H\$ HH@[HXH\$WH H I3HXJ2HF$3ҋJ3v&3 ϺVH DB(@HHHL$(HH(H lx !C"Hh?HKHHHH9Bt)HHAHJHH l!H xHK(HtDHH0H(H9t)HHKHHXR tLC(H ZS H[HH w vH\$0H _H\$Ht$WH H C貧Ϸ HpH k }HHu2H zk eH%0@hW3HHHHH9BH9u~HHJH 'kA H vHHCH9ZuIH9uDHH vHBH L3H!H\$0Ht$8H _ù))H\$Ht$WH H r HptVuIH ^j`EH JjHaHuteH%0@hW3H!H\$0Ht$8H _H\$Hl$Ht$WH H H K躥׵ HhtVuIH iH iHHuteH%0@hW3)3ҍJ.H֋HS 3ҋ؍J/H\$0Hl$8Ht$@H _ffH; i uHfuH2H(I HH(HL$HH ]HIHD$HE3HT$PHL$HHD$@H|$@tAHD$8HD$XHD$0HD$`HD$(H HD$ LL$@LD$HHT$P3"H$HH$HHbHH,H$H- HkH HHkH  HLhHkH HLhH  HHĈH(H(̉L$H(H HD$(HHD$(HHlHH6  HkH T$0HH 9H(H(H= tH2-+H9 u H HHHH(HL$HH$ H$HHD$HHL$HHHH3D$ HH#HL$ HHD$ H8tHD$ H2-+H9uHD$ H3-+HHH(uH(%%%%% %\H(MA8HIH(@SEHALALtA@McPLHcL#IcJHCHHKAt AHLL3I[HHXHhHpHx AVH MQ8HMHIHIAHILCZD[DUA#AAfDDEtLMHHH\$0Hl$8Ht$@H|$HH A^%2%.%*ff@UHPHH8uSH&HD$HHd$@H&HD$8Hd$0H&HD$(Hd$ L !LE`H,"3HP]@UH HHM0HM u(M?p??P@@0AABBCDE`FFpGH`IJKK@M0N0OOPPQQ@RpR0STVVW*FaultInjectionIncludeDllsFaultInjectionExcludeDllsFaultInjectionTimeOutFaultInjectionProbabilityAVRF: fault injecting call made from %p AVRF:FINJ: invalid fault injection class %X Not used.Current thread using the heapLast thread that used the heapHeap handlemultithreaded access in HEAP_NO_SERIALIZE heapheap handle with incorrect signature\KernelObjects\HighCommitConditionPage heap: pid 0x%X: page heap enabled with flags 0x%X. Process heap handleattempt to destroy process heapSize requestedextreme size requestAddressHeapRootPage heap: freeing a null pointerPage heap countActual countprocess heap list count is wrongCorruption AddressBlock sizeHeap blockcorrupted headerblock already freedcorruption addresscorrupted infix pattern for freed blockHeap owning the blockHeap used in the callcorrupted heap pointer or using wrong heapcorrupted suffix patterncorrupted prefix patternCorrupted stampcorrupted start stampcorrupted end stampException codeexception raised while verifying blockcorrupted heap blockheap signatureheap blockvirtual storage list entrylist headlist countAVRF: Reached the end of heap list without finding heap index %x. Total number of heaps %x heap list entryAVRF: EntryContents.Blink = %p, expected %p VerifierRegisterLayerAVRF: Spy [%s, %u]: %X VerifierRegisterBasicsLayersVerifierUnregisterLayerVerifierUnregisterBasicsLayersThis verifier stop is continuable. After debugging it use `go' to continue.This verifier stop is not continuable. Process will be terminated when you use the `go' debugger command. =========================================================== VERIFIER STOP %p: pid 0x%X: %s %p : %s %p : %s %p : %s %p : %s =========================================================== %s =========================================================== AVRF: Noncontinuable verifier stop %Ix encountered. Terminating process ... AVRF: Terminate process after verifier stop failed with %X AVRF: Invalid LayerDescriptor or BreakDecriptor passed for Stop code 0x%XAVRF: Invalid Stop code 0x%X passed to VerifierStopMessageExAVRF: Failed to initialize logging and stop support%s AVRF:bogus string length, overflow AVRF:Failed to save message into stop list StopProcessingstop codeadvapi32.dllRegCreateKeyExWRegCloseKeyRegQueryValueExWRegSetValueExWRegDeleteValueWSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GlobalFlagAVRF: settings: result %u %x0x%08XVerifierFlags{9760941A-8DA5-4dbe-843B-0EBD376CAB02}HandlesBasics{159D60EC-F459-456b-A27B-1076AD59F8F4}Locks{EDDA96DB-D216-467d-BE3C-8603745EDA43}TLS{8A70B8A4-4FA6-41c3-85EE-595FCB3E1051}Memory{F86B022F-E589-4e8f-B0DD-6B7AF9D71A59}Exceptions{970bd287-2e5a-4a06-9084-9e394d4c2697}DirtyStacksMiscellaneous{02A5B40C-2F22-4409-BB37-7EF0D3F34A88}DangerousAPIs{de35a0c0-d3b8-11d9-8cd5-0800200c9a66}TimeRollOver{F15FC24E-53A0-444D-8D28-F7697EDD9C83}Threadpool{5FE32372-CE71-43f9-B75D-6AD4B1B08D6A}InputOutput{81EEC8DA-0E61-4942-8037-9A6C4A86510D}Leak{6335D1CF-7955-414e-8C6A-1A40AC9357AC}SRWLockntdll.dllLdrGetProcedureAddressForCallerAVRF: AVrfpLdrGetProcedureAddress (%p, %s) -> new address %p PageHeapSizeRangeStartPageHeapSizeRangeEndPageHeapRandomProbabilityPageHeapDllRangeStartPageHeapDllRangeEndPageHeapTargetDllsPageHeapVirtualMemoryPercentPageHeapCommitMemoryPercentThreadTrackerSizeHeapTrackerSizeVspaceTrackerSizeDllLoadUnloadTrackerSizeCritsectDeleteTrackerSizeOutbuffTrackerSizeThreadpoolTrackerSizeForcePendingIOTrackerSizeEventTrackerSizeDelayFreeSizeMBAVRF: failed to initialize call trackers (%X). AVRF: failed to initialize FreeMemoryCallBacks (%X). AVRF: VerifierRegisterBasicsLayers failed. AVRF: VerifierLoadEssentialStrings failed, status %#x AVRF: NtQuerySystemInformation (SystemBasicInformation) failed, status %#x OANOCACHE1AVRF: failed to define OANOCACHE variable (%X). AVRF: Failed to initialize verifier.dll provider for %ws with flags 0x%X. AVRF: verifier.dll provider initialized for %ws with flags 0x%X AVRF: Exception during verifier.dll init for %ws with flags 0x%X. ntdll.dllNtSuspendProcessNtResumeProcessAVRF: failed to create verifier heap. AVRF: failed to initialize verifier stop logic (%X). RtlReportExceptionAVRF: Exception %x from address %p Dirtying stack range %p - %p for thread %p AVRF: failed to allocated a verifier TLS slot. Context record. Use .cxr to display it.Exception record. Use .exr to display it.Code performing invalid accessInvalid address being accessedfirst chance access violation for current stack traceAVRF: failed to add free memory callback @ %p AVRF: attempt to delete invalid free memory callback @ %p Stack low limit addressDLL name address. Use du to dump it.DLL memory range sizeDLL memory base addressUnloading DLL inside current thread's stack address rangeAVRF: Couldn't read %s @ %p AVRF: Read just %Ix out of %Ix bytes of %s @ %p RtlInitializeSRWLockRtlReleaseSRWLockExclusiveRtlReleaseSRWLockSharedRtlAcquireSRWLockExclusiveRtlAcquireSRWLockSharedRtlCreateMemoryBlockLookasideRtlExtendMemoryBlockLookasideRtlAllocateMemoryBlockLookasideRtlFreeMemoryBlockLookasideNtAllocateVirtualMemoryNtFreeVirtualMemoryNtMapViewOfSectionNtUnmapViewOfSectionNtUnmapViewOfSectionExNtCreateSectionNtOpenSectionNtCreateFileNtOpenFileNtCreateKeyNtOpenKeyRtlTryEnterCriticalSectionRtlEnterCriticalSectionRtlLeaveCriticalSectionRtlInitializeCriticalSectionRtlInitializeCriticalSectionAndSpinCountRtlDeleteCriticalSectionRtlInitializeResourceRtlDeleteResourceRtlAcquireResourceSharedRtlAcquireResourceExclusiveRtlReleaseResourceRtlConvertSharedToExclusiveRtlConvertExclusiveToSharedNtCreateEventNtOpenEventNtCloseRtlAllocateHeapRtlReAllocateHeapRtlFreeHeapNtReadFileNtReadFileScatterNtWriteFileNtWriteFileGatherNtWaitForSingleObjectNtWaitForMultipleObjectsRtlSetThreadPoolStartFuncNtSetEventNtClearEventNtPulseEventNtQueryEventNtResetEventNtSetEventBoostPriorityNtAlertResumeThreadNtAlertThreadNtGetContextThreadNtImpersonateThreadNtQueryInformationThreadNtQueueApcThreadNtResumeThreadNtSetContextThreadNtSetInformationThreadNtSuspendThreadNtTerminateThreadNtGetNextThreadNtQueryInformationProcessNtSetInformationProcessNtTerminateProcessNtGetNextProcessNtAllocateUserPhysicalPagesNtExtendSectionNtReadVirtualMemoryNtWriteVirtualMemoryNtFlushVirtualMemoryNtLockVirtualMemoryNtUnlockVirtualMemoryNtProtectVirtualMemoryNtQuerySectionNtFreeUserPhysicalPagesNtGetWriteWatchNtResetWriteWatchNtFlushInstructionCacheNtDeleteKeyNtDeleteValueKeyNtEnumerateKeyNtEnumerateValueKeyNtFlushKeyNtNotifyChangeKeyNtNotifyChangeMultipleKeysNtQueryKeyNtQueryValueKeyNtQueryMultipleValueKeyNtReplaceKeyNtRenameKeyNtCompactKeysNtCompressKeyNtRestoreKeyNtSaveKeyNtSaveKeyExNtSaveMergedKeysNtSetValueKeyNtUnloadKeyExNtSetInformationKeyNtLockRegistryKey_vsnprintf_vsnwprintf_snprintf_snwprintfLdrLoadDllLdrUnloadDllRtlInitializeCriticalSectionExTpAllocWorkTpAllocTimerTpAllocWaitTpAllocIoCompletionTpReleaseIoCompletionTpAllocAlpcCompletionTpSimpleTryPostTpCallbackLeaveCriticalSectionOnCompletionTpCallbackDetectedUnrecoverableErrorRtlQueueWorkItemRtlCreateHeapRtlRegisterWaitRtlDeregisterWaitExRtlDeregisterWaitRtlCreateTimerQueueRtlDeleteTimerQueueExRtlDeleteTimerQueueRtlCreateTimerRtlDeleteTimerRtlUpdateTimerRtlCancelTimerRtlSetTimerNtDeviceIoControlFileNtFsControlFileNtRemoveIoCompletionNtRemoveIoCompletionExRtlExitUserThreadRtlSetIoCompletionCallbackNtSetInformationFileNtCancelIoFileNtCancelIoFileExRtlDeleteSecurityObjectRtlDestroyHeapNtNotifyChangeDirectoryFileNtDuplicateObjectRtlTryAcquireSRWLockExclusiveRtlAcquireReleaseSRWLockExclusiveRtlTryAcquireSRWLockSharedRtlSleepConditionVariableSRWRtlFreeUnicodeStringRtlFreeSidRtlExitUserProcessRtlSetSecurityObjectRtlSetSecurityObjectExLdrGetProcedureAddressHeapCreateHeapDestroyCloseHandleExitThreadTerminateThreadSuspendThreadTlsAllocTlsFreeTlsGetValueTlsSetValueCreateThreadWaitForSingleObjectWaitForMultipleObjectsWaitForSingleObjectExWaitForMultipleObjectsExGlobalAllocGlobalReAllocLocalAllocLocalReAllocCreateFileACreateFileWFreeLibraryAndExitThreadGetTickCountIsBadReadPtrIsBadHugeReadPtrIsBadWritePtrIsBadHugeWritePtrIsBadCodePtrIsBadStringPtrAIsBadStringPtrWVirtualFreeVirtualFreeExCreateEventACreateEventWOpenEventAOpenEventWMultiByteToWideCharWideCharToMultiByteUnmapViewOfFileUnmapViewOfFileExSetThreadAffinityMaskSetThreadPriorityGlobalFreeLocalFreeVirtualAllocHeapAllocHeapReAllocHeapFreeSetProcessWorkingSetSizeExSetProcessWorkingSetSizeRegCreateKeyARegCreateKeyWRegCreateKeyExARegOpenKeyARegOpenKeyWRegOpenKeyExARegOpenKeyExWRegNotifyChangeKeyValueRegSetValueARegSetValueWRegSetValueExAmalloccallocreallocfree??2@YAPEAX_K@Z??3@YAXPEAX@Z??_U@YAPEAX_K@Z??