Hacked By AnonymousFox

Current Path : C:/Windows/SysWOW64/
Upload File :
Current File : C:/Windows/SysWOW64/offlinesam.dll

MZ@	!L!This program cannot be run in DOS mode.

$cL'-'-'-.U#-BK+-BK$-'--BK*-BK&-BK-BKO&-BK&-Rich'-PELT4!


"@A v`%L 0Th@.text `.dataD	@.idataT@@.rsrc@@.relocL`@BسP4PGЇ@@000 @`
`` P`#0  @!@#<TPp###$0$XL@L4(
`/\/$&.
(..(*l/
-FH-$&4. -D/
.$&.&(\.t0 SuН22P4PGPJJK`KKKK`LLLM M@Ї@0``@0Pp0000@00@`
`` P 0  @!@#`#3НЦ\NULLSampServerObjectTypeSampDomainObjectTypeSampGroupObjectTypeSampAliasObjectTypeSampUserObjectTypeSampUnknownObjectType<unknown>wXqi3Rn+]ADV}CH*HFVCDOMAINSGroupsAliasesMembersUsersNames\SystemRoot\	e5
c܄?h&ɚDY&MhServerDomainUpdatesPerComponentWellKnownAccountAppliedUpdatesAliasShellAdminObjectPropertiesUserTileUserPasswordHintUserDontShowInLogonUIUserShellAdminObjectPropertiesLastSuccessfulInterLogonTimeLastFailedInterLogonTimeFailedInterLogonCountFailedInterLogonCountAtLastSuccessfulLogonInternetUserNameInternetProviderNameInternetProviderGUIDInternetUIDInternetSIDInternetProviderAttributesCachedLogonInfomsDS-ManagedPasswordIdmsDS-ManagedPasswordPreviousIdForcePasswordResetAccountFlagsExSupplementalCredentialsBuiltInAccountNULL\REGISTRY\MACHINE\SAM\SAM\system32\config\SAM\system32\config%ssystem32\samsrv.dllsamsrv.dllHKLM\SAM\SAM\SYSTEM\REGISTRY\MACHINE\SYSTEM\REGISTRY\MACHINE\OFFLINESAM%s%s___(%s)___%sControlSet001\Control\ProductOptionsProductTypeWinNtLanmanNtServerNtProductSuitePersonalControlSet001\Control\MUI\UILanguagesLCIDType%s\SAM=pD7}1W~$MD5RC4Domains\%sGroups\%08xAliases\%08xUsers\%08x%s\%08xLMPASSWORDNTPASSWORDNTPASSWORDHISTORYLMPASSWORDHISTORYMISCCREDDATAAESBlockLengthChainingModeCBCChainingModewI8mO6Aliases\Members\%sAliases\Members\%s\%08xBUILTINACCOUNTw3=:ÇŨ4GI
wV]-i1r[*SeDebugPrivilegeSeBackupPrivilegeSeRestorePrivilegewinlogon.exe쉡u69XT w͠V!L<cKlߺS-1-15-3-1024-1730716382-2949791265-2036182297-688374192-553408039-4133924312-4201181712-267922143%s%s00000000000000000000000000000000BuiltinDomains\AccountDomains\BuiltinDomainsW
*؁2iycȋ\Aliases\Members\Users\NamesGroups\NamesAliases\NamesAliases\Members\Aliases\Names\\Aliases\\Groups\Names\\Groups\\Users\Names\\Users\SAMWz^n9lZA@PersonalSkuShouldDisableAdminByDefaultNtProductTypeDomainServerRoleLanguageIdControlSet001\Control\LSA\OfflineSAM\DBOptions&8(;F45
*** Assertion failed: %s
***   Source File: %s, line %ld

onecore\base\lstring\lunicode_string.cpp(Bytes % sizeof(WCHAR)) == 0String->Buffer = reinterpret_cast<PWSTR>((*RtlAllocateStringRoutine)(Bytes))RtlAllocateLUnicodeStringNot-null check failed: DestinationRtlDuplicateUnicodeStringToLUnicodeString::RtlIsUnicodeStringValid(Source)RtlInitUnicodeStringFromLUnicodeString::RtlIsLUnicodeStringValid(Source)BUCL::Rtl::ConvertInteger(Source->Length, Length)BUCL::Rtl::ConvertInteger(Source->MaximumLength, MaximumLength)RtlInitLUnicodeStringFromNullTerminatedStringcch <= (((((SIZE_T)~((SIZE_T)0)) - (((SIZE_T)~((SIZE_T)0)) % sizeof(WCHAR))) / sizeof(WCHAR)) - 1)Valid flags check failed: FlagsNot-null check failed: String::RtlIsLUnicodeStringValid(String)RtlConcatenateLUnicodeStrings(SourceCount == 0) || (Sources != 0)::RtlIsLUnicodeStringValid(&Sources[i])BUCL::Rtl::AddInPlaceWithOverflowCheck(&MaximumLength, Sources[i].Length)RtlAppendLUnicodeStringToLUnicodeString::RtlIsLUnicodeStringValid(Destination)Not-null check failed: SourceRtlReallocateLUnicodeString__rv.UcsCharacter != (0xffffffff)onecore\base\lstring\path.cppRtlConvertWin32RegistryPathToNtRegistryPathUserNot-null check failed: PathInNot-null check failed: PathOutHKEY_CURRENT_USERHKCURtlFormatCurrentUserKeyPath(UserProfilePath.GetMutablePointer())PathOut->Length != 0RtlConvertWin32RegistryPathToNtRegistryPathWithSidRtlConvertNtFilePathToWin32FilePath\??\UNC\\\\??\HardDisk\\?\HardDisk\??\Volume\\?\Volume\??\\DosDevices\UNC\\DosDevices\\SystemRoot\Device\HarddiskVolume\\?\HarddiskVolumeonecore\base\lstring\lblob.cppRtlReallocateLBlobNot-null check failed: Blob::RtlIsLBlobValid(Blob)Temp = (*RtlReallocateStringRoutine)(Bytes, Blob->Buffer)Temp = (PUCHAR)((*RtlAllocateStringRoutine)(Bytes))RtlCompareEncodedLBlobsNot-null check failed: ComparisonResultNot-null check failed: String1Not-null check failed: String2SHA256ObjectLengthHKCR\\Registry\Machine\SOFTWARE\Classes\\Registry\User\\Registry\Machine\HKCC\HKEY_CLASSES_ROOT\HKEY_LOCAL_MACHINE\HKEY_CURRENT_USER\HKLM\\Registry\Machine\System\CurrentControlSet\Hardware Profiles\Current\HKEY_USERS\HKCU\HKEY_CURRENT_CONFIG\HashDigestLength0123456789012345678901234567890123456789!@#$%^&*()qwertyUIOPAzxcvbnmQQQQQQQQQQQQ)(*@&%MD4T4'0$T4
0$T4RSDS?n\Xofflinesam.pdbGCTL.rdata$brc.CRT$XCA.CRT$XCZ.CRT$XIA.CRT$XIAA.CRT$XIZ .gfids.rdata0.rdata$sxdata0.rdata$zzzdbg2t.text$mnX.xdata$x .edatap.data$brcp.data.bss.idata$5.00cfg.idata$2.idata$3.idata$4.idata$6.rsrc$01.rsrc$02Uuj@@]̋U}t]%D]UQQt3ʼnEEjjEEPQRj+uuM 3o]UQQt3ʼnEUEVW3Etʍqff;u+Mj
YuWQRjEPj
hj+uuM(3_^o]At=t2t'tttøøxøPø(øøËUQUEVFVFNI	FF@$(P9tjY)Q
H8BtzrCPVrr^Y]̋UVEt
tV3^]VFFNH$9Ju;A9u4BN(A8@txrVppjY^jY)UQWGHutVj0^_]ËU;r;M%]UA;vP;ȋM%k?]USVW{8tpփc8}{8t0_^[]Ut3ʼnEEjjEEEEPjEPjEPj
hj+uuM03l]UQVW}QWxjkF$k}SMF\Sj@fGf@ЉWu	)kN$}SF8FPRp3[_^]USVu3Wf9v9^u
QuYxPvSu_^[]UQS]VWQ3E!;jxNUkB$RDtPj@E@uVWux;3WX_^[]UQQEVW3ɉEQjExnkO$GSL,MtT\(Sj@@Eu9kO$W}SD$PWkoEM8EE[_^]UVQjxuuhj4^]UVQjxEPuuj^]US]WkG$; r