_V@YAXPEAX@Z_strdup_wcsdup_mbsdupCoInitializeCoInitializeExCoUninitializeRoInitializeRoUninitializeCoTaskMemAllocCoTaskMemReallocCoTaskMemFreePostThreadMessageWPostThreadMessageAPostMessageWPostMessageAPostQuitMessageRegisterPowerSettingNotificationUnregisterPowerSettingNotificationSetClipboardDataSysAllocStringSysReAllocStringSysAllocStringLenSysReAllocStringLenSysAllocStringByteLenSysFreeStringVariantClearSetupDiCreateDevRegKeyASetupDiCreateDevRegKeyWSetupDiOpenDevRegKeykernel32.dllmsvcrt.dllole32.dlluser32.dllsetupapi.dlloleaut32.dllkernelbase.dllcombase.dllAVRF: internal error: we do not have a replacement for %s !!! vfbasics.dllAVRF: %ws: null entry point. AVRF: %ws @ %p: entry point @ %p . mfplat.dllnsi.dllthreadpoolwinrt.dllrtworkq.dllAVRF: low memory: will not verify entry point for %ws . AVRF: hooked dll entry point for dll %ws AVRF: dll entry @ %p (%ws, %x) AVRF: failed to get dll base of user32.dll. AVRF: TLS slot %x allocated by code at %p. AVRF: AVrfpLdrLoadDll (%p, %ws) AVRF: AVrfpLdrUnLoadDll (%p) winlogon.exesppsvc.exeOESpamFilter.dllMSWSOCK.DLLgdiplus.dllTTTraceWriter.dlllicwmi.dlldpcdll.dlllicdll.dllSbscrdll.dllUSER32.DLLDNSAPI.DLLmswsock.dllSPOOLSS.DLLlocalspl.dllNETAPI32.DLLnetlogon.dllasfsipc.dllframedyn.dlliac25_32.axrpcss.dllODBC32.dllcatsrv.dllGDI32.DLLiuengine.dllUxTheme.dllWINHTTP.DLLCritical section debug info addressLock countCritical section addresscritical section over-released or corruptedNumber of critical sections owned by current thread. %p (CS = %p, DebugInfo = %p), left %p, right %p, parent %p ================================================ Critical section tree root = %p ================================================ AVrfpInsertCritSectInSplayTree( %p ) AVrfpFindCritSectInSplayTree( %p ) AVrfpDeleteCritSectFromSplayTree( %p ) AVrfpInitializeCriticalSectionCommon (%p, %x, %x)) AVRF: InitializeCriticalSection (%p) - no tree node. AVRF: InitializeCriticalSection (%p) - out of memory - DebugInfo is not valid. AVrfpRtlDeleteCriticalSection (%p) AVrfpRtlInitializeResource (%p), CS = %p AVrfpRtlDeleteResource (%p), CS = %p Number of critical sections owned by curent thread.current thread doesn't own locksAVRF: AVrfpCheckStaticInitializedCriticalSection (%p) - no tree node. AVRF: checking CS @ %p (debug info @ %p) **************************************************************************** ** ** ** Potential deadlock detected! ** ** Type !avrf -dlck in the debugger for more information. ** Deadlock detection: Must release resources in reverse-order Resource %p acquired before resource %p -- Current thread (%p) is trying to release it first AVRF: Overflow for BytesAllocated (%p) + Size(%p) AVRF: deadlock: stop: %p %p %p %p Application verifier deadlock/resource issueEnumThreadWindowsRealGetWindowClassWPeekMessageWwudfhost.exeUNKNOWNadsldp.dlladsldpc.dlldetours.dlldeviceaccess.dlldhcpcore.dlldhcpcore6.dlldiagperf.dllesent.dllfirewall.cplfirewallapi.dllfxsst.dllieframe.dlliessetup.dlljscript.dlllogger.ocxmpssvc.dllmscories.dllmsfeeds.dllPerftrack.dllpwrshsip.dllradardt.dllrometadata.dllShimEng.dlltaskschd.dlltrkwks.dllUNTFS.dllUrlmon.dllVSSAPI.DLLwab32.dllwbemcons.dllwebclnt.dllwercplsupport.dllwinspool.drvwintypes.dllWLDAP32.dllwmp.dll,(null)\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\\REGISTRY\USER\\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VerifierAppLaunchCountPageHeapFlagsAVRF: %ws Failed to close event 0x%p with Status 0x%X AVRF: %ws Failed to close handle 0x%p with Status 0x%X AVRF: %ws Failed to close event 0x%p with Status 0x%X in event completion callback AVRF: %ws Failed to clear event 0x%p with Status 0x%X AVRF: %ws Failed to create event with Status 0x%X AVRF: %ws Failed to register wait callback with Status 0x%X AVRF: conditional breakpoint %X hit. EventThreadProcessSectionKeyFileEventOrProcessAVrfpFreeVirtualMemNotify: NtQueryVirtualMemory( %p ) failed %x Buffer sizeBuffer start addressUnexpected exception raised while initializing output buffer.AVRF: (%x, %x) AVrfpInitOutputBuffer filling Buffer 0x%p, size 0x%x W%W RSDS7n/gEoKϛverifier.pdbGCTLpL.text$mnp\.text$mn$00\.text$xp.rdata$brcr.idata$5w.00cfgw.cfguard@}XF.rdata.rdata$zzzdbgP.xdataD.edata$.idata$28.idata$3P.idata$4& .idata$6b.data$brcbp.data`s.bss.pdata.rsrc$01.rsrc$02 T 4 2 p `  4 2p d T 4 2pt T 4 rT42 pd42 pdT42pB$[  [ '\'P 6p`0$[$d4 p$[42 pR p `0d 42 p  0[$$\$2Pd T 4Rp  4 2p0 t dT42 dT 4 rp4 rp`P) d-T,4+(p$[0 0$[" ""t"d"4"P tdT 4  dT4pd 4  p 4p ` P t d T 42  4 p dT 4 Rp20 dT4p  0[OPR]P  0[PQ\Q [QTR]TR t d T 42 T 4 R p `% 4 p`P$[`  4 R p`[QXX]  4 RpR0b 4p`P' f p`0[Jbg$^"  PtT42d 4R p2 p ` 04p`P  4 RP P0$[p%t4 P$[d4 p$[`Bp ` P 0  p`P0$[Ht d 4RP' d 4 2 p P$[d T 4 Rp t2d140,[U^RP2`dT 4 pd T42p T4r p `%"460p`P$[p  4 Rp`P- 5td43 P$[@ T 4 Rp` dT 4 Rp4rp ` P' / p`0P$[`1 E#td4C P$[  4 rp- 5td43 P$[P- 5td43 P$[P- 5td43 P$[X95+t$d43 P$[d 4 r p- E4 C p`P$[4p`P 4 p`P 4r p`P  4 P0 4 p`P$[$ $4&$p`P& 45, p`P$[P tdT 4 rT 4R `  4 ` tdT4r0' T140* p `$[@ 20[Leet d 4R[^0  4 p  rPd4 p$[`  20% %d %T %4 %2!p-  p`0P$[$  p`P0$[`d4p[^^ dT4rpd T 4 rp t d T 4Rr `0P d T 42ppd 4  pT4 r p ` T4r p `d 4 r p[C/M/_n/x/!_./?_rPR0[0U0b_d 4R p- dLTK4JFp$[   p ` 0[777`888  4 2`Bp`P0t d4T 42p` 4p`P T4 Rp`t 4  P R0[WWW!44.p`P$[` dT4p dT4p dT4pd4p["cdc_td4[cd_% %%t%d%4%[dd_% %%t%d%4%[Eee_4 p[e'>bd42 p[>>b  4 2p[A?N?b  4 2p[??b  4 2p[ @@b  4 2p[}@@b  4 2p[AAb  4 2p[]AlAb  4 2p[AAb  4 2p[BBbt d42[kCCbd42 p[?DUDbd 4 2 p[-EEEbd42 p[F%Fbtd42[GGbp`0[VHHbHII0cp`0[IIJcIOJcJc  4 2p[JJbd42 p[^KtKb  4 2p[KLb 4p`[LLcLt d 4RBB    "ŒW pPp0М0P@]m]/MmCk *Ng VERIFIER.dllAVrfAPILookupCallbackVerifierAddFreeMemoryCallbackVerifierCheckPageHeapAllocationVerifierCreateRpcPageHeapVerifierDeleteFreeMemoryCallbackVerifierDestroyRpcPageHeapVerifierDisableFaultInjectionExclusionRangeVerifierDisableFaultInjectionTargetRangeVerifierEnableFaultInjectionExclusionRangeVerifierEnableFaultInjectionTargetRangeVerifierEnumerateResourceVerifierForceNormalHeapVerifierGetInfoForExceptionVerifierGetMemoryForDumpVerifierGetPropertyValueByNameVerifierGetProviderHelperVerifierIsAddressInAnyPageHeapVerifierIsCurrentThreadHoldingLocksVerifierIsDllEntryActiveVerifierIsPerUserSettingsEnabledVerifierQueryRuntimeFlagsVerifierRedirectStopFunctionsVerifierSetFaultInjectionProbabilityVerifierSetFlagsVerifierSetRuntimeFlagsVerifierStopMessagePhr.Ff0Nl.D`z":\l(8N\n"6Jj~6Jr|(Jbt4Xt:FRl"@Vfz6Bb|D`nbRtlDllShutdownInProgressRtlAllocateHeap!RtlInitUnicodeString(RtlInitializeCriticalSectionNtQueryPerformanceCounterNtQuerySystemTimeRtlCompareUnicodeStringRtlRandom!DbgPrintRtlCaptureStackBackTraceyRtlEnterCriticalSectiontRtlLeaveCriticalSectionRtlUpcaseUnicodeCharRtlAcquireSRWLockExclusiveRtlReleaseSRWLockExclusiveRtlAcquireSRWLockSharedRtlReleaseSRWLockSharedNtQueryVirtualMemoryRtlRaiseExceptionNtAllocateVirtualMemoryNtQuerySystemInformationNtQueryEventNtQueryInformationProcessPNtFreeVirtualMemoryRtlFlushSecureMemoryCacheNtProtectVirtualMemoryRtlLookupElementGenericTableAvl7RtlInsertElementGenericTableAvlDRtlDeleteElementGenericTableAvlRtlFreeHeapNtOpenEvent3RtlInitializeSRWLock"DbgPrintEx*RtlSetHeapInformation*RtlInitializeCriticalSectionExRtlCreateHeapBRtlDeleteCriticalSectionZRtlDestroyHeap-RtlInitializeGenericTableAvl~RtlEnumerateGenericTableAvlRtlGetUserInfoHeapFRtlSetUserValueHeapERtlSetUserFlagsHeapRtlLockHeapRtlUnlockHeapNtReadVirtualMemoryMRtlSizeHeapRtlValidateHeapLdrLockLoaderLockLdrUnlockLoaderLockTNtTerminateProcessLdrLoadDllLdrUnloadDllRtlInitAnsiStringzLdrGetProcedureAddresssRtlEncodePointer6RtlDecodePointernLdrFindResource_UbLdrAccessResourceRtlUnicodeStringToAnsiStringRtlFreeAnsiStringLdrQueryImageFileExecutionOptionsLdrQueryImageFileKeyOptionRtlImageNtHeader'RtlSetEnvironmentVariableuNtWriteVirtualMemoryRtlCaptureContextRtlLookupFunctionEntryRtlVirtualUnwindRtlUnhandledExceptionFilterntdll.dllmemmoveh_vsnwprintff_vsnprintfk_wcsicmpsscanf_swcstoulRtlVerifyVersionInfowcsstrT_stricmpLVerSetConditionMaskRtlQueryHeapInformationNtOpenThreadRtlAddVectoredExceptionHandlerRtlEqualUnicodeStringQNtSuspendThreadrLdrGetDllHandleKRtlDeleteResourceRtlAcquireResourceShared*NtDelayExecutionRtlAcquirePebLockRtlReleaseResourceNtClose1RtlInitializeResourceRtlAcquireResourceExclusiveRtlRemoveVectoredExceptionHandlerNtQueryInformationThreadLdrQueryProcessModuleInformationRtlNtStatusToDosErrorRtlFindClearBitsAndSetNtQueryObjectRtlReleasePebLockNtResumeThreadkLdrFindEntryForAddressBRtlInterlockedPushEntrySListbRtlSplay=RtlDelete2RtlInitializeSListHeadRtlpWaitForCriticalSection)RtlInitializeCriticalSectionAndSpinCountRtlTryEnterCriticalSectionRtlConvertExclusiveToSharedRtlRaiseStatusRtlConvertSharedToExclusiveARtlInterlockedPopEntrySListRtlQueryDepthSListNtCreateEventTRtlDeregisterWaitNtSetEventRtlRegisterWaitiswspaceRtlEnumerateGenericTableWithoutSplayingAvln_wcsnicmpNtOpenProcessTokenExRtlAppendUnicodeStringToStringRtlAppendUnicodeToStringNtOpenKeyRtlConvertSidToUnicodeStringNtQueryInformationToken2NtDeleteValueKeyFNtSetValueKeyNtQueryValueKeyVNtGetContextThreadURtlDeregisterWaitExRtlWalkFrameChainNtClearEvent=RtlSetThreadPoolStartFuncRtlCheckForOrphanedCriticalSectionskNtWaitForMultipleObjectsNtCreateKeymNtWaitForSingleObjectNtCreateSectioncNtUnmapViewOfSectionNtOpenSection{NtMapViewOfSectionRtlFreeUnicodeString.__C_specific_handler/__chkstkmemcpymemsetD}P( @(, p-   p1 @ 4 @@@ @  Ћ <p  @ Њ 0B `S p@C @ U @^0 <pA@@6`:L@F0H@HpHLpGHIJK@E GLps@w hP8|}r<s^_hiPPPP `6  0pHp `!x!!ș ؙ4@5)( -H-x@-p./Ț00 1 `1@1` p-1/Л@p (pHPh@xpМp (H0`p `ȝ؝@ (P@`Pp@PОP (p8Phx@0ȟ 8HX`hx@0@Р@Q Q0@R@pRP`p0-0iijpkءlmhmHPnpn7opqآqrs s0v@vPw`wp0PȣP0(@`X7h`Hh 00p(04@4Ph55 P  Ь%'%`'8@$X`xX0 h x   p@ȩz@608Хp0S T(V8VHXp `p8ЦP9:; @P%`&xp&&0''`(Ч)+ 0@MH0N`+p@,{|`:Ȩ<ب@)pGH`I8ثBBCD0EH`FXF0}(}@p~P `p`p== `>(?0P@@@P0A`A0O O0P@Ppp?x?p?hP wx@yyȪ`zتJKKP? Q? R? S? T? U V? W  ? ))))) ) ) ? ))))))) ? ))))))) ? ")#)$)%)&)')() ? ,)-).)/)0)1)2) ? 6)7)8)9):);)<) ? @)A)B)C)D)E)F)? %%%% %!%"%? &%'%(%)%*%+%,%?"0%1%2%3%4%5%6%? :%;%<%=%>%?%@% D%E%F%G%H%I%J%? (#)#*#+#,#-#.#? 2#3#4#5#6#7#8#? <#=#>#?#@#A#B#? F#G#H#I#J#K#L#? P#Q#R#S#T#U#V#? Z#[#\#]#^#_#`#? d#e#f#g#h#i#j#? n#o#p#q#r#s#t#? x#y#z#{#|#}#~# ? ####### ? ####### ? ####### ? ####### ? #######? ?" ? ? ? ? ? ?     ?   P?"@ABCDEF? XYZ[\]^? bcdefgh? lmnopqr? vwxyz{|? ? ? ? ?" ?  ?  ?  ?  ? ? ? ? ? ?  ? ? !"#$%&? *+,-./0? 456789:? >?@ABCD? HIJKLMN? RSTUVWX?"\]^_`ab?"fghijkl? pqrstuv? z{|}~P? pqrstuvQ?"z{|}~R? ? ? ? ? ?"?"?"? ?  ? ?   ? ? ? "#$%&'(? ,-./012? 6789:;<? ? ? ? ? ? Expected minimum lock countExpected least significant bit] f2-+0   pT@H8P@@0 x8p|(((x8PH8h(0 @`@0<  d( 0 0 ( 0   pT@H8P@@0 zp0p| (( 8PH8hh(0 @`@0<   0$80 ( h0   pT@H8P@@0 x8p|(((h8PH8h(0 @`@ 0< d( 0 0 ( X0    hLP8@0H@@0   @P((h8PH8h(0 @`@ 0< @b( 0 X0    hLP8@0H@@0   @P((h8PH8h(0 @`@ 0< @b( 0 PhtY`ihpCP ns  8 7!T@!!`!"ll## $$|$%%&&j'h(!)()**++--//00)3034  506,@6U:@`:y<\<r@t@`ApA9E@E/F@FG GfGpG(H@HbHpHHHIIJJKKKL.L4LOOP$PQDQYRd`RRRSTTTWV`VW XXXYYr[ x[[\] ]aah4hDjLjkp kkkl lm$mmmnoUp\pqqrrcsps,w@w{t{||}}0̉Dwdx GP!0Мl۝|#`i pK0TXĦpy٭ ɹй߼<&d0}ltT \0L l}!h(!(H)0>Dox 0 8@ ktLLTNTlCtPA P `8 (<-h4T,h4AhH  D!L!W"`"o#x##h#M$T$%%C'L'))** -@-`.p.//q000h01h 1R1`11111202\34d333444/5@555.6h46*7D07\9hd999=;D;w;;==>>R?hX?l@t@FF{HH;IDI_K4L}NNO$OOOPtQSST TTTVVVVW,WX XjXpXY<YZLZZZ[h\-_4_bccc?dPde ee<ebflpffgDgPgggh hkhh)i0iiijj\kpklplmhmmmEnhPnnnwoop pqqrrssutvovvwwxx/y@yy8yZz`zz8z{{o||}0}} }b~ p~   3+h@$8 X` ihphĆzPp*02@h<D4M T|ipLTh h!h0hh`hpޙh<v| <$\sp|^dۣ :@hPu<|;D whs(0ҳس.4;D]d,޻ rDݽ`?hHֿD=`Ph9p@`p)0BPq@lP"h0<(ap~ +@Fh(8  (<<9h@`p xfph <0< v<V`,+ @<h <hIP<FP1<@<G<P<G<P   fp v6h@' 0 h,,D`V`6h@#00@ 8@<h x0R`  -4 O8`8T`88 cp (  0      `  ` bp6@y,<@< v V`hO`hh l;DPt     _ pd tp  !!!D$L$%%&h&b&hp&&h&"'h0's''O(`(0)4@)))*`++(+2,@,,,-$-----//y11#4L04445555T6`66h6677 7%8h08d8p8E94P9T:\`:::;;<<\=p==$=X>H`>>p?^?p???H@P@@@A(0AALAApBBBCCDD}E EVF8`FFhFiGpGG`HLI`IJJKKK$KLLL1Mp@MN0N!O`0OOOPPPPPQQQ:R@R]RpRRR'S0SThTUVVVxWWWWWW(Y0YCYLYYYZ$ZZZZ$[A[H[[[A\\\\\\L]R]]]]]^$^O^hU^^^^^^^^_!_ !_?_ ?_\_ b_________` `;`A`\` b`` `.a 4aRa Xava|aa aa ab b{b {bb bbbbb0c0cDcJcccccMd S( @Xp0H`x 8Ph(9@:X;p<=xy0H`x 8Ph345 6( 7@ 8X 9p : ; < R S T U 0 H ` x                  0  @  P  `  p                        0  @  P  `  p                        0  @  P  `  p                      0 @ P ` p             0 @ P ` p        xP(`d2,H:P(@f`X   8#n4( @H"NXVf ha0ivp s  0P.`>@*"6 ^ " & 2;r(AGLU>]T cj lmrudzH>rlp FhRX(8`4VS_VERSION_INFO 98 98?"StringFileInfo040904B0LCompanyNameMicrosoft Corporation~+FileDescriptionStandard application verifier provider dlln'FileVersion10.0.14393.0 (rs1_release.160715-1616): InternalNameverifier.dll.LegalCopyright Microsoft Corporation. All rights reserved.B OriginalFilenameverifier.dllj%ProductNameMicrosoft Windows Operating System> ProductVersion10.0.14393.0DVarFileInfo$Translation <AVRF: Terminate process after verifier stop failed with %X kThis verifier stop is not continuable. Process will be terminated when you use the `go' debugger command. LThis verifier stop is continuable. After debugging it use `go' to continue. 9AVRF: Formatting message failed in VerifierStopMessageEx LAVRF: Noncontinuable verifier stop %p encountered. Terminating process ... ======================================= VERIFIER STOP %p: pid 0x%X: %S %p : %S %p : %S %p : %S %p : %S %S ======================================= %S ======================================= ======================================= VERIFIER STOP %p: pid 0x%X: %s %p : %s %p : %s %p : %s %p : %s %s ======================================= %s ======================================= FullDllsSize SizeStartSizeEndRandRateBackwardUnalignTracesProtectNoSyncNoLockFaults FaultRateTimeOutAddr AddrStartAddrEndRandom4TRUE for full page heap. FALSE for normal page heap.iPage heap allocations for target dlls only. Name of the binaries with extension (.dll or something else).%Page heap allocations for size range.Beginning of the size range.Ending of the size range.uDecimal integer in range [0..100] representing probability to make page heap allocation vs. a normal heap allocation.Catch backwards overruns.No alignment for allocations.Collect stack tracescProtect heap internal structures. Can be used to detect random corruptions but execution is slower.LCheck for unsynchronized access. Do not use this flag for an MPheap process."Disable critical section verifier.Fault injection.Probability (1..10000) for heap calls failuresQTime during process initialization (in milliseconds) when faults are not allowed.'Page heap allocations for address rangeBeginning of the address rangeEnding of the address range'Page heap allocations with probability.DFailed within the address range where the specified dlls are loaded.Doesn't fail within those dlls.Grace period as Milliseconds. Wait API.Heap allocation.Virtual memory allocation. Registry API. File API.Event Manipulation. Map View.Ole API."Disable automatic stack expansion.Traces6Maximum number of traces in the handle history buffer.Delay"Delay until rollover in (seconds). AsyncCheck9Check asynchronous calls that require a persistent thread DllMainCheck<Check LoadLibrary/FreeLibrary calling when DllMain is active ExecWritePage4Checking the usage of executable and writable memoryFillReadBuffereFills I/O buffer with a pattern before initiating the I/O, to catch bugs around uninitialized buffersForcePendingIOVProbability in parts per million for forcing STATUS_PENDING in place of STATUS_SUCCESS ExcludeDllsUExcludes these dlls (comma separated) from leak detection. Max size is 255 charactersChecks for errors in lock usage. This might cause access violations when errors are located. A debugger is required to see the test results.Checks that applications and components use RPC correctly. Common mistakes and problems while using RPC are flagged. A debugger is required to see the test results.Checks that applications and components use COM correctly. Common mistakes and problems while using COM are flagged. A debugger is required to see the test results.Checks that applications and components use TLS (Thread Local Storage) APIs correctly. Common mistakes and problems while using TLS APIs are flagged. A debugger is required to see the test results.#Helps catch uninitialized variablesaDetects first chance access violation exceptions. A debugger is required to see the test results.Checks for handle errors. This might cause access violations when errors are located. A debugger is required to see the test results.GChecks the heap errors. A debugger is required to see the test results.Checks for adequate stack size by stopping stack growth. This causes a stack overflow error if the original stack size is too small. You can prevent this from happening by increasing the stack commit size.TChecks usage of virtual memory APIs. A debugger is required to see the test results.$Checks usage of dangerous API usage.Forces the GetTickCount API to roll over faster than they normally would. This allows applications to test their handling of timer rollover more easily.GChecks for dirty threadpool thread and other threadpool related issues.Low Resource Simulation also known as Fault Injection, tries to simulate an environment under low resources, such as out of memory.'Checks issues related to I/O transfers.VChecks that when a dll is unloaded there are no outstanding resources allocated by it.Checks for errors in SRW locks usage. Invalid SRW lock usage can result in application crashes or hangs. A debugger is required to see the test results."Dangerous call to TerminateThread.,Thread ID for the caller of Terminatethread. Not used. Not used. Not used.This stop is generated if a thread (thread ID is parameter1) is terminated explicitly using TerminateThread.This function is very dangerous because it introduces data corruption and deadlocks (as per MSDN).2Potential stack overflow in low memory conditions. Not used. Not used. Not used. Not used.This stop is generated if the initial stack commit size of a thread is such that a stack overflow can be raised in low memory conditions if stack cannot be extended.8ExitProcess called while multiple threads still running.Number of threads running. Not used. Not used. Not used.This stop is generated if a thread calls ExitProcess while there are several threads running. In such a case, internally TerminateThread will be called for each thread and this can create deadlocks or data corruptions.%LoadLibrary is called during DllMain.Dll Name (use du to dump).Dll base address. Not used. Not used.xThis stop is generated if the code inside DllMain calls LoadLibrary or FreeLibary. It's the behavior forbidden by MSDN.%FreeLibrary is called during DllMain.Dll Name (use du to dump).Dll base address. Not used. Not used.xThis stop is generated if the code inside DllMain calls LoadLibrary or FreeLibary. It's the behavior forbidden by MSDN.KSetProcessWorkingSetSize is called with MinimumWorkingSetSize = 0xFFFFFFFF. Not used. Not used. Not used. Not used./Please use MinimumWorkingSetSize = (SIZE_T) -1.KSetProcessWorkingSetSize is called with MaximumWorkingSetSize = 0xFFFFFFFF. Not used. Not used. Not used. Not used./Please use MaximumWorkingSetSize = (SIZE_T) -1.MSetProcessWorkingSetSizeEx is called with MinimumWorkingSetSize = 0xFFFFFFFF. Not used. Not used. Not used. Not used./Please use MinimumWorkingSetSize = (SIZE_T) -1.MSetProcessWorkingSetSizeEx is called with MaximumWorkingSetSize = 0xFFFFFFFF. Not used. Not used. Not used. Not used./Please use MaximumWorkingSetSize = (SIZE_T) -1./Thread that is exiting owns a critical section.HThread ID of the thread that is exiting while owning a critical section.GCritical section address. Run !cs -s <address> to get more information.+Critical section debug information address.WCritical section initialization stack trace. Run dps <address> to dump the stack trace.This stop is generated if a thread (thread ID is parameter1) is terminated, suspended or is in a state (worker thread finished a work item) in which it cannot hold a critical section. The current thread is the culprit. To debug this stop use the following debugger commands: $ kb - to get the current stack trace. If the current thread is the owner of the critical section it is probably calling ExitThread. The current thread should have released the critical section before exiting. If the current thread is calling TerminateThread or SuspendThread then it should not do this for a thread holding a critical section. $ !cs -s parameter2 - dump information about this critical section. $ ln parameter2 - to show symbols near the address of the critical section. This should help identify the leaked critical section. $ dps parameter4 - to dump the stack trace for this critical section initialization.4Unloading DLL containing an active critical section.GCritical section address. Run !cs -s <address> to get more information.WCritical section initialization stack trace. Run dps <address> to dump the stack trace.DLL name address.DLL base address.This stop is generated if a DLL has a global variable containing a critical section and the DLL is unloaded but the critical section has not been deleted. To debug this stop use the following debugger commands: $ du parameter3 - to dump the name of the culprit DLL. $ .reload dllname or .reload dllname = parameter4 - to reload the symbols for that DLL. $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the leaked critical section. $ dps parameter2 - to dump the stack trace for this critical section initialization.9Freeing heap block containing an active critical section.GCritical section address. Run !cs -s <address> to get more information.WCritical section initialization stack trace. Run dps <address> to dump the stack trace.Heap block address.Heap block size.This stop is generated if a heap allocation contains a critical section, the allocation is freed and the critical section has not been deleted. To debug this stop use the following debugger commands: $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the leaked critical section. $ dps parameter2 - to dump the stack trace for this critical section initialization. $ parameter3 and parameter4 might help understand where this heap block was allocated (the size of the allocation is probably significant).1Double initialized or corrupted critical section.GCritical section address. Run !cs -s <address> to get more information.DAddress of the debug information structure found in the active list.LFirst initialization stack trace. Run dps <address> to dump the stack trace.MSecond initialization stack trace. Run dps <address> to dump the stack trace.Usually this stop is generated if a critical section has been initialized more than one time. In this case parameter3 and parameter4 are the stack trace addresses for two of these initializations. Some other times it is possible to get this stop if the critical section or its debug information structure has been corrupted. In this second case it is possible that parameter3 and parameter4 are invalid and useless. To debug this stop: $ !cs -s -d parameter2 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This might help identify the critical section if this is a global variable. $ dps parameter3 and dps parameter4 - to identify the two code paths for initializing this critical section.2Free memory containing an active critical section.GCritical section address. Run !cs -s <address> to get more information.+Critical section debug information address.WCritical section initialization stack trace. Run dps <address> to dump the stack trace. Not used.This stop is generated if the memory containing a critical section was freed but the critical section has not been deleted using DeleteCriticalSection. To debug this stop use the following debugger commands: $ !cs -s -d parameter2 - dump information about this critical section. $ dps parameter3 - to identify the code path for initializing this critical section. In most cases the lock verifier detects immediately leaked critical sections contained in a heap allocation, a DLL range, a virtual memory allocation or a MapViewOfFile mapped memory range and issues different stops in these cases. So there are very few cases left for this verifier stop. The lock must be in a memory range freed by kernel-mode code or freed cross-process by APIs like VirtualFreeEx. Most typically this stop will be encountered if a previous stop (e.g. LOCK_IN_FREED_HEAP or LOCK_IN_UNLOADED_DLL) was continued by hitting `g' in the debugger console.Corrupted critical section.GCritical section address. Run !cs -s <address> to get more information.;Invalid debug information address of this critical section.:Address of the debug information found in the active list.FInitialization stack trace. Run dps <address> to dump the stack trace.UThis stop is generated if the DebugInfo field of the critical section is pointing freed memory. Usually another valid DebugInfo structure is found in the active critical section list. Without corruption the two pointers should be identical. To debug this stop use the following debugger commands: $ !cs -s -d parameter3 - dump information about this critical section based on the current contents of the debug info structure found in the active list (this structure is rarely corrupted so usually this information is trustworthy). $ !cs -s parameter1 - dump information about this critical section based on the current contents of the critical section structure (the structure is corrupted already so sometimes this information is NOT trustworthy). $ dps parameter4 - to identify the code path for initializing this critical section. Dump the critical section at address parameter1 and look for the corruption pattern. With good symbols for ntdll.dl you can use the following commands: $ dt ntdll!_RTL_CRITICAL_SECTION LOCK_ADDRESS $ dt ntdll!_RTL_CRITICAL_SECTION_DEBUG DEBUG_ADDRESS&Invalid critical section owner thread.GCritical section address. Run !cs -s <address> to get more information.Owning thread.Expected owning thread.$Critical section debug info address.This stop is generated if the owner thread ID is invalid in the current context. For example, the critical section is being released by a thread other than the one that acquired it. To debug this stop: $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the critical section.)Invalid critical section recursion count.GCritical section address. Run !cs -s <address> to get more information.Recursion count.Expected recursion count.$Critical section debug info address.TThis stop is generated if the recursion count field of the critical section structure is invalid in the current context. To debug this stop: $ !cs -s parameter1 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the critical section.2Deleting critical section with invalid lock count.GCritical section address. Run !cs -s <address> to get more information. Lock count.Expected lock count.Owning thread.This stop is generated if a critical section is owned by a thread if it is deleted or if the critical section is uninitialized. To debug this stop: $ !cs -s parameter1 - dump information about this critical section. If the owning thread is 0 the critical section has not been initialized. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the critical section.,Critical section over-released or corrupted.GCritical section address. Run !cs -s <address> to get more information. Lock count.Expected lock count.$Critical section debug info address.This stop is generated if a critical section is released more times than the current thread acquired it. To debug this stop: $ !cs -s parameter1 - dump information about this critical section. $ !cs -s -d parameter4 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the critical section.!Critical section not initialized.GCritical section address. Run !cs -s <address> to get more information.$Critical section debug info address. Not used. Not used.This stop is generated if a critical section is used without being initialized or after it has been deleted. To debug this stop: $ ln parameter1 - to show symbols near the address of the critical section. This should help identify the critical section.(Critical section is already initialized.GCritical section address. Run !cs -s <address> to get more information.$Critical section debug info address.AFirst initialization stack trace. Use dps to dump it if non-NULL. Not used.(This stop is generated if a critical section is reinitialized by the current thread. To debug this stop: $ !cs -s parameter1 or !cs -s -d parameter2 - dump information about this critical section. $ ln parameter1 - to show symbols near the address of the critical section. This might help identify the critical section if this is a global variable. $ dps parameter3 - to identify the code path for the first initialization of this critical section. $ kb - to display the current stack trace, that is reinitializing this critical section.=Freeing virtual memory containing an active critical section.GCritical section address. Run !cs -s <address> to get more information.LCritical section initialization stack trace. Use dps to dump it if non-NULL.Memory block address.Memory block size.This stop is generated if the current thread is calling VirtualFree on a memory block that contains an active critical section. The application should call DeleteCriticalSection on this critical section before if frees this memory. $ kb - to display the current stack trace, that is calling VirtualFree. The probable culprit is the DLL that calls VirtualFree. $ !cs -s parameter1 - dump information about this critical section. $ dps parameter2 - to identify the code path for the initialization of this critical section.>Unmapping memory region containing an active critical section.GCritical section address. Run !cs -s <address> to get more information.LCritical section initialization stack trace. Use dps to dump it if non-NULL.Memory block address.Memory block size.$This stop is generated if the current thread is calling UnmapViewOfFile on a memory block that contains an active critical section. The application should call DeleteCriticalSection on this critical section before if unmaps this memory. $ kb - to display the current stack trace, that is calling UnmapViewOfFile . The probable culprit is the DLL that calls UnmapViewOfFile. $ !cs -s parameter1 - dump information about this critical section. $ dps parameter2 - to identify the code path for the initialization of this critical section.2Current thread does not own any critical sections.GCritical section address. Run !cs -s <address> to get more information.4Number of critical sections owned by current thread.Not usedNot used,This stop is generated if the current thread is calling LeaveCriticalSection but, according to the internal verifier bookkeeping, it doesn't own any critical section. If parameter2 is zero, probably this is a bug in the current thread. It either tries to leave a critical section that it didn't enter, or maybe it is calling LeaveCriticalSection more times than it called EnterCriticalSection for the same critical section. If parameter2 is not zero (it is a negative integer number) the internal verifier data structures are probably corrupted.6Using critical section that is private to another DLL.GCritical section address. Run !cs -s <address> to get more information. Not used.Not usedNot usedThis stop is generated if the current thread tries to use a private lock that lives inside another DLL. For example a.dll tries to enter a critical section defined inside ntdll.dll. Private locks cannot be used across DLLs. The SRW Lock is not initialized.SRW LockNot usedNot usedNot used This stop is generated if a thread is trying to use the SRW lock (Param1) that is not initialized. $ kb - to get the current stack trace. This is where the SRW lock is being used. The SRW lock should be initialized using InitializeSRWLock before it can be used.$The SRW Lock is already initialized.SRW Lock5ThreadId of the thread that initialized the SRW lock.gAddress of the initialization stack trace. Use dps <address> to see where the SRW lock was initialized.Not usedDThis stop is generated if the SRW lock (Param1) is being re-initialized. If the SRW lock is being actively used by other threads, re-initializing the lock will result in unpredictable behavior by the application including hangs and crashes. The initialization stack trace may show an acquire if the SRW lock was statically initialized. $ kb - to get the current stack trace. This is where the SRW lock is being re-initialized. $ dps Param3 - to get the SRW lock initialization stack trace. This stack trace may show an acquire if the lock was statically initialized.+Mismatched Acquire-Release on the SRW lock.SRW Lock2ThreadId of the thread that acquired the SRW lock.]Address of the acquire stack trace. Use dps <address> to see where the SRW lock was acquired.Not used.This stop is generated if the SRW lock (Param1) is being released with a wrong release API. If the SRW lock was acquired for shared access and is being released using the exclusive release API or the SRW lock was acquired for exclusive access and is being release using the shared release API. This can result in unpredictable behavior by the application including hangs and crashes. $ kb - to get the current stack trace. This is where the SRW lock is being released using the wrong API. $ dps Param3 - to get the SRW lock acquire stack trace.>The SRW lock is being acquired recursively by the same thread.SRW LockcAddress of the first acquire stack trace. Use dps <address> to see where the SRW lock was acquired.Not usedNot used This stop is generated if the SRW lock (Param1) is being acquired recursively by the same thread. This will result in a deadlock and the thread would block indefinitely. Recursive acquisition of an SRW lock in exclusive mode will cause a deadlock. Recursive acquisition of an SRW lock in shared mode will cause a deadlock when there is a thread waiting for exclusive access. Consider the example below: - Thread A acquires the SRW lock in shared mode - Thread B tries to acquire the SRW lock in exclusive mode and waits - Thread A tries to acquire the SRW lock in shared mode recursively. This will be successful as long as there is no exclusive waiter (in this case B). Since SRW locks do not have writer starvation, thread A waits behind thread B. Now, Thread B is waiting for Thread A which is inturn waiting for Thread B causing a circular wait and hence a deadlock. $ kb - to get the current stack trace. This is where the SRW lock is being acquired recursively. $ dps Param2 - to get the stack trace for the first acquire.@The thread that is exiting or being terminated owns an SRW lock.SRW Lock;ThreadId of the thread that is exiting or being terminated.]Address of the acquire stack trace. Use dps <address> to see where the SRW lock was acquired.Not usedThis stop is generated if the thread (Param2) that owns the SRW lock (Param1) is exiting or being terminated. This will result in an orphaned SRW lock and the threads trying to acquire this lock would block indefinitely. $ kb - to get the current stack trace. This is where the thread is exiting or is being terminated. $ dps Param3 - to get the SRW lock acquire stack trace.<The SRW lock being released was not acquired by this thread.SRW LockCurrent ThreadId.2ThreadId of the thread that acquired the SRW lock.]Address of the acquire stack trace. Use dps <address> to see where the SRW lock was acquired.This stop is generated if the SRW lock (Param1) is being released by the thread (Param2) that didn't acquire the lock. This represents bad programming practice that is hard to get right and can lead to unpredictable behavior by the application. $ kb - to get the current stack trace. This is where the thread is releasing the SRW lock that it didn't acquire. $ dps Param4 - to get the SRW lock acquire stack trace.3The memory being freed contains an active SRW lock.SRW Lock"Address of the memory being freed.2ThreadId of the thread that acquired the SRW lock.]Address of the acquire stack trace. Use dps <address> to see where the SRW lock was acquired.This stop is generated if the memory address (Param1) being freed contains an active SRW lock that is still in use. This can result in unpredictable behavior by the application including crashes and hangs. $ kb - to get the current stack trace. This is where the memory is being freed that contains an active SRW lock. $ dps Param4 - to get the SRW lock acquire stack trace.3The DLL being unloaded contains an active SRW lock.SRW LockPAddress of the name of the DLL being unloaded. Use du <address> to see the name.2ThreadId of the thread that acquired the SRW lock.]Address of the acquire stack trace. Use dps <address> to see where the SRW lock was acquired.This stop is generated if the DLL being unloaded (Param2) contains an active SRW lock (Param1) that is still in use. This can result in unpredictable behavior by the application including crashes and hangs. $ kb - to get the current stack trace. This is where the DLL is being unloaded that contains an active SRW lock. $ du Param2 - to find the name of the DLL that is being unloaded. $ dps Param4 - to get the SRW lock acquire stack trace.1Invalid handle exception for current stack trace.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it. Not used.This stop is generated if the function on the top of the stack passed an invalid handle to system routines. Usually a simple kb command will reveal what is the value of the handle passed (must be one of the parameters - usually the first one). If the value is null then this is clearly wrong. If the value looks ok you need to use !htrace debugger extension to get a history of operations pertaining to this handle value. In most cases it must be that the handle value is used after being closed./Invalid TLS index used for current stack trace.Invalid TLS index.!Expected lower part of the index. Not used. Not used.This stop is generated if the function on the top of the stack passed an invalid TLS index to TLS system routines. Usually a simple kb command will reveal what is wrong. The typical bug here is to assume a certain value for a TLS index instead of calling TlsAlloc. This can happen either by thinking that you always get value N therefore there is no need to call TlsAlloc or more frequently due to an uninitialized variable.3Invalid parameters for WaitForMultipleObjects call.!Address of object handles vector.Number of handles. Not used. Not used.This stop is generated if the function on the top of the stack called WaitForMultipleObjects with NULL as the address of the array of handles to wait for or with zero as the number of handles. A simple kb command will reveal the function calling this API incorrectly.=NULL handle passed as parameter. A valid handle must be used. Not used. Not used. Not used. Not used.hThis stop is generated if the function on the top of the stack passed a NULL handle to system routines.&Waiting on a thread handle in DllMain.Thread handle. Not used. Not used. Not used.This stop is generated if the current thread is currently running code inside the DllMain function of one of the DLLs loaded in the current process and it calls WaitForSingleObject or WaitForMultipleObjects to wait on a thread handle in the same process. This would most likely lead to a deadlock because the thread handle will not get signaled unless that second thread is exiting. When the second thread will call ExitThread it will try to acquire the DLL loader lock then call DllMain (DLL_THREAD_DETACH) for all DLLs in the current process. But the loader lock is owned by the first thread (the one that is waiting on the thread handle) so the two threads will deadlock.!Incorrect object type for handle. Handle value.&Object type name. Use du to display it/Expected object type name. Use du to display it Not used.This stop is generated if the current thread is calling an API with a handle to an object with an incorrect object type. E.g. calling SetEvent with a semaphore handle as parameter will generate this stop. To debug this stop: $ kb - to display the current stack trace. The culprit is probably the DLL that is calling into verifier.dll; $ du parameter2 - to display the actual type of the handle. The handle value is parameter1. In the example above, this will display: Semaphore. $ du parameter3 - to display the object type expected by the API. In the example above, this name will be: Event. $ !htrace parameter1 might be helpful because it will display the stack trace for the recent open/close operations on this handle.:Unloading DLL that allocated TLS index that was not freed. TLS index2Address of the code that allocated this TLS index.$DLL name address. Use du to dump it.DLL base address.This stop is generated if a DLL that allocated a TLS index is being unloaded before freeing that TLS index. To debug this stop: $ du parameter3 - display the name of the culprit DLL; $ .reload xxx.dll=parameter4 - reload symbols for the culprit DLL (if needed). xxx.dll is the name of the DLL displayed in the above step; $ u parameter2 - disassemble the code that allocated the TLS. This should point to the function that allocated the TLS but forgot to free it before the DLL was unloaded.!Corrupted verifier TLS structure. TEB address.Expected TEB address. Thread ID.Expected thread ID.This stop is generated if the internal verifier structures used to store the state of TLS slots for thread are corrupted. Very likely this is due to some random corruption in the process.Using an invalid TLS index. TLS index Not Used. Not Used. Not Used.\This stop is generated if an invalid TLS index is used. In most cases, it's because code is still using this index when TlsFree is called. Here is an example for the threadpool thread. T1: Dll loads and TlsAlloc T1: Queue callback T1: Skipped waited/cancelled callback T1: TlsFree T2: Callback runs and calls TlsSetValue T1: Dll unloads@Freeing virtual memory block with invalid size or start address.Allocation base address.Memory region size. Not used. Not used.This stop is generated if the app verifier detects a VirtualFree or a DLL unload with an invalid start address or size of the memory allocation. In the case of DLL unload this probably means a memory corruption inside the loaded DLL list. To debug this stop look at the current stack trace and the memory address and size that is about to be freed and try to determine why they are invalid.Incorrect virtual alloc call.#Pointer to allocation base address.Pointer to memory region size.Not usedNot used*This stop is generated if the app verifier detects a VirtualAlloc call with an invalid start address or size of the memory allocation. To debug this stop look at the current stack trace (kb) and the memory address and size that is about to be allocated and try to determine why they are invalid.Incorrect map view call. Pointer to mapping base address.Pointer to view size. Not used. Not used.This stop is generated if the app verifier detects a MapViewOfFile call with an invalid base address or size of the mapping. To debug this stop look at the current stack trace (kb) and the memory address and size that is about to be mapped and try to determine why they are invalid.Probing invalid address.Start address.Memory block size.Invalid address. Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call with an invalid address (e.g. a kernel-mode address, instead of a normal user-mode address) for the memory buffer to be probed. To debug this stop look at the current stack trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended up with an invalid address. Many times, the address is plain bogus, e.g. an uninitialized pointer. MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs: In a preemptive multitasking environment, it is possible for some other thread to change the process's access to the memory being tested. Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. Threads in a process are expected to cooperate in such a way that one will not free memory that the other needs. Use of this function does not negate the need to do this. If this is not done, the application may fail in an unpredictable manner. Because of all these reasons, we recommend to never use these APIs.Probing free memory.Start address.Memory block size.Address of free memory page. Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call for a memory allocation that is free. This is very bad because it is possible that, in some other cases, this memory was already reused for some other allocation. Since the current code path (kb) doesn't own that memory, it could end up corrupting someone else's memory, with disastrous effects. To debug this stop look at the current stack trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended up probing free memory. The address could be plain bogus (e.g. uninitialized pointer) or maybe already freed memory. If the memory was already freed by one of the VirtualFree or UnmapViewOfFile APIs, `!avrf -vs -a parameter3' will search for a log of stack traces of the code paths that allocated/freed that address and display these stack traces if they are available. This might show the stack trace that freed up this memory. More often, the memory is an already freed heap allocation. To check for that possibility, `!avrf -hp -a parameter3' will search for a log of stack traces of the code paths that allocated/freed that address from/to the heap and display these stack traces if they are available. MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs: In a preemptive multitasking environment, it is possible for some other thread to change the process's access to the memory being tested. Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. Threads in a process are expected to cooperate in such a way that one will not free memory that the other needs. Use of this function does not negate the need to do this. If this is not done, the application may fail in an unpredictable manner. Because of all these reasons, we recommend to never use these APIs.Probing a guard page.Start address.Memory block size.Address of guard page. Not used. This stop is generated if the app verifier detects an IsBadXXXPtr call for a memory allocation that contains at least one GUARD_PAGE. This is very bad because it is very possible that this GUARD_PAGE is the end of the current stack of a thread. As documented in the MSDN library: Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. To debug this stop look at the current stack trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended up probing a GUARD_PAGE. MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs: In a preemptive multitasking environment, it is possible for some other thread to change the process's access to the memory being tested. Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. Threads in a process are expected to cooperate in such a way that one will not free memory that the other needs. Use of this function does not negate the need to do this. If this is not done, the application may fail in an unpredictable manner. Because of all these reasons, we recommend to never use these APIs.Probing NULL address. Not used. Not used. Not used. Not used.oThis stop is generated if the app verifier detects an IsBadXXXPtr call with a NULL address. To debug this stop look at the current stack trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended up with the NULL address. This is typically the sign of someone not checking the return value of one of the memory allocation functions. For example the code below is incorrect: int main (void) { PVOID p; p = malloc (1024); Use (p); return 0; } void Use (PVOID p) { if (IsBadReadPtr (p)) { return; } // // p is safe to be used here. // } This code should be re-written as this: int main (void) { PVOID p; p = malloc (1024); if (NULL == p)) { return -1; } Use (p); return 0; } void Use (PVOID p) { // // p is safe to be used here. // } MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs: In a preemptive multitasking environment, it is possible for some other thread to change the process's access to the memory being tested. Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. Threads in a process are expected to cooperate in such a way that one will not free memory that the other needs. Use of this function does not negate the need to do this. If this is not done, the application may fail in an unpredictable manner. Because of all these reasons, we recommend to never use these APIs.8Probing memory block with invalid start address or size.Start address.Memory block size. Not used. Not used.This stop is generated if the app verifier detects an IsBadXXXPtr call with an invalid start address (e.g. a kernel-mode address, instead of a normal user-mode address) or invalid size for the memory buffer to be probed. To debug this stop look at the current stack trace (kb) and try to determine why the caller of the IsBadXXXPtr function ended up with an invalid address or size. Many times, the address or size are plain bogus, e.g. an uninitialized variables. MSDN library lists a few reasons why applications should not use the IsBadXXXPtr APIs: In a preemptive multitasking environment, it is possible for some other thread to change the process's access to the memory being tested. Dereferencing potentially invalid pointers can disable stack expansion in other threads. A thread exhausting its stack, when stack expansion has been disabled, results in the immediate termination of the parent process, with no pop-up error window or diagnostic information. Threads in a process are expected to cooperate in such a way that one will not free memory that the other needs. Use of this function does not negate the need to do this. If this is not done, the application may fail in an unpredictable manner. Because of all these reasons, we recommend to never use these APIs.1Unloading DLL with invalid size or start address.DLL memory base address.DLL memory range size.$DLL name address. Use du to dump it. Not used.This stop is generated if the app verifier detects a DLL unload with an invalid start address or size of the DLL memory range. This probably means a memory corruption inside the internal ntdll.dll loaded DLL list.AFreeing memory block inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects a VirtualFree for a block of memory that is actually part of the current thread's stack (!). To debug this stop look at the current stack trace (kb) and try to understand why the function that called VirtualFree thought that the memory block was dynamically allocated or mapped but that was actually memory allocated from the stack.7Incorrect FreeType parameter for VirtualFree operation.(Incorrect value used by the application.Expected correct value 1.Expected correct value 2. Not used.This stop is generated if the app verifier detects a VirtualFree with an incorrect value for the FreeType parameter. The only two acceptable values for this parameter are MEM_DECOMMIT and MEM_RELEASE. If VirtualFree is called with any other value except these two, VirtualFree will fail to free the memory. To debug this stop look at the current stack trace (kb): the caller of VirtualFree is probably the culprit.9Trying to free virtual memory block that is already free.Memory block address. Not used. Not used. Not used.This stop is generated if the app verifier detects a VirtualFree for an address that is already free. To debug this stop look at the current stack trace (kb) and try to determine why the memory is already free but the application is trying to free it again. `!avrf -vs -a parameter1' will search for a log of stack traces of the code paths that allocated/freed that address and display these stack traces if they are available. This might show the stack trace that freed up this memory.AIncorrect Size parameter for VirtualFree (MEM_RELEASE) operation.'Incorrect size used by the application.Expected correct size (0). Not used. Not used.This stop is generated if the app verifier detects a VirtualFree (MEM_RELEASE) with a non-zero value for the dwSize parameter. When using MEM_RELEASE , the only acceptable value for this parameter is 0. If VirtualFree is called with any other value except 0, VirtualFree will fail to free the memory. To debug this stop look at the current stack trace (kb): the caller of VirtualFree is probably the culprit.7Unexpected exception raised in DLL entry point routine.DLL name (use du to dump it).)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.Verifier dll descriptorThis stop is generated if a DLL's entry point (DllMain) function is raising an exception. One example why this is bad is: if DllMain(DLL_PROCESS_ATTACH) is raising an exception, the Windows DLL loader will: - Catch and hide the exception; - Unload the DLL without calling its DllMain(DLL_PROCESS_DETACH). So in many cases the DLL allocated some resources already, then it raised the exception, and it will not have a chance to release these resources on DllMain (DLL_PROCESS_DETACH). To debug this stop: $ du parameter1 - to display the DLL name; $ .exr parameter2 - to display the exception information; $ .cxr parameter3 followed by kb - to display the exception context information and the stack trace for the time when the exception was raised; $ parameter4 is the address of an internal verifier structure and doesn't have any significance for most of the verifier users./Unexpected exception raised in thread function.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it. Not used.This stop is generated if a thread function is raising an exception. This is bad because the whole process will be killed. To debug this stop: $ parameter1 might be significant for the type of exception. E.g. an exception code C0000005 means Access Violation; $ .exr parameter2 - to display the exception information; $ .cxr parameter3 followed by kb - to display the exception context information;1Unexpected exception raised while probing memory.Exception code.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.Not usedThis stop is generated if we get an exception during an IsBadXXXPtr call. This means that the memory buffer we are probing doesn't actually have the protection assumed by the caller, or that the memory was freed already, etc. See the discussion above about other stop code (PROBE_INVALID_ADDRESS, PROBE_FREE_MEM, PROBE_GUARD_PAGE, PROBE_NULL, PROBE_INVALID_START_OR_SIZE) for more examples of why using the IsBadXXXPtr APIs is not recommended. To debug this stop: $ parameter1 will typically be C0000005 and that means Access Violation; $ .exr parameter2 - to display the exception information; $ .cxr parameter3 followed by kb - to display the exception context information and stack trace at the time when the exception was raised;Trying to reset NULL address. Not used. Not used. Not used. Not used.This stop is generated if the app verifier detects a VirtualFree (MEM_RESET) call with a NULL first parameter. MEM_RESET should be used only for already allocated memory, so NULL is not a valid first parameter in this case.FFreeing heap memory block inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects a HeapFree, for a block of memory that is actually part of the current thread's stack (!). To debug this stop look at the current stack trace (kb) and try to understand why the function that called HeapFree thought that the memory block was dynamically allocated or mapped but that was actually memory allocated from the stack.DUnmapping memory region inside current thread's stack address range.Allocation base address.Memory region size.Stack low limit address.Stack high limit address.This stop is generated if the app verifier detects an UnmapViewOfFile, for a block of memory that is actually part of the current thread's stack (!). To debug this stop look at the current stack trace (kb) and try to understand why the function that called UnmapViewOfFile thought that the memory block was dynamically allocated or mapped but that was actually memory allocated from the stack.Incorrect RTL_RESOURCE address.Address. Not used. Not used. Not used.jThis stop is generated if the application is trying to use NULL or some other incorrect address (e.g. a kernel-mode address) as the address of a valid object. RtlInitializeResource (NULL) is an incorrect API call that will trigger this kind of verifier stop. param1 is the incorrect address used and the culprit is on the stack trace (display it with kb).!Invalid critical section address.Address. Not used. Not used. Not used.hThis stop is generated if the application is trying to use NULL or some other incorrect address (e.g. a kernel-mode address) as the address of a valid object. EnterCriticalSection(NULL) is an incorrect API call that will trigger this kind of verifier stop. param1 is the incorrect address used and the culprit is on the stack trace (display it with kb).1Attempt to execute code in non-executable memory.Address being accessed.Code performing invalid access.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from an address that is non-executable or free. To debug this stop: $ u parameter2 - to unassemble the culprit code $ .exr parameter3 - to display the exception information; $ .cxr parameter4 followed by kb - to display the exception context information and the stack trace for the time when the exception was raised.=Unexpected exception raised while initializing output buffer.Buffer start address. Buffer size.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if we get an exception while initializing a buffer specified as output parameter for a Win32 or CRT API. This typically means that the specified output buffer size is incorrect. To debug this stop: $ .exr parameter3 - to display the exception information; $ .cxr parameter4 followed by kb - to display the exception context information and stack trace at the time when the exception was raised.9Unexpected exception when trying to find heap block size.&Address of the heap block being freed. Heap handle.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if we get an exception while calling HeapSize for a heap block that is being freed. This typically means that the specified heap block address is incorrect or the heap is corrupted. To debug this stop: $ .exr parameter3 - to display the exception record; $ .cxr parameter4 followed by kb - to display the exception context information and stack trace at the time when the exception was raised.0Freeing memory block with invalid start address.$Address of memory block being freed.&Expected correct memory block address. Not used. Not used.{This stop is generated if the program calls VirtualFree (MEM_RELEASE) with an lpAddress parameter that is not the base address returned by the VirtualAlloc or VirtualAllocEx function when the region of pages was reserved; To debug this stop: $ kb - to display the current stack trace, that is calling VirtualFree. The probable culprit is the DLL that calls VirtualFree.2Unmapping memory block with invalid start address.'Address of memory block being unmapped.&Expected correct memory block address. Not used. Not used.qThis stop is generated if the program calls UnmapViewOfFile with an lpBaseAddress parameter that is not identical to the value returned by a previous call to the MapViewOfFile or MapViewOfFileEx function. To debug this stop: $ kb - to display the current stack trace, that is calling UnmapViewOfFile. The probable culprit is the DLL that calls UnmapViewOfFile.<unexpected exception raised in threadpool callback function.Exception code(Exception record. Use .exr to display it&Context record. Use .cxr to display itNot usedThis stop is generated if a callback function in the threadpool thread is raising an exception. To debug this stop: $ parameter1 might be significant for the type of exception. E.g. an exception code C0000005 means Access Violation. $ .exr parameter2 - to display the exception information. $ .cxr parameter3 followed by kb - to display the exception context information.code in non-executable memoryAddress being accessedCode performing invalid access)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from an address that is non-executable or free. To debug this stop: $ u parameter2 - to unassemble the culprit code $ .exr parameter3 - to display the exception information $ .cxr parameter4 followed by kb - to display the exception context information and the stack trace for the time when the exception was raised.Creating executable heap. Not used. Not used. Not used. Not used.gThis stop is generated if the application is creating an executable heap. This can be a security risk.Allocating executable memory.$Page protection specified by caller. Not used. Not used. Not used.hThis stop is generated if the application is allocating executable memory. This can be a security risk.@Attempt to execute code in non-executable memory (first chance).Address being accessed.Code performing invalid access.)Exception record. Use .exr to display it.'Context record. Use .cxr to display it.This stop is generated if the application is trying to run code from an address that is non-executable or free. To debug this stop: $ u parameter2 - to unassemble the culprit code $ .exr parameter3 - to display the exception information; $ .cxr parameter4 followed by kb - to display the exception context information and the stack trace for the time when the exception was raised.8The priority of this threadpool thread has been changed.6Callback function where the priority has been changed.Context.=Threadpool Object allocation stack trace, use dps to dump it.Current Priority.^threadpool thread (%x) having executed Callback (%p) has an altered thread priority (%i -> %i)ZThis stop is generated if the thread priority is changed when it's returned to threadpool.8The affinity of this threadpool thread has been changed.6Callback function where the affinity has been changed.Context.=Threadpool Object allocation stack trace, use dps to dump it.Current affinity.cthreadpool thread (%x) having executed Callback (%p) has an altered thread affinity mask (%p -> %p)ZThis stop is generated if the thread affinity is changed when it's returned to threadpool.2Unprocessed msg in the msg pool of current thread.*Callback function that posted the message.Context.=Threadpool Object allocation stack trace, use dps to dump it.`Threadpool thread id. Please use !avrf -tp <threadid> to see the messages posted to this thread.\threadpool thread (%x) having executed Callback (%p) has outstanding window message (%x: %x)This stop is generated if any message left as unprocessed when this threadpool thread is returned to the pool. It's dangerous since it will be processed in a totally different context. Please use Please use !avrf -tp <Param4> to see the messages posted to this thread./Unclosed window belonged to the current thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it.Threadpool thread id.ithreadpool thread (%x) having executed Callback (%p) has valid hwnd (%x: %s) which could receive messageshThis stop is generated if any window is kept alive when this threadpool thread is returned to the pool.+ExitThread() called on a threadpool thread.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.This stop is generated if ExitThread is called on a threadpool thread.It's forbidden since it will make system unstable. It will cause resource leak, hang or AV.KThread is in impersonation state when it's returned to a threadpool thread.4Callback function where the thread was impersonated.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.This stop is generated if call back function change the thread token to impersonate another user and forgot to reset it before returning it back to the threadpool.JA function which requires persistent thread is called within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.Some Microsoft Windows APIs need to be called inside a dedicated or persistent thread. In the threadpool you should generally avoid using thread local storage and queuing asynchronous calls that require a persistent thread, such as the RegNotifyChangeKeyValue function. However, such functions can be queued to a persistent worker thread using QueueUserWorkItem with the WT_EXECUTEINPERSISTENTTHREAD option. A kb in debugger will reveal the caller.%Thread is in dirty transaction state.<Callback function where the transaction context was changed.Context.=Threadpool Object allocation stack trace, use dps to dump it.Transaction Handle.eThis stop is generated if call back function forgot to close or reset the current transaction handle.?This threadpool state has unbalanced CoInit and CoUnInit calls.<Callback function that left the thread in a dirty com state.Context.=Threadpool Object allocation stack trace, use dps to dump it.Balanced Call counts.RThis stop is generated if call back function calls CoInit and CoUnInit unbalanced.The parameters for the timer object are inconsistent. Period should be 0 when WT_EXECUTEONLYONCE is specified when creating the timerPeriod specified.Flags specified. Not Used. Not Used.This stop is generated if the period to signal the timer is not zero when the timer is set to signal only once with the WT_EXECUTEONLYONCE flagKThe loader lock has been held by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.This stop is generated if the loader lock is held within the callback and is not released when the thread is returned to the threadpool.KThe preferred language is set by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.This stop is generated if the preferred language is set within the callback and is not cleared when the thread is returned to the threadpool.LThe background priority is set by the threadpool thread within the callback.Callback function.Context.=Threadpool Object allocation stack trace, use dps to dump it. Not Used.This stop is generated if the background priority is set within the callback and is not disabled when the thread is returned to the threadpool.0TerminateThread() called on a threadpool thread. Not Used. Not Used. Not Used. Not Used.This stop is generated if TerminateThread is called on a threadpool thread. It's forbidden since it will make system unstable. It will cause resource leak, hang or AV.BThe stack was unwinded when asynchronous I/O operation is pending.*Address of stack variable used in the I/O.Current stack pointer.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.iThis stop is generated if the application issued an I/O operation that uses a stack variable and has not waited for the I/O to complete, thus leading to stack corruption. To debug this stop: $ dps parameter4 to display the stack trace when the I/O was issued. Parameter1 indicates the stack based address and parameter3 the thread that issued the I/O.CThe stack was corrupted when asynchronous I/O operation is pending..Address of the stack variable used in the I/O.Current stack pointer.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.iThis stop is generated if the application issued an I/O operation that uses a stack variable and has not waited for the I/O to complete, thus leading to stack corruption. To debug this stop: $ dps parameter4 to display the stack trace when the I/O was issued. Parameter1 indicates the stack based address and parameter3 the thread that issued the I/O.1Using a freed address in a pending I/O operation.Address used in the I/O.Address being freed.$Original thread that issued the I/O.$Stack Trace when the I/O was issued.This stop is generated if the application issued an I/O operation and freed the memory used in the I/O before the I/O completed thus leading to memory corruption etc. To debug this stop: $ dps parameter4 to display the stack trace when the I/O was issued. Parameter1 indicates the address used in the I/O. Parameter2 indicates the address being freed and parameter3 the thread that issued the I/O.YAn I/O status block (OVERLAPPED) is reused while associated I/O request is still pending.-Address of the I/O status block (OVERLAPPED).$Original thread that issued the I/O.$Stack Trace when the I/O was issued. Not Used.kThis stop is generated if the application reused an I/O status block (OVERLAPPED) while an I/O request using that I/O status block (OVERLAPPED) is still pending. To debug this stop: $ dps parameter3 to display the stack trace when the original I/O was issued. Parameter1 indicates the address used in the I/O and parameter2 the thread that issued the I/O.KUsing an unsupported flag, FILE_ATTRIBUTE_NOT_CONTENT_INDEXED on CreateFileReturn Address. Not used. Not used. Not used.9CreateFile while writing %hs%ws with flags %08x %08x %08xOld version of the MSDN erroneously documented CreateFile as supporting FILE_ATTRIBUTE_NOT_CONTENT_INDEXED. If this flag is intended it should be set using other API functions such as SetFileAttributes. $ ln Parameter1 to find the caller of CreateFile.A heap allocation was leaked.oAddress of the leaked allocation. Run !heap -p -a <address> to get additional information about the allocation.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.jThis stop is generated if the owner dll of the allocation was dynamically unloaded while owning resources.A HANDLE was leaked.}Value of the leaked handle. Run !htrace <handle> to get additional information about the handle if handle tracing is enabled.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.This stop is generated if the owner dll of the handle was dynamically unloaded while owning resources. To debug this stop: Run !htrace parameter1 to get additional information about the handle.An HKEY was leaked.Value of the leaked HKEY.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.mThis stop is generated if the owner dll of the registry key was dynamically unloaded while owning resources.!A virtual reservation was leaked.Leaked reservation address.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.tThis stop is generated if the owner dll of the virtual reservation was dynamically unloaded while owning resources.A BSTR was leaked.iAddress of the leaked BSTR. Run !heap -p -a <address> to get additional information about the allocation.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.jThis stop is generated if the owner dll of the SysString was dynamically unloaded while owning resources.*A power notification was not unregistered./Address of the power notification registration.XAddress to the registration stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.xThis stop is generated if the dll registered for power notification and was dynamically unloaded without unregistering.A COM allocation was leaked.sAddress of the leaked COM allocation. Run !heap -p -a <address> to get additional information about the allocation.VAddress to the allocation stack trace. Run dps <address> to view the allocation stack.EAddress of the owner dll name. Run du <address> to read the dll name.Base of the owner dll. Run .reload <dll_name> = <address> to reload the owner dll. Use 'lm' to get more information about the loaded and unloaded modules.oThis stop is generated if the owner dll of the COM allocation was dynamically unloaded while owning resources.px0H`hpxȠРؠ (08@HPX`hpxȡءxd(X@HP`hp ȢТpx (0@HPФؤ08@P`@HP`hp (08@HPX`hpxЩ0` @ج (8@PXhpȭЭ(0@HX`pxЮخ 08HP`hxȯد (8@PXhpȠР(0@HX`pxСء 08HP`hxȢآ (8@PXhpȣУ(0@HX`pxФؤ 08HP`hxȥإ (8@PXhpȦЦ(0@HX`pxЧا 08HP`hxȨب (8@PXhpȩЩ(0@HX`pxЪت 0PhpȫЫ(0HPhpȬج (8@PXhpȭЭ 08HP`hxȮخ (8@PXhpȯЯ $(0@HX`pxРؠ 08HP`hxȡء (8@PXhpȢ@PXhpȤФ(0@HX`px (8@PXhpȦЦ(0@`pxЧا 08HP`hx.0. *H .0.10  `He0  +7 0 0 a +70 Q J Fմ$fڎ` 01 ,0 ( +71  - Hextr߫y}hbGzM@f_z ļ@RjV=&OdWNAA3c`uB?Rز&t@ K^Sx$ +Xo3 tT4h}/X0Zg. !+Xrr_7D#lDfnk{'E&Uܣ6=*T[b_mWR_r$Kc{kG@?Ad5󖴰+f HcլגevΩtP{|Ax}ɵ}fљ/AQ$F>5`-Xo'K~dA~e7 q2k8FBuqsTr~5op1(,x s\JTα:P'iÅPg0N<5ߑ"7ki̫ٝO^Aa 1YA"\>kܯY:kGW}_9j^g &̤Q{wC̻ΜGTENڷ]_pׇ/iE4iHud6%V0M$$ 7+0X^-;t:;ȱ {y8x&M2~x[./o6F)$bf4]UFLҕG,)(#W-kЇuB b.q#4#3 Q^wDOkAeWΣ78IŸHOh* iFcULCُH zfLt'Ր`8sEσanCf#%t >88.䰈燢J!EIX\*x*S+~ΆBkߙe-c-j(+Wƭ(*I$wНKXa{G7pbY]˒=c+4~0~=iګ[NC&QhGHviYDEt4] mIkjrQV}dIqT@ u+{:|Ma֌}ۭo#Z~{ĴhKNB1^.dh37R8jƽCI`@eoVTW#_ T[+zRp'J5T8dZ+GA%jt#:`$ҙޙmTʘN x}W0[- .pZ#NQulZ <t$<.^N8ϊ?d68MOxҰ}3Pt;"o3ɜBZ==uxheڵw nʛs 3m T J"x2rJm*.əc`;e/z'hko$7bγ 2 +$/ssFbsn*^~O!wl)-XQ-]vA+ \-raEj1 n]/ź? _) > ‘:6[*0wHs@*\Fմ%=)@I2^u=pSn|PEX0Pg,HTlN5MLrUds,YTGRSGw҃Kj&NdҲdegs4+6.lψe4ea pMn83HްXLm|4Khʇ!09RD^y31r<] $yLh/aGںk?m +U{+@A+s&1i',V̑GNdfm+|Wy ̕r%fԅ3 `dKZ6Z$ų.ZE$YI010  `He ,yĴ$&Mm3q_5= 003 |0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110 150818171528Z 161118171528Z0p1 0 UUS10U Washington10URedmond10U Microsoft Corporation10UMicrosoft Windows0"0  *H 0 >_h~ELj\\A@ŽyBOm $7_6 {FF񪻫n}$WD=OclGQ0{n̡t+1ޘB"v9{4.ZY,“mQkTS!AS1i1) 9w|CҭE‹e wIǺQQ9g( $ TϩKt*|eqX7Wn298a?7ѲGVwI0{0U%0+ +7 0UI DP/oMT0QUJ0HF0D1 0 U MOPR1301U*31612+85cef474-af76-4076-90ff-a35e1e23d7de0U#0)9ėx͐O|US0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0 U00  *H  `t:, u'G+?4ϝPheSFޭl&!Oe;0%̀T܍ cTYy#5~-OdI)Y \vjL5'߽PnӐ} _2#s{BP$-@B{p|/gc[ډuVmnaƛR'V65n7+arQoe`iܽ4TP(3&,9҄ "QܝDu׷00 avV0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100 111019184142Z 261019185142Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110"0  *H 0  . i!i33T ҋ8-|byJ?5 pk6u1ݍp7tF([`#,GgQ'rɹ;S5|'# oFnhttp://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0  *H  |qQyn9>\` QfG=*hwLb{Ǻz4KbzJ7-W|=ܸZij:ni!7ށugӓW^)9-Es[zFX^gl5?$5 uVx,Јߺ~,c#!xlX6+̤-@EΊ\k>p* j_Gc 26*pZBYqKW~!<ŹE ŕ]b֠c uw}=EWo3wbY~10001 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113 |0  `He0 *H  1  +70 +7 10  +70/ *H  1" 䴠Y{6r.t\d>!^A0Z +7 1L0J$"Microsoft Windows" http://www.microsoft.com/windows0  *H Wr>1oY>%"{}VO({s/p1#Żك=8_"q͇1.6 xUoX~{>[cWZp7dəF|hE%uU0oK鄐1ȻqC, .JypMHlWuM^ɏȌ qGg%J?CqyIgdͅk1g>_|_Ʈ$>2(/OTpUmM0I +71905 *H &0"10  `He0= *H  ,(0$ +Y 010  `He a+!K׷l k)f+[S'1A |a0Y0D`TC M8Bݓs0W&E GͿ$`2X`FXG2tag_TϓLĦ]an(aF'$gr!KdPb]w=WuBM@Q>gfD~Knʱz* 1N5xhttp://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0U 00 +7.00=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0  *H  Q ?q=!o1Wm0fjxǨ%kTW+QDS`v@@A\\^5$VKtBȯ7}Z?yJR8/ye٩kzoK0D$"<Y)p2J'U/3b_W@ΙfjbJ &9Jqc{!mÜ<}jxm8ؔƥ B"8 %d~cY%z.9Wvqa˚Gͧ};q ]t"aڰPo1:eGxHr~akow˧ 9؂r*T9[ Uzs;-3.)/T'!ȬN(ۖBAM*f0ӻt2Kc{/!YD6` 0  *H  0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100 160427170619Z 170727170619Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1 0 U MOPR1'0%U nCipher DSE ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service0"0  *H 0 ^ |&QAũWr4BvR`ytRc׊E /z2BВ# ?iwS%M)! =bS PP/0(m:5"kNm6Ɗ+i&ssa nҾJ'ٸ7ВW7G_C3Ą\Z6SG$(-F5"16l z̵OZ{}׍(C 00U ?'Fsc^~Zez0U#0c:\1C{|F3hZmU0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0 U00U% 0 +0  *H  xR? ɡϿ˻d=!8L(f2wy!nVV3ϧ {1|f=^a BF-ʓ}^& qȦK&4(qeF!L6:f7{H(dR{GΎlśh}ޫ/㗪XÐw2~|'RZ+zۯ,mԁA~xϻ} L L&c!}p<jf6kth(S~ªy0a0㡁01 0 UUS10U Washington10URedmond10U Microsoft Corporation1 0 U MOPR1'0%U nCipher DSE ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service% 0 +VfpB001 0 UUS10U Washington10URedmond10U Microsoft Corporation1 0 U MOPR1'0%U nCipher NTS ESN:57F6-C1E0-554C1+0)U"Microsoft Time Source Master Clock0  *H 30"20160716002638Z20160717002638Z0w0= +Y 1/0-0 30 0J0 5O>06 +Y 1(0&0  +Y  0` 0 0  *H ;3朦@bᅁ63n̓so 31F`N1Q-۞06;r*i+xh->jl$¬9M|2&rM''FV:4S38nHdUYԻ֖˴nO_NR!2?nS~<KS%dh>/Uv݈hm6y&=|)Kkw̚Mu"UM*mY6,1000|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103>6` 0  `He20 *H  1  *H  0/ *H  1" NJ&,N˶@s @,6U@e 0 *H   1000VfpB00~0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103>6` 00X> ʏљ:0  *H  Nt2v{WkG`e-"ArDo{f;FZ#Ȧ*Msʱxƀ|sin;~raр=钄0i[^]nƆeq?Ch\An2-ոc$^|v%5`gpFsփ Tza{($5__-bxNBeo)D6Ɉ u[*t:fF\9OAk3!@ ;M ݟ,