Sj8DkG$kVuUGʋ\EPEPp;s+9O$sG PkW$]MOM+]tqE @EM;sZUw EE+tEu)Eut"EGuDEGPPmMkEE+M@uMUEt
D
t&kO$VuGGPm_ )_$jϋ}^_[]UQQEVWQ Ej xskO$OUtXSPj@E@؅u6kO$WuPSlEME[_^]UQQEVWQ Ej yxjkO$OT,UtRD(SPj@E@؅u3kO$WuD$PSOlEME[_^]VWj,xjx	_^ËV39q8t1Q(
#A+ttt
tuq q$	;u^ËUS]Vj#xBkF$Wj@@u!kF$FPWlk;3_^[]UWjxKGUu
b8GVk$G;tRPkjϋ^_]Uy8u3]QVkq$uЋq +ķ/}uЋ+Ћq +̷PVR^]Uee}Wu(,t3#SEPEPEPuI؅3B8VEPuuu<M؍EP#yy;tukw$3Bt9Uuuuu;tu?VHxyEPEPEPux_EPuuu3ҋBMx=kG$t}uW(%kG$؉W(w W,V:؋G+G$^[_]UkA$ 9Eҁ?
9Es	j~Ћ]UQE3S]VE9VuhjЅx\kF$t6}Wuv~̷+vE38_FNEķE^[]UQEV;Fw3S^;rU;s
EPW}Wj@@ЉVu
^{~uW3WRg~(~,]F,t+~ ~$~(tkF$QSRgF,t"kF$F +PPFPgS3_[^]Ut3ʼnESVWMw<xMxX_8kG$3N,t1hV,x-8h̷p,hķV,MXM_^3[b]ËSVWhhj_3ۉ=3hFh$=5 p5,hxh0@48=D<jPXh(hH5jXhPhlPTdX\=h`Dhhtx=|==4hh̷hhķhhĶhhh,h̶h<hԶhLhXVhVhVhܶ_^3[ËUt3ʼnEEUeS ]VWy8EEEE7RPEN$PSV$UM
M_^3[0`]UVWy8uujup(_^]UEVWP y8h?ur_^]UDt3ʼnE3eeыMSVW!}E܉EثMȋJ@UЫ3}쫫us
EP(}te0֍M}tMH3}u}쥥}tMHM_^3[_]EP؅xuԍMQjjx׋؅]UD;؅FEPEPB؅/3ۅ%uESPE>PEЋO$p@SW$؅U̍M9؅U؍M؋E؅Mȉ3W9t!V0^_ËUHt3ʼnES3ыM3!]!]V!W}MȋJ@UЉ]ث3}諫u

EPuԍMQjjx׋Uܹd9xmuEjPE܋>PEЋO p@jW xBUM`Bx1U̍M8x U؍MxM3ۋE؉]S]te0֍M}tM^FM_^3[\]UUSVuWj[ffffÉrfBPwV`ME++_NE^[3]UUVW}z6vW`EM+ʉE:_^3]3hPAAA A$A(A,A0A4A8A<A@ADPa`ËUVuuMN<t8@txruQVpph^]̋UVEt
tV3^]SVWjN<tvkF~DttO'u8@txrVppjY_^[UQQt3ʼnEeS]VWMQhp֋xMuEMbM_^3[Z]VW3uwRj@@Gu7_^ËVW‹3Pj@@Gu7_^ËSW39vVwtd$C;r^w'g_[ËUQSW39v%3EVwN&CEE;r^wng'_[]ËUMSVډEWu}ExMWqV]E;_s^[]ËUeSىUVW]3uu	33M֍MxFuM;3u<3ۅt#MIZxMC;r݋MEee1AM_^[]ËSVW:x7sw]_^[̋UVu3W}F9t3҉FBΉx
V_^]̋UVuW}&fGtAt
6Pj@@ȉNuG0pQc\G3_^]̋US]VW}37w93t:3҉wBωjx%&x7sw[_^[]̋UQQMuEAEEP]̋UQQEuEEPE]̋UQQEuEEPEp]̋UQQEuEEPE@]VWu!!NuF7wP[3_^Pj@@Fuݸ̋UMUI]̋UQQEUHUMf
fJMJ]U:QujuZBpuoZ3]̋UuUjY]̋UuUjY]̋UuUjY{]USV3ҋMWU9kFQUEUE;Ur[EMM9EsAMVHE+MkЉEЉUxrEL0DL0DMC;x];tI[kFE;r*U􋀴;s+kD1D$D1DuU_^[]U$t3ʼnESVW}3}3҉MډUUUU𫫋q8uu}tkQNj6j+kMQN$jPEMV$49]u@uj@@uuj}PEP8ju7N$V$}xAjj@@؅tEMEӋEExE܉X3ۉ8@3u4S.M_^3[oS]US]VWk3Muu]Wj@@ȉMuu1օtuBI;r3Wj@]@EEu
u9t#MPE45x EFE;r݋MEPEPMM_^[]SkY3VWqDʋt0t#jZ;ҁ?
vA;r_^[Udt3ʼnESVuًMWPQEPzV3ׅt`kCEEL+kDDuEkDu&DNDJB;sE…tVEPVM_^3[Q]Ut3ʼnEESV3WމtxCGrӅuSxPȅkx@k+k44BkWP֋ȅx)	F;wM_^3[~P]UESVًWM3kC+kEDkMMKHȉEDDMtMQVu4֋uЅDDɀ$
ȀLDxEMR_^[]UkA3SV3MuAD]EW3YL}tZCtugpE3!ukAWy8uVjЋRp(֋Ѕx+MEu}Fu}E;ur_^[]ËSVW39w8tuQx	kO_Dt$t$xKNu_^[ËUESVWEE։MډEҁ?
tPeEhuP MЋE+ڍHxȅyuMtMtw_^[]SV3ۋWtv
x3Džt
f9tu΋+?
#˅xhh+эOSn_^[UES]V3t=v
x2Wx3EPuWSx;wu
3f{_	t3f^[]ËU3Vt*uSW}+tft
fO@u_[uH3f1M^t]UjQRj+uu]UjjEPQRj+uu ]UQSVu3EWt֍zff;u+Uj
ZuSRVjEPQhj+uu(_^[]UjjEPjEPQRj+uu(]UQSVW}3Et ^ff;Eu+34uj
^uPVWQRj+uu _^[]UQSVu3EWt ֍Zff;Eu+3Uj
ZuPjEPRVQWj+uu(_^[]UUESVWt:j_3ɉMt
f9
tZuMt%FEff;Eu+uE4uj
^ujWSjRVQPhj+uu0_^[]UUMSVuWt:j_3ɉMt
f9
tZut"΍AEff;Eu+MMj
Yu3PjEPEWSjRQVPhj+uu8_^[]UQSVuWtVtVj_tVuM3Et эZff;Eu+3Uj
ZuPWVRQj)hj+uu(_^[]UEVtjY3t
f90tPuVQRjPj.hj+uu(^]UESVWt0j^3ۅt
f9tHuSj]SVQjPWRj+uu0_^[]UQSVuWj[tVtVE]tVu}t#Wt	W؅tWujuVSWj%hj+uu(_^[]UjjEPQhj+uu ]UQQt3ʼnEEjjEEPjEPjfhj+uuM(3oG]Ut3ʼnEEjjEEEEPjEPQRj+uuM(3 G]SVW5%j[48Xtxrppj
Y/Hy&8XxVppj$y#8XxVppjtHtE8XtlxrfppjYQy8@tBxr<Vppj
&y$8XtxrVppjYk_^[ËUSU3ɉEVWى
MUMMMȉ]y28@]xSVppjY:MEPUBy$8@xVppj뷍MǞy-8@txrVppjY]h`j@@]tuuSf)3uey8@trxrlVppjEy8@t?xr9Vppj8@txrppjYE83y
}tuutt{}tM8@txrVppjYU_^[]ËUU3ɉESV
MUMWy(
8AtyryWqqjY]M]
8At yrWqqjY
8t
蜨
8t

8}tM
8AtyrWqqjY^_^[]h`j@@t>uj|UV@^<t&H3;8!Gy(
8A
yWqqj
8AtyrqqjYc
8E03USً‹M3VWUMQuUuUUЉEMy28@xVppjYEPUGy8@tpxrjVppjMԚ8@txrVppjY8}t
Mv8t8}t
M8@txrVppj!Y;_^[]h`j@@tuuu%3fM썗TNMX4M\8y'8@xVppj8@txrppj Y%8M93US]3VWE5Eu΄tHS(
8A$yVqqj"YEPd(y6
8At"yrVqqj#Y}}}EPN6y(
8Atfyr`Vqqj$Y7Duuu0
8Atyruuqq
8
;3
8t
Y
8AtyrVqqj&Y_^[]Ut3ʼnEEeSVW}ىE8@txrWppj'YWEPEPEPy(8@tuxroVWppj(Y9X8@txruWppuuy%8@txrVppj*YuM_^3[<=]UE3S]VWMM9u.8@txrppj+YC99t+8@txr1ppj,Y
}s8@txruppj-j8j@@u{j ZQMUQMQhOxYGPGPEUQMEQMQhȉUxuGPEj;3YEW_^[]US]V3MWuu38@txruppMU<Mu>Mu+8@txrppj/Y
UMEPn$y*8@txrWppj0Yu
uSg2ut_^[]3PPPjhjQjh@3PPPjhjQjh@ËQVW8@txrppj1Yjy#8@txrjppj2Y_3^YËU SىU3ɉ]MEEEVWM}}
8@txrSppj3Y
Uq]Y3Qff;u+5j\_f9<Ku3fKu}S0˨0EHPeu0u\}U3ˉE8@txrWppj5Y5E3ҋM8EUu3TEˍEPuVu0u3EˍEPb8@txruppj4Y
SuW
u_^[]EEэUxO3Qff;u+At*j\Yf9Ctut3ɍUfC}}o}lU(t3ʼnES]VW3;9HtTPsdWhhP@Ӎ,<ٍSff;u+Yf8\tuCC]Pj@@u
<׉
Ktvօx3v
3fSыWЋ	t3f0xPQыx@8@txrSppj6Y`
WSM_^3[5]U`t3ʼnES]3ɉEVWp<MMMMMM-EPS7d8}@txrWppj7YM苛-WEP3EQEMEEQPSE@MMy28@xVppj8Yz3EEME@ẺMԉMء8@txrMQSppj9YEPEPy'8@t\xrVVMQSppj:Y@8@txrMQSppj;YTE83ǀ43}WMM_^3['4]UDt3ʼnESVMW3}v<}ĉ}}}\}9HtEPQ	u!8EPHučEPM襙E}EЍEPh?EEP}E@}؉}y68@YxOVMQppj<YM2EPjuu18@xppj=Y0@u8@t^xr<ppj>%
8@t7xrppj?Y8@txrppjAYuy8@t\xrVVppjBC8@t>xr8ppjC2y%8@txrVppj@Y]Et3xtHt
QExE8EPd0Wp9}t	uuJuBMFM_^3[{1]ËU4t3ʼnESVW3ۍM]]w<軘8@txrppjDY~894u&@txrppjEYRM8EPEE]E@E؉]]8@txr8QppjFY(jEPx8@t6xr0VppjG8@txrVppjHYM'8ۿ84MӗM_^3[0]ËU\t3ʼnESV3Wu؉}v<M]EEEE59H<9LEP藼}EPWd8]@txrSppjIYvMR4SEP3EQEMEEQPWE@MMy28@xVppjJYA3EEME@EЉM؉Mܡ8@txrMQWppjKYzEPEPy'8@tcxr]VMQWppjLYG8@txrMQWppjMYEP3ǀL3
]
S讽W訽M謕M_^3[-]ËUVu39Hu9\u9Lux^]UXt3ʼnEESVWE}33ɋىMЉMv<MMMMԉ]̔E3ɉ9HU	HESPE7Ph?SNVx uU!]Ήux]}t	utp֋]t0֍MlMhM_^3[,]9LtP\PEPMzmEEE3ɍEMPh?EЉMPE@MȉM.V<EMP!]ЋM3ۋE3EU4t3ʼnESVW3ۍM]]w<58@txrppjNY89Lu&@txrppjOYMxPEPEE]E@E؉]]8@txrPQppjPYjEPx8@t6xr0VppjQ8@txrVppjRY+M衑PUPLMMM_^3[*]ËU$t3ʼnEE3S]VWE
EMPMEPEPˍQff;u+ʋUrff;Eu+֍A%‰EPj@@tRuShphHhuV\x-N$ftf\uj!XffuE03V<}t
EPM_^3[m)]UeEeSVWP]iy28@xWppjSYEP_]uVSy/8@xWppjTY,uE3Ƀ>uSy8@tKxrEWppjU븋uVS?y*8@txrWppjVY3tp֋]}t,_^[]U$t3ʼnEESVE3W}؉EEEEEEhP7EPh?ENPVhEP}ESPS7EPN$V$yEPj@@؅u
}ESPj7EPN$V$x\hSYYuE?h SYYuE"h4SYYuE
Sx]tp֋M_^3[&]U$t3ʼnEE3SVW}ىE܉EhPMMMMMM7EPh?ENPVhHEP}E3QP7EQPN$V$yEPj@@؅um}ESP37PEPN$V$xH3f9t?hdVYYt$΍Qff;Eu+34Nf9u	ES]tp֋M_^3[9%]ULt3ʼnEES3ۉEVW}EhxP]ĉ]]]؉]܉]]]Љ]ԉ]ȉ]7EPh?ENPVy28@xWppjWYf}MQMQp0֋y$8@5x+WppjX몡8@txruppjYYhEPhEP9]E4EP
8AtyrEĺ4qqjZY}tpփe}EPh?E؋7PNVy9
8AyPE4qqj[Y}EPEEP7EPEPN$V$y#
8AtyyrsPE4qqj\럋}EPEEP7EPEPN$V$y&
8At&yr EW4qqj]IEu
8C;];
8AtyrEĺ4qqj^YME*
8Atyrqqj_Y%uα]tp֋]tp֋M_^3[!]Ut3ʼnESVW3L3@< s<dX\8@txrppj`Y8hhhP9HLhH`PdP7LPh?jNV`tt
l4_d dΉs @胆8hhhPhPXPX<,$Ph?<Dž$P(Dž0@48y.8@tvxrpWhQppjaY5SS< <P萠x@<hy[ tpփ<t<@dM_^3[]3 Srt0vUXt3ʼnEESVWE}3M3ۉ]v<]]]]E8@txrppjbY9H8UHEPEP7EPh?jNV7Ett
 4uUΉu]i]98u

MՃ8EPE]̉EEPh?EEP]E@]ĉ]y-8@tvxrpW8ppjcYTV<EMP4x']̋ME]t0M]tpփ}t	uM薄M蒾M_^3[]̋UE 8@txruuppjdY}
]UQQt3ʼnEVW}3E!Ht
EPR>TtEP\XR<<tEPQE
x3EtPM_3^]348<H@DLPTX\ËUVujuqE<8@txruVppjeY^]̋UVEt
tV質^]V8薪<苪@"TuXj\_8@txr4Vpp^U3tv
xQuQR	t3f]UQQUMEQMQЅxmMSVW}jZU+t6E+E‹Utftf2K@uUut
f9tME_^f[‹]ËUQQUMEQMQUЅxySVW3QMߋЅx^Et0XxKE׋M+Et&+MtffEHNGEuu	tEMf_^[‹]ËUt+EVW+t<ftf9Nu_^uҁ3f]V3u)Vu f;wWf;_w9Fufuft
^UESVڋ3W}tQЅxtNENt_^[]UQQt3ʼnEVW3}9>u-WWREPHyjY)M3t
WuPM3_^]VQ3QQQQQVP4^yjY)ËVjjFP6DyjY)6<&^ËUVWujY)39>t
6X>QWjuWWVP8_^yjY)]UQQt3ʼnEEVW3uWVRPWWWRP1T_^yjY)M3]Ut3ʼnEE SVW33ۉ!ωuu
BWh,jdP,P$P Ph?$8P7NVh4j@@ȅtpp<}!3ۅu
 2Ux}4jd+^t
ftfuu3f@3933 tp ֋tQ t֦M_^3[]SVWj[?t
7m'utVX_^[Ut3ʼnESVu3WEىEEEPuj]EPEPPxueEePujx`EPEPxCu褣eEePujxEPEP˳x3]tpuIM_^3[]U t3ʼnEE3S]VWMEEPSjMUUUU
EPEP%x.E}EjPu7jN$V$u虢eEePSj
xfEPEP²xEuYeEePSjA
x&EPEP育xEX4]tpuM_^3[:]UES]VW3M!8E!8Pj@@EtuPj@@tatDE+lj]EߋMPSuCxNEmEu;ut3;sEM83E!}W2u*_^[]Ut3ʼnEESىEMV3M01W}u9u"hEPEPWxcMEPEPWx#jjm
xMEMEut赢M_^3[]UQQEeSV W]8,@txrppj
YEP]y0
8AyVqqjY8@txrsHsHppjY{HMSGCHy!8@tAxr;Vp,pj
땡8@txrWWp,pjYE8SP_^[]Ut3ʼnEE$SV Wh8j@ @tvs<F3?t{u0h$jdP0P(P $P(Pܮx/$7 4@E3ۉF430$tp$օtgM_^3[l]Ut3ʼnEE$SV Wh8j@ @tvs<C3?t{u0h<jdPo0P(P $P(P譭x/$ 4@E3ۉF430$tp$օt8M_^3[=
]Ut3ʼnEESV3EW}ًM0EPEMP1WutxTMEPEPWv-x#jjDxMEMEut茞M_^3[]Ut3ʼnEE$SV Wh8j@ @tvs<*3?t{u0hXjdP蔾0P(P $P(Pҫx/$- 4@E3ۉF430$tp$օt]M_^3[b]UXt3ʼnEE3SVWMEEPRuuMUU܉U؉UUЉUԉUȉỦUUU؅E؋PEP؅}؍MQMQp0֋؅}3Љuąt+]܋AEff;Eu+M4NB;rۉujY3;gr	\EċPp؅Juj@@Eu
.3M֋MuąEE4EPEPEPu؅MEPEPש؅}E3ɉuQP7EPQN$V$؅E3MċVff;u}+VQW
MFyfqfEA}}Mpu3uۘUċMBuԉU;EUu
Mu觘u蟘u藘}tp֋}؅tp֋M_^3[]UEVPQ py&
8AtyrVq,qjYֻ^]U8t3ʼnEEUSىE3ɉ]VM܉MMMMMMMWQȉu+YEPEP:/4#(}E3SP7EPSN$V$t28@xWppj,Yuj@@EЅu
}PEP7SSN$V$y8@t~xrxWppj9]vhM̍EPE4u؋xBuԋ;x2EH;uuԋN5xt赘3uC;]r3t蛘]tp֋M_^3[]Ut3ʼnEES3H]VWt"tt

̶URP0}ESP]E7PSN$V$y'8@trxrlWp,pjYLV}MuAI}MSSQSp(֋y(8@txrWu,ppjY胹]tp֋M_^3[Z]UES]VW3!;!{Ht,tt

̶ܶ
UM	REMEtMQMjjMEZPȖuVj@@umeMUfu}xQMxCUMx2}tMxUMyx
E3ECWœ_^[]UEV3W!0!pEHttt
]̶S
Pj@@u'uwhpSV,xVu3[V,_^]̋UQeEVW}P'xUMW蕈u_^]Ult3ʼnE3M!ESVWE3EEEEP}芛EEj[y'8@xVppj@ft18@xp,pjY8,@txrppjY躵MEPy*8@txrVppjY螵}jYE@u}EPjWy'8@xVppˍE@uQEEPU]Mt6
8AtyrPq,qjYEUEoEuEPEPEFhPMjXfFfdžhlV(y%8@txrVppjY,|UˍE@uˍE@uE@ut*Eȋ…t	@uRojYE@utWuMM_^3[]ËUt3ʼnES3VU‰`WʉUUdEhElEMxt9tt
؅y28@xxSppj,YF_xPJ؅y08@txrSp,pjYxjYE@uEPxjPE؅y'8@xSppjVtP踗؅y08@txrSp,pjYntt|Gfu.8@txrp,pjYAlMee\GhQȉp؅ujY}EEEPUM!]!]pEPjY3E}EEPUME!E!EEpPsujEPUM9EhPEPWl|W蝖؅yu8@%xSppj ElEh|t-8@txrjp,pj!Y訰ă\ut{pEeeP؅tEdyjY3}EPUM`ujZE@uEd`|h,l0ǁMj^֍E@u֍E@uE@utQEj^t'Mt	@uuË΍E@ult,hȋ…t	@uR荋΍E@udt%M…t	@uR\E@uWJM_^3[]Ãt@t4t#tt"3
øøËU<t3ʼnEE3SVWEč}3MȋMjM̉UU܉UԫUUQE_RRhP}H؅x)VEPjEPhu@؅x
9}tH
}t	uX}tjuPW3V-M_^3[n]WEPuj@@uЅu
}떋u쥥uj@@}ԅu
ulu쥥3Vj hhu,؅x~}VjPVVEPu8؅x\Mft'jURVVujVjPquT؅XűEffFPj@@ȉNu
u&EuUĉEjXfAf,yfA2}fjEPuȍAPjWjVruT؅yũ~tv諈f3M̋EfUDt3ʼnE3ES]MVWSyUU܉UUME,UЉUԉ}̉MĉE9Wu3SRRhEPHjEPjEPhu@o}t

_w}jj@@EЅu
:u쥥uj@@Eԅtۋujj hhu,M39MjHjEPjjEPu8EMjQ38ẼQQjuЃQWPu܉ELE=wffCfuc3aPj@@CuGjEPCPsjujWuuLy{ts腆c3fEf}t	uX}tjuPuLuDM_^3[]U,t3ʼnEESVu3ۉE؋EWMjx^fYf+uȉ]}ffFfu^Qj@@F;u
EM7,2+SEjPu0yjY)SjEPu0yjY)}Gt%M؍U]SuPu0yjY)MEPMuPGPvMv5uXM_^3[:]UVWxhuVcutMCF;,t;0t&@tQVQuuVuu;_^]UESVpt5ft-3Cf;r";,t;0uFuu2^[]USVujuQ3 h4džSP~jYш@u@u,08@txru,Vppj"YW^[]̋UVEt
tVC^]V tQjYэ@u@u8@t xr,Vppj#Y身t^鉗Ut3ʼnEESV(MUW39jȉ:Z$84}},0 |^h8j@@t(qv<3ۅu
&(P(EhXjP謤EPEP~88Ph?E7PNV,P$jr4Ph?,8P7NVf4jj(7hN(V(7PPQQjv)
jP<jPx(
l\`<HPXhPDž<DžpDžtDLTd聉cQvE$j,3EEEEEEEE	E
$ht萃$@$	rQjDžDž؊jPjjxw Phx^( %xG8ʁ(ˉC4hx$4F3ۋ(30~8tp8֋4tp4օt踀 t觀M_^3[]UES3VWEMMMPxwEPjzxd}_Sj@@uGMVfA>fFfA<fFG;s# EPEPRSVM?xE03V}MCzu}_^[]UQeESVWPX}x/MWfAfG>fAfG<薆xuj+W8}_^[]UE3SVWEUPjUixQ}_
Sj@@u4GN;s# EPEPQSVMAxE03MKyV|_^[]UE3SVWEUPjUxQ}_
Sj@@u4GN;s# EPEPQSVM謏xE03MxV|_^[]UE3SVWEUPjU?xQ}_
Sj@@u4GN;s# EPEPQSVMxE03M!xVy{_^[]UQeES]VWP#4}xjj@@ȅuG8j${W{_^[]Uxt3ʼnEESVW3ۉE!j\ESPEP}EMUEEЋEUdUPj@E@؅u
E{0MuȉECE3CX}};Ms
#EPEPC\PQCPMwEMU}};rEPEPRQCPM胍@EM}};ErURURQPCPM認EMU}};PEPEPRQC PMEMU}};EPEPRQC(PM܌E؋MU}};EPEPRQC@PM行xbEM}};EURURQPCHPMȌx1E;EMQMQuMPCPP螌xEuxuxuxuxuxuxu~xuvxSpxM_^3[]Uxt3ʼnEEUSVWE3ɈMMMMMMMMMMQMQsj[G4UEEEPE&^EPUM
EEPS{/u4EPjEP
M?tEPjzu4EPjEPnMse3E4ȉEQEPQQMEP$EPj
zxqMsEf]E4f]ExEQEPQQMEPx,EPjzxMKsMAPSM2sˍE3҈@uˍEԈ@uˍE@uEĈ@uM_^3[]UQeESVWP~}x1}OtA
Qx
WWu_^[]UQES]VW3H};tWtGt7t'ttPEPp5EP
*EPjEPEP*	EPxE}W6u_^[]UQESVHWtztnt]HtMttjuQQ軔\eEP}]xESC8}St.uN"ujxujuju_^[]U,t3ʼnES3VWE؉}ԉE܉E4E]EEEs
$-44EEPW4E܋MPiEPEPQ{3E9EvRMQM44d]w4tu3ۉ]E@E;Er}EPhmxQEPhWx;3u܋L#x'Gr}ԋux4jjur3Lt
'udGrtuEtuururM_^3[]ËU$t3ʼnE3SVWEىEE܉EEEEEEPjuEPEPjKxv4EPEP舂x]}p֋xCEPs4jNx/4EPEPAx}p֋uququq]tp֋]tp֋M_^3[]̋UQeEVW}P'4xUMWfu3q_^]UQVujud4(8@txru<Vppj
Yř^Y]̋UV(8@t xr4<VppjY~4trUEtVup^]UjjEPjEPjEPjRj+uu0]USVuWtVtVj_tVujWVShj+uu _^[]UVuWtVtVj_tVujjEPWVjhj+uu(_^]UVuWtVtVj_tVujjEPjEPWVj
hj+uu0_^]Ut3ʼnEESVMMUW3M9jUȉ:ZuE}}}}}}}}}1ih8j@@tMqv<3ۅu
EPuEh<jP/EPEP~8EPh?E7PNVCEPuj+}EPh?E8P7NV}3QQuQp(֋uEPEPQQjEˉEEPvuuQruj-qxoEPjqx\QjxxL3PPPjrx8uoEˉC4\ux4FEM3ۋE3ulEtpM֋EtpMօtnM_^3[]UQS]VW}#MGwLjj@@u:jX+tu3@QMPox333t
Vl_^[]U0t3ʼnESU؋MV3E2Wr1PMԉuuuqlEEs
xuhPj@@EMQPQhPuVlMɈEHPuxjVE܍EPtEHE	Pj@M@؅tcMQj@@tOuhLuSÍx5uuhtuW覍xSuWu33SjWj}t
EPpu}jM_^3[]U8t3ʼnES3VEW}؉uȋN4EEE؉E܉EЉEԉM8@ txrQQWpp3U؉E̋ύEP-4EPEP/z}E3QQ7PQN$V$y28@ xWppjYG8@ txruppjYuȍEPEP4y4MX424!]!]x8EPh?E؋7PNVy+8@ xWMQppj
}3QQuQp(֋y58@ xWuppjYu3@E̡8@ txruuppjY艌4!]x8EPh?EЋ7PNVy+8@ 6x,WMQppjE̍]ȉMy'8@ xWppj}E3QPME7PQN$V$y/t'8@ xWppjEPj@E@؅u
c}ESPE7PjN$V$y'8@ 0x&WppjLE3ɋUt
9t^A;r@ETM}PESQjr(֋yS8@ xWppj8@ txrRppjY
S}}tw}3ɋEQQ7@PQN(V(yT
8A tHyrBEW@PPqq)8@ txrWMQppjY?E;tSe]tp֋]tpu~euveM_^3[]USV3WMEQM]QMQQi}]9]vLuWuWhE@E;Er'8@ txruppjYSxsu+}h>Pj@E@؅uIWuSAEuPVx%}QjoxuSujjSZduRd_^[]U0S3VWuE؉uԋE؉EE܉EE]}|u
x4EPMEPUZuuMԋ4%3EEEEEMUQMEQMQMQMQQ+Z8]u	8]MEPhY]E܋PuutEMEPh}EPuut7υt1EPujxdEHtYt
tOt{Ez>EPu2xPEHt!t
tt{1z*3&3Et~dtsdthdu$bububub_^[]UE3SVW}UtEPEPEPQfExq]tXtTEPj@@uLuuP43Et<W<hE@E;r}Et73}VOauGa_^[]U(t3ʼnESV3EWىuMUPuuuuu܉u4EPEP4q}p֋4EPEPpxl}E3SS7PSN$V$xJM}Mtp(SSQSp֋4t:u]tp֋]tpu_u_M_^3[6]U0t3ʼnE3MSVuWuԉEEE܉EEE8@ txrVppjYOEPUWM؍EPEP4oy>4t:'8@ txrVppjYR}E3QPME7PQN$V$y΁t28@ xWppjY耂uj@@؅u
}ESPj7jN$V$y8@ tSxrMWppj뗋E3ɿRtU؋r494tmA;r8@ txrppjYEtpMS]u]u]M_^3[/]mHEtP}uSujp(֋y8@ xxnWppjuԋV6K8@ <x2WVppe USV3WMEQMuQ]x9uv4M xF;urS\_^[]ËUt3ʼnES3VWP4jEEEEE}EPj_EPEPj{4EPEPly68@ xWMQppj Y觃}p֋y8@ t]xrWWppj!A
ix?{8p֋y%8@ txrWppj"Yg]tp֋M_^3[]ËUSVuى]hEEPEPEPQ_x}]3W}9uv8WhuWu
F;urE+EPSW]};uR(QMjRfx+]GMSuPj}`_uZ^[]UVWu3u|ux{~4 uU4EP}} xMEPO}uNZx5Wut$ uuHx
uMWZ_^]UQVuju@n408@txruVppj#Y衂^Y]̋UV08@t xr4Vppj$Y^4t[5nEtVUY^]USV3WMEQMuQQȉu`]xb}ƅt
M9t#@;rPj@@u.g'PSVwMGWWVQMA^SXVX_^[]USV3WMEQMuQQȉuQ`}؅x1Mht%E9tF;rDIQQWQM]W<X_^[]UQVujull488@txruVppj
Ỳ^Y]̋UV88@t xr4VppjY~4tYUlEtVuW^]UQES3V!EW3!EHt!tt
dAqA0q4A$q(Vj@E@؅u5VuSVj@@EtVSPMEE0SVjV_^[]Ut3ʼnEESV,L3W؉`XP`jPEPDž Dž$Dž(Dž@DžDDžHDž0Dž4DDž8ADž<fDždfDž\fDžT\SEPxj ^j0EPxj `PhP\ShPxj0hPx$P3PPPPPPPPjXPLP3PPPPPPPjjPPL]P跼;ShpVj@@u
SWVWlUЉuEEhEE0MPQj uPEЉUPEPjEPQEEMPQj@EPEEPEPjEPQCEEhME$EPQj@UPEЉUPEPjEPQ:(EEQEjE0PEE[PEEPjEEP}EDxw(EEEhEEE[PQj0MPEЉMPEEPjE}PEDQWRSRd0jpd0jpM_^3[]ULt3ʼnEEM,EċEeeEESE3ۋEVuWE̋E E3jM]ЫEP4YSVEP`CSVEP8-jX3E9]v"}ȋ]4hMFE;r]Pj@@Eu
juP<e}vJE̋u+ƉE̋0uEEPX6ujuHEЃ@;EEЋErjuEjPT_uhuċhPj@E@EAjuP<ujjuċF%
Pju@Fjju
Pju@3EVujPdEuPVEPDuj@@؅EPSEPDxoE$<uQEPEPEPS0xOEPEHPuPx7uVlHPVxE$uUMJtr3uOuOSOM_^3[ۿ](UQSVWډMj<j@#@tj<jV3t ux33tQ襪_^[]ËUSVu3ۉ]Wj
Zt ΍yff;u+MEUu]t!ˍyff;Eu+MEUu}t%ύAEff;Eu+MMEUuMt$эBEff;Eu+UUu3PuVuSuWRQjhj+uu8_^[]UQQt3ʼnEEjjEEPjEPQhj+uuM(3]UQQt3ʼnEEjjEEPjEPjEPQhj+uuM03Ž]UQQt3ʼnEEjjYQEEPQEPQEPQEPj9hj+uuM83m]UQQt3ʼnEEjjEEPjEPjEPjKhj+uuM03]UQQt3ʼnEEVEEWtjZ3t
f98tHuWRQjPjEPVhj+uuM03_^蝼]UQQt3ʼnEESVuىEWtVtVj_tVujWVjEPShj+uuM(3_^[]̋UQQ3VWL$9M}t|8@txruppj
YoJy(
8AtpyrJVqqjYn.MT$uxD$L$
t@M
8AtyrVqqjYn_^]̋UQS3ɻVWL$9MtY}tRIy%
8AtjyrGVqqj
Y0n.MT$vxD$L$
tyL
8AtyrVqqjYm_^[]̋UQQ3SVL$9M9M9M9M]8@txruuuupptHy(
8AtzyrTVqqjY'm8UD$MPuuwxD$L$
tfK
8AtyrVqqjYl^[]̋UQSVuWtw]tp}tiEtb' 8Bt#zru3VrrjY8E~t]Bt'zr!PIPrrjYl8
BtzrVrrjYk_^[]PuWS?{8̋UVuWtg}ta}tZ'8BtzruVrrjY8~t\Bt'zr!HPrrjYl8
BtzrVrrjY0k_^]Wu{8̋UQSVW}3t$9u]38BtzruWrrjY89wt4Bt'zr!GPrrjY3k8
9D$Pu,wxL$t$
tH8BtzrWrrjYj_^[]̋UQSVuWtq}tk}td]t]'#8BtzruVrrjY8~t]Bt'zr!FPrrjY8j8
BtzrVrrjYTi_^[]SWuu蓣8̋UQSVu3ɉL$W}8BtzruVrrjY8~t1Bt$zrEPrrjYYi8
1D$Pu諦L$x	
tF8BtzrVrrj YEh_^[]̋USVu3ɉL$W9M}]8BtzruVrrj!YF8~t4Bt'zr!DPrrj"YSh8
<D$PD$PuϦL$xL$
tE8BtzrVrrj#Y1g_^[]̋USVuWt^}tW'8BtzruVrrj$Y8~tUBt$zrCPrrj%YZg8
BtzrVrrj&Yyf_^[]Wu/8̋USVW}tZ}tT8BtzruWrrj'YE8tUBt$zr	CPrrj(Yf8
BtzrVrrj)Ye_^[]u}uujE8̋UQ8SVW}u

BtzrWrrj*YA8t,Btǀzr2BPrrj+Ye8롁4s$'x:xNC8BtzrVrrj,Yd_^[]̋UQSVW}t\]tU8BtzrSWrrj-YM8t]Bt'zr!KAPrrj.Yd8
BtzrVrrj/Yc_^[]SxSx
S8̋USVutZ}tT8BtzruVrrj0Yi8~tVBt$zrg@Prrj1Yc8
BtzrVrrj2Yc^[]u8̋UVuWt_}tY}tS8BtzrVrrj3Y?8~tTBt$zr?Prrj4Y:c8
BtzrVrrj5YYb_^]uu8̋UQSVuWtw}tp]tiEtb# 8Bt#zru7Vrrj6Y[8E~t]Bt'zr!>Prrj7Ybb8
BtzrVrrj8Y~a_^[]# ?u
8뽃?uPSj|x̋UQSVuWtw}tp]tiEtb# 8Bt#zruu7Vrr8E~t]Bt'zr!=Prrj:Yba8
BtzrVrrj;Y~`_^[]# ?u
8뽃?uPSj|x̋UQQVu3ɉL$W9M}8BtzruVrrj<Y8~t4Bt'zr!<Prrj=Yb`8
1D$Pu菟L$x	
t=8BtzrVrrj>YK__^]̋UQQVu3ɉL$W9M}E8Bt!zruVrrj?YH8E~t4Bt'zr!;Prrj@YR_8
2PD$Pu蚙L$x	
t<8BtzrVrrjAY:^_^]̋UQSVuWt^}tW'8BtzruVrrjBY
8~tWBt$zr:PrrjCYf^8
BtzrVrrjDY]_^[]Wu8̋UVuWtZ}tT8BtzruVrrjEYC8~tVBt$zr:PrrjFY]8
BtzrVrrjGY\_^]uu8̋UQ8SVuWu
oBtzrVrrjHY88~t,BtʀzrċE9PrrjIY\8뤋x~:8BtzrWrrjJY[_^[]̋UVW}tFut?&8@txruuWppVup֋
8@txrVppjLYE[_^]̋UQSVW}3j[u

8XtxrWppjMY@789wusXtxrppjNYZlx%8Xt>xr8ppjOYwZ#8Xt8XrVppjPYpZ88XtxrVppjQYEZ_^[]̋Uuc63]UjjEPjEPjh j+uu(]USVW3Eh߉85Էut+8@txrVp pj
Y5hM؅h9=Էu;u5Է8@t\xrV5Է ppjYz5;8@txru ppjYN5M
5Էh8@txrVp pj
Y
58M1t
8@txrSp pjYzX_^[]Ë}8뺋Ut3ʼnES3Dž`VWdDž@ 3҉$ډ,8,403D(3DžP< T@,y58@ xVppj YW<PhpPjWy'8@xVppj5,pt
ߋ(v`3PBp,y"8@tlxrfVppjKjj@@tW8	030u@8@txrp pjYVW8jj@@tVn
3u
8y58@WxMVppj YV4#84y38@txrVp pjYU44@PjZ*y*8@xVppjNjj@@tSȉ83ɉ8u.8@txrp pjYU83ۡ8@t xrQp pjYF18$t
#	W10ttS8M_^3[6]ËU$t3ʼnE3SVWEىMMM8 xtxrppjY4TEPjPu3(ȡ8xtxrQppjYT
IjYEMPQEPjuu#(ȡ8xtƀxrQppj뭋Eu[8xtxrppjYSLEu-8xxppjYLS
8ytyrPqqjYCS@PbeEPWSj SH/8@txruWpp9}v}@Wj@@؅uS.}t	u88xtxrVp pj$YRM_^3[]á8xtDxr>Vp pj YJR(8xtxrp pjYRYhd EP
8At yrwPG8 Pqqj!YUjEPG8P,uGP;Et
tB뫋Dt78@txrWp pj#YQE88xtxrp pj"Y.Q4Ut3ʼnESV3uu3Wu

=QVhu?(ȡ8@txrQp pj%YP8EPjWu7(ȡ8@txrQppj& YPtEPjjVhuu'(ȡ8@tȀxrQppj'묡8@txru ppj(Y`,EuW88}tu88}tu88@txrVp pj)YOM_^3[,]ËU4t3ʼnESVWEPj3jj]]|um8@txrp pj*YOEPjj(y68@xVppj+ YNpxljYEEEEPQSEЉ]Pj,u]܉]؉]EMf]$y8@txrVppj,닋E]9]t	u89]t	u8M_^3[]ËQh%Էط8@txrp pj-YM3YËUQHu
tQ]ËV~t	v88@txrVp pj0Y*V)^UVMN8@txrQVp pj/YR^]Ut3ʼnESVW3ۉ]]9_uEPjjj?#}*8@tixrcVppj1 YLMGj@EEPjjy8@t xrVppj2뵋EG]9]t	uM_^3[]ËUt3ʼnEVjFfEEPjjy)
8AtyrPq qj3Y&L}t	uM&3^薘]ËUEV&fFt8@txrv Vppj4YP^]V>t&Nt8@txrVp pj6Y'^ËUEVWtjZ3t
f98tHuWj}Wj}WRQjPVh j+uu8_^]UQEMSVWjZt8}U3t
f98tXޅutf99tquWj}W}WSjPjEPRVjQjh j+uuH_^[]̋UVujjuu8y*
8AtyrVuuqqj
Y^]̋U<t3ĉD$8ESVىD$EL$4W}3sD$ED$|$t$ L$87lxvCVVt$D$0D$D$4D$ D$<D$,VPuD$4D$8PD$H@t$PyY8@txrWt$ut$ppFt$tV8L$8L$D_^[3踕]t$SL$ xt$̋U4t3ĉD$0ESVىD$W}L$03|$st$L$07ZxjCD$D$D$ D$PuD$D$ PD$0@t$4t$8yX8@txrWut$ppjYt$tV8L$0~L$<_^[3貔]t$SL$xt$뺋Uuuq]̋U,t3ĉD$($$SٍL$ VW}sL$(ICd$ d$$D$D$PhD$D$PD$(@|$$y 8@tKxrEVWppj
.t$y)8@txrVWppj YJL$(IL$4_^[3}]̋Ut3ĉD$VWL$wL$Axswy*8@tVxrPVp pjYgF:wy)
8AtyrPq qjY/FgL$kL$_^3蠒]̋U4t3ĉD$0SV3WL$$t$t$st$ L$$`ED$ PWWjXPs#t$ j@@u
D$ Pt$$WjXPsy78@jY8HVppj Y,EGjYPj@@D$tO3jfD$fGZffD$D$0PQD$ PsD$PhD$ PD$p L$֋xkD$pL$փd$L$IL$a8@jY8HVppj8@jY8HVppj8@t|jY8HrtVL$Qppj$8@tVjY8HrNVL$Qppj YbG38@tjY8HrVp pjY}Cx
WL$$L$<_^[3]̋U4t3ĉD$0EUS]VuWq3L$ L$4D$T$t$$|$|$,|$0tu

L$0vD$t!8tD$ǃPj@D$,@u
D$uD$(D$L$$Qt$(WjPD$0p3ɋD$f9u4uOOyutGT$tGx(L$ t D$9GvwGPQW9L$0<L$<_^[3p]̋Ut3ĉD$Ed$d$SىD$VW}L$sL$,xLu|$ut$ujWsy(8@txrVp pjY=AL$}L$$_^[3豍]̋Ut3ĉD$SٍL$VW}sL$}x9Wsy)8@txrVWp pjYZDL$L$_^[3]̋UDt3ĉD$@S3ۋM!\$$!\$(VuWpL$$L$8D$t$(+D$ L$4!3!7D$(PWWjXPD$$p#t$(j@@u
D$(Pt$,WjXPD$$py58@xVppj Y?Gj^Pj@@D$0t3fD$,fGffD$.GjYD$'r	OGwrw3D$('T$L$(Q
t$(j@@؅\$3ɉ\$L$9Ovw3jfD$0fGZffD$.D$@PQD$4PD$ pxVD$,Pt$4t$XT$$L$
D$,ȉT$L$L$AL$;OrD$ L$$3ۋGZ8@tLxrFVppj18@txrVp pjY=x
t$0W
SL$4L$L_^[3;]̋Ut3ĉD$SVuWL$t$sp&L$D$Pjjjs#t$j@@u
D$Pt$Wjsy*8@t|xrvVp pjY<`GPj@@؅twGPS藍D$18@txrVp pjY<x
jL$L$$_^[3]̋A̋UQVFHu:t6~@t	vNtNw

V2^]̋Uujjuu	]̋U@t3ʼnEEUSEċًM3"eVWu}諉UU諫3}ܫbtU܋b{EeE̋EĉEԍEPEEPjEE@7PEPuNjVxjEtvu"RxI]ejj@@t
S3u	M33t0֍M(M_^3[]̋U0t3ʼnEU3SVW}UЫ3ۋMU]a~EE؍EPEEPEE@Pu]]7jN(V(xfEttR4xI]ejj@@t
S3u	M33t0֍MoM'M_^3[]Ut3ʼnEVuEWPEPEPV0xaEPEPEPVxJEPEPVx7EPEPVx$uuu7uuNjVM_3^c]̋Ut3ʼnESVW3}쫍UًM_x;{EPEP7jN,V,xEtHu4MYnM_^3[΄]̋UQQt3ʼnEVWyMQjp0_^x
MtM3v]̋UQQt3ʼnEVWyMQjp4_^x
MtM3&]̋U<t3ʼnE3USVW}u]M̋MMȉUī3}૫3}Ыt!tu

tUz^}̍EPEPEjPj7N8V8x^}v}vxIMu	!M!MԍMЋUȅtAtA;vxUątqAPRwMl}tMlM_^3[]̋U$t3ʼnEESEًM3VW}ܫ3}쫫tUx]xC{EPuEu7uPN<jV<xEtuMk}tMkM_^3[F]Ut3ʼnESVW3}쫍UًM\x:{EPEP7jNDVDxEtu4MJkM_^3[迁]̋U4t3ʼnESVWщU؋EM3M̉0މ1MzEЉuuQVuupH֋E9]tGEMEȉMuEE܍MQEM܋Qx׋yEjYr	MEPuj@@؅u
}؍3EMQj]pH֋x{2}t]Eu0pV„M1EuMuEEԍMQEMԋQx׋yMЋEẺ3S]te0֋]te0֋M_^3[]̋UE ]̋UQWGHu:t6S_xtV0^O8
W[_]ËUEVVxFFR^]UQESVWj3Mj@ډ8@t8E@FF^tVܷR`uE0_^[]SVW3jj@ى7@t
S(ƅu_^[ËSVWSG98tjY)>F0Sw_^[ËVWW9quF90uWA_^jY)UVW
?tWUv3At&}++2tftfuu3f_^]Ut3ʼnES3fDž VWj YÉ$4fDž(ƅ,Dž04Dž84ƅ<Dž@DDžHƅLPTDžXƅ\Dž`dDžh,ƅlDžptDžxdƅ|E	]E`EE]EEE
]EEE]EEME EȘEME!EؔEME#E0EME$ExxkvFSSSSSS6vP$PLG
rӅx>h(SSSSSSSSjPLxhh $%?M_^3[V{]ËU0t3ʼnEVWE43EԜEE,EdE`E褸E참EEEx|Ѓ?t7d0jp'Fr5DM_3^z]ËUESVW WUlPEPj@E@u,WVuVlEHPVxME03j	_^[]UQQSVW3مt!>ES!8lE<sxRShEt,Pj@@u.uSW!~WlEHPSxM>3jN	_^[]U,t3ʼnEEeE؋ESE܋ڋEVEEEEWEEhPEPEPL=}x(uuEEu}uuPQWM_^3[x]Ut3ʼnESVWfE3V]"Ӌ;u
Af;Gt@E;u
E@f;Gt
rVl8tSVx8 t8tM_^3[[x]ËUES3VE]WEEE V|tEVlEt8Vl}Ɉ5VVl8t
E3o3ۍEPUExK]E4SuE4Vu
Gr؋EE}uE
]}
S_^[]U8t3ʼnEESډEV3]̋щUWtˉ0@uEPVVjR#uj@@EPuWjue]؃]؍EPsjU39v]O9Yu9t@;r];td@kjY8u@EjjjEEPjuEUMx6EECCEЃ@]؉E;E`aWM_^3[u]SVW93tYf9 uF;rb_^[Ã(vuf;vt3҅t >3f9tȃ^rB;rj.Yf;LCt3믋Ut3ʼnEESVWj^VEE3j@}ME@ȉMuJ3fufuju쫫fEPyE
@jY@uM]3ɉM}Qq
@u3x$tUmxUMnS6M_^3[wt]UQSډMV3WNff;u+~v=?Pj@@uS׋YxVu3V_^[]ËSVW3ft(Pj@@FufSVfFWV_^[ËV~tvK&f^ËVFtNt@uFP&f^ËUQQS‹W3E8tBVNff;u+4uVj@@VSPEmwM^tE_[]ËUQQS]VUW3E;Nff;u+Qff;u+ʍ~?Pj@@u'uuhh!WV%x3V(_^[]UQS‹V3EW!0u
9;Wj@@uPs>xE03V_^[]ËU(t3ʼnEESVE3@WEUEjM+Yuuuuf;Qj@fM@EttEPj[SuxP+]ft'hx!EPEEWuPuf}EPEPM؋EEAutVM_^3[q]Ut3ʼnES3V]W9l|W9Mo9:*hܷܷC
hh8<hh!VhXVh@h!hh!hHh"hPMix*SEPhMixWM_^3[to]ËQVW=طt2W5Է%ԷW%طt8@txrp pj.Y\"_^Y̋UQES3VuEWttjWXHÊ#uWSWSEUFt	Nt^~VF3_^[]Ut3ʼnEV58W,FePjjEMPjQVh3N 6uЋM_3^-n]ËV58W8;t*FFtvvff6uމ=8_^ËUES3V+uV\иظܸ88@txrp<"pj
Y h|QQY55|
8Atyrq<"qjYk 3^@[]UjjYQE PQEPQEPQEPQEPj h#j+uu@]Ut3ʼnEeeSVWMVlVlKjVEPtVlxEPuEPpM_^3[Ll]ËUDt3ʼnEEEȋESEEVWE}3Uī3jM̋މu諉uЫEP4bV5EP`GV5EP8,]jXEt}4hMFE;rPj@@؅u
juS<e}vHEȋu+ƉEȋ0uEEPX6ujSHE@;ẺEErjSjEPTi54h5(hPj@E@؅@juS<ujj5(F%
PjS@Fjj54
PjS@jSjEPdE3!]PSEPDuj@@EЅMQPEPDxr}uOEPEPEPu0xQEPEHPuPx9uVlHPVxEUEЋM!]ЉBEBE
BS9u1u)u!M_^3[bi]SVWj_s6vu!;_^[ËUt3ʼnESV‰PTW}XJDž`!P'\Džd?DžxDž|zEuEEE]hlDžptEEDEAuhpVj@@؅u
TSVSlWj1E?U(EEEXPEЉMPjMY(UEEEGPjxMPEЉMPjYE]DP(E١Eɡ EыU%UԉE؁0ExEEG PjxUPEЉMPjUUY(UEEEG0PjEMPEЉMPjYEk(EExEEGPPjEUPEЉMPjM؉U܍UY+(EExE0EEG@PjEUPEЉMPjM؉M܉UUY(UEEG`PjhEPEEPjYj(UEExEGpPjhMPEЉMPjYE3(UEEEPjEE[PEEPjYE]ED(UEExEEPjEMPEЉMPjYE[E]EDmxX(EExEEPjEUPEЉMPjM؉U܍UYySM_^3[;d]Ut3ʼnEVW3jPE45h5,h(Vj@@u
jVW<xy5,hjWHx_5hjWHxES33f;Gs#EPPWPx$EHCf;_rjWjuTx3[WM_3^2c]ËU$t3ʼnESVUM3WuM܉]]]]9=4r;
<;r+PtGfĉEEtStckEu858h։EHeapEE~uhHEEPhL"EPGh`"EP.UMa6EPh?ENPMV4u'}EPh?E7PNV3@ÅhHEPhL"EPh`"EPx{}EPh?E7PNVxU}ESSP7SN$V$x5U}BSUSRSp(֋xM܋E]E
E]tp֋E]tp֋Et8Heapu5@P֋Ǎe_^[M3`]U t3ʼnESVW3ۋMWuM]]]lu
xEWlHPWx8]94r=
<;r-OMtdĉEEtStckEu858h։EHeapEEuEEPQQ@6EPh?ENPMV4u'}EPh?E7PNV3@Åto}ESSP7SN$V$}USBSRSp(ΉU֋}SSSSp(֋tME]E]tp֋Et8Heapu5@P֋Ǎe_^[M3`^]U$t3ʼnEeSVuWVUlu
xeEPQ3ۋ֋ω]xUEPl]EtpMօ3ɍEQPME3PQN$V$#EPj@E@ȉMu^3EQPEN$PjV$x=E3ҋMut
94t[B;r@EtuQup(j֋tpuM_^3[\]SNjULt3ʼnEESVEȋEWE3u̺EЉEԉE؉E܉EEELEt"EE"E,E"E"94r4
<;r$Itl`܅tStcku158h֋؅Heapu̸Hu6MQh?PNMVE̅~hpj@@uu
h3!FLFPEF\FPFHFX##
#F#F8F <F$F(jF,XuȉF4F<3VNF`F0F8fFTV@NDhHEă0 űPj@E@ȉMUă!uȋqAEAhuȃfFhUăM̃uȋffȉNhŨMă
ff ȋEĉN$4t$V^}ȃWhMPEWPa^}ԃhpup(jh֋}uujh̷p(֋xj3EtEP}ԍEPh?E؋7PNV}̅x.}Ћp֋Eȃe@Eȃr}EЅtpM֋EԅtpMuut;Heapu5@S֋Ǎe_^[M3X]̋UTt3ʼnESVWUЋuԋEE؋EE̋E(E܋M3؉E!]EEȉEEEUEAEEBU},Mĉ]E94r=
<;r-EtQ\ĉEEtStckEu358h։EHeapEuԋEE}|u	DM$hHEPh"EP_uEPH6EPh?ENPMV }3QQu$Qp(֋}p֋u$3EEE !";t@v (EtGMغEM3@;tt
M̺EpMغE؉]E̅EMЉE3@;ttEMtM̅EO؉]K}غE0؉]u
MjZ;UϺEtShEEtPh}Wj@@EȅtSPShPGQMԋS1}t<WShEPWhPQuMԋE]}Eă;Mʃ4Pj@E@E0p&;FF;fFEЋEĉV;f zU܃ȃENMFXÉF$EF(EF,04tVXMăPqM܋EP~XMPqM܋EPXXEMuuȃP4XEhHPh#EPx~EPQQM$xj]ԍEPh?E3PNVxD}uujhķp(֋E̅Ui]tp֋]uuuSEt8Heapu5@P֋Ǎe_^[M3R](UPt3ʼnEESVUԋM3ۉMĉ]܉]I]]ȉ]M@W}u؉}UЉM̉E94r;
<;r+?tChVĉEEtStckEu358h։EHeapEu؊M 3]EH|8lu3HD8hhEPh#EPučEP6EPh?ENPMVx}3QQSQp(֋ThEPh8#EP,EPQQ}؍EPh?E7PNV3;tu
3EFEԺu
u!TF;utuTFDFM3} UԃMԍxẼ`}E؃D}ċPj@E@ȉMȅu
,U YAAAaAYa(]ЃA eÉA$Xa4}̃ÉA,Nj}ĉA0q@EÉA8qDA<3M7HtdVSMЃPuPSM̃PuPSEuPEPiS}uujp(hķ֋]tp֋]܅tpubEt8Heapu5@P֋Ǎe_^[M3}N]UXt3ʼnEESMMVuEEԋAE؋EFU3҉UċډUȉỦUUЍVW},E94r6
<;r*F;tRĉEEЅtStckEu,V58։EЅ/HeapEEME}|uDhEPhL#EPEPEP}EPh?E̋7PNV}3QQuQp(֋thEPhh#EPLEPQQM4}EPh?E̋7PNV
uM3jZ;ut3EGU;u3u*DTG3uuDTG@jPj@E@؅u
3!CC<C@CF8E$t	E@3fCDE(
C8E C4C C$Es0ljKKKK,MEESSSS(UԃuȃʁVj@u@u1&UMe
FF
FEԃfFMԋEff ȋENMԃf,ȉN$MF(MԋEMf4f8F0MԋEMf@fDF<MԋEMfLfPFHEMԃMfXf\FTMԋEMfdfhF`MԋEMfpftFlMԋEMf|FxMԋEMMԋEMNj}Mԋ:MEMԋ:MEMԋ:MEMԋ:ME4:t:VLEԃ}PEu؋PLMMԃPEu΋PLMԍEMuPEPrL}ȃjPSjp(h֋xk}uujh̷p(֋xD}0u>hEP}ȍEjPEE܋7jPN(V(EątpM֋EȅtpMSuEЅt8Heapu5@P֋Ǎe_^[M3G],US] 3VWQuUSQ53҉EQBEEEUUEPE؋M!PEPE P0UEjSh QQPEPuuQMMUEMPh!EPh UEjSh!QQPEPuuQ>MOMGUEMPh	!EPh	 hPUEjSh"QQPEPuuQ#MMUEMPh8!EPh; UEjShEQQPEPuuQvMMUEMPh@!EPh= UEjShGQQPEPuuQ[M#M}UEMPh!EPh 2UEjSh'QQPEPuuQMMUEMPh
!EPh
 UEjSh(QQPEPuuQ@MQMI}
UEMPh!EPh `HjSh%QQEPEPuuQjZMMUEMPh
!EPh
 jSh$QQEPEPuuQjZnMMwUEMPh!EPh jSh&QQEPEPuuQjZE}u\UEMPh!EPh Mx9UEjSh#QQPEPuuQxMMMM_^[]U$t3ʼnEESVWىUM 3҉MM$QuMQQPQˉUUUU4}UEMPh!EPh qjhQQEPEPuMMUEMPh!EPh jhQQEPEPuYMMUEMPh!EPh "jh.UEMPh!EPh jhQQEPEPuMMUEMPh!EPh 'j39EjPjhhQQEPEPuVMMUEMPh!EPh Ejj
P3jPhQQEPEPueMMUEMPh7!EPh: 5jj	hjhhQQEPEPuxqMMUEMPh?!EPh< x>jjjjhhQQEPEPuxMSMKMCM;M_^3[>] UQSVWىUShxWj@@t*SVWVlVlHPVxM_^[]ËUt3ʼnEeSVW0كEVj@]@unMgGGG1qPgBVp(Wjhķ֋؅x$]MQh?hPp֋Wx}tp֋M_^3[=]ËUt3ʼnEVTW3Lv<`dФP9Ht
r8hhhPhP`PT`L<4Ph?LDž4P8Dž@@DHy18@tuxroV`#Qppj
YRPPWL@t2x08@txrp#pjYwPt<xt%Ht
QPxP8PPd0Wp9LtLTuM_3^;]ËUt3ʼnEES3ۉEVuWhHSP (@Dt?P&y58@x|Wppj#YBcHPRyy'8@4x*Wppj
묍,Fy*8@xWppjqhx#@P(PS,7Ph?@NPVy*8@xWppj9Hu7&y*8@Dx:Wppj(Hy*8@xWppjx9^u18@txrp#pjYu~%P y"8@txryWppjW0jSWT$
8Atyrq#qjY$ tSX(tp֋tpjL[6vuM_^3[7]8@txr#ppjYVPh!Ph 	ȅx>8@t$xrv#vppjYH8Dž E8@txrQv#vppLVWX8$ t
^<8@txrp#pjY=$ ^(HPWv6SvpPjy58@xWp#pjY$HVPSvQv(v6p8@xWppjU8S3MVW}3ۉ]]]3}ȫEPy6
8AyVq#qjYu܍EPEPEPEP3Gy<
8AtyrPq#qjYM}E]EEEEEEEEEPGuy58@xVp#pjY%MU
]uy58@xVp#pjYK#tstuEEȋt	3u33uEuEE̋t{#ljEЋtStUEEԃtstuEE؋}ujYutSo]tp֋u}tM_^[]U$t3ʼnES3VWE}܉EEEP{y68xxVppj#Y8xt xruuuuuppHt;MQP8x1x'Vppj!|TtIMQ\XP<yk8xxVppj")<MQPy&8xxVppj#EPjuy8xtbxr\Vppj$EPjuy8xt/xr)Vppj%~QuE܋uP
uu}t	u8xtxrVp#pj&YM_^3[;1]ËUQQt3ʼnES]3WCEPRujQxVuFto3ҍNff;u+΍F=wLMPj@@Cu03fp6AffCPEPs4
^M_3[v0]UQQS]3҉EVuMSWtVUSPx tUMVuyj_^[]UQQSVډMWh]#=t)]wvSYYt?3u]u`j0j@@t3uAMV"x0
F9tjY)H33ht!_^[]ËUQSVډMW3h;;tMp9Nt;uuUj0j@@tu4EFF
9tjY)H3htf_^[]ËUQESVW hU=t'wvSYYt?3uj0j@@t3uvV莺xfMV}xUMVlxDMV[x3
F9tjY)HE30htW_^[]h33ËUQVHut;V覼^]3AAAAAAA$A@A(@ËVWWF;t'39Nt
9Nt
9Nt
9Bu>H9u7WJvvvvv_^jY)UMVW3tэrff;u+Uj
ZuWjEPjEPRQjh$j+uu0_^]USVu3Wt֍zff;u+Uj
ZuSjEPRVQh$j+uu(_^[]U(t3ʼnESVu3WM3uEP6EPEEPN$EPEPMV$xh}tZ}8@txruppjY}Mu$	A
8B4
8At%yr$qqjY
83Cs|u
8At&yr ukqqjYU
8
8
8AtLyr#k$VqqjYs
8AtyrVq$qjY1M_^3[)]U(t3ʼnEeSVu3WM3uEP6EPEEPN$EPEPMV$xr}td}
8At#yruuqq
8U;r|;wtM܉ 	A
8B4
8At%yr$qqjY
83C<uAtYyrSk$qqjY}/
8At&yr ukqqjYO
8
8
8AtLyr#k$Vqqj Ym
8AtyrVq$qj!Y+M_^3[']Ut3ʼnESVW}EhH$3ۉMP]7EPh?ENPVy+
8Atbyr\Pq$qj"YF8@txrp$pj#YVuu؅xu;؋}tp֋M_^3[&]SVWڋjj@#@t
fN3uWx33tV_^[ËUEV;u=uAtQ3Ҹ$t1tARVPh$jjeh ^]U,t3ʼnESVWE3ى7wwt2MEE$PE%E^E$%uQtMd0SVpGu2u؍EE$PME%EbEH%_M_^3[@%]ËUt3ʼnESVMEWtU3~>~uM@EE&@tX֋xIESpv)5MEE%EPME$E%EM_^3[~$]ËU$t3ʼnESVWE3!GmMu/EE$PE(&EeEP&huxEPk0ykt&SEPMJ0y/m&EEMMPuE$E(&fEffEfGCG3M_^3[#]ËUt3ʼnEV3W2rrt[SYff;u+[v2+uEE$PME&EE'h
ɉz
JM_3^#]̋U,t3ʼnEESىUEVW}E]ԅ]3ۉM܃eu__tu|'tuw(]t E@E;rE˅t+EE;;EAEE;r9];wvWXU؉]t)MEM@EM;Er8]G3fH{((MEEPE$E'UuWP(u#׋^RMq%uEMEE$PE'UpދM_^3[!]Ut3ʼnESVEWu%Mau(%u(ϋuP&MF>+Nj;s3E3҉EMEE$PE(UEFSrHP$;3M_^3[% ]ËUVu;wVEEAQME
x3^]UQVu;ueEPQQRa	x}u3^]Ut3ʼnEMEuMEE'2t$%u7'MEUE)EE$PMwEQhx3M3]t#uQuf;wyufu2ÅtuAu9wyu9u2
ËU1MF]UwEV+f0^ҁ]U8t3ʼnEMESډEVuWM;rbEEPQыxN}tFMЍ}إ3jZu̥}䫫+EEC3ɉEAE؉UPUEx3M_^3[]Udt3ʼnEMSVu3ۉMEWtujW)^Mu	jX)E"EE$E)EE
E*]}EURQ78]uEGM}Er3]܍}]૫EPyH*Ejq^9]tud0SpEL)EEl)uԉ}PMUMby#E9]tQud0Sp]܉]69]tud0SpUEVPkEMPyE9]tJM@9]tM9u2M]EL)EEl)EčET*>E]M_^3[]Ut3ʼnEESVu3ۉEEWtu)u)MEU[XVuPTPxJuFlsEu5MvEET*EEL)PMEl*UE؋M_^3[]Ut3ʼnES‰V3ۉDžWtu )u)ڍ0ʋf|H\u	j_jXjZjP*\XjYhtjXLuH}}j^uu̍EE8Dž8Dž<Dž@*DžDTDžX*`Džd*lDžp+xDž|0+EE
EH+]EE E"ET+EUEx+]EMEД+E,E.E+E$E&E+QQxd8uGrƒuW9	DžL)PDž*ދM_^3[^]ËkjF8++FD3XA W,0PjZDž4_VLU0t3ʼnESVW}EuMԸ8,uu5MEE,PE$,EET,u39wt)9_syd0SwVpuUl,d0SVpu4,uԉEMԍEE,PE$,UG_9vM_^3[]tyu9u
;Aw2Åtytqd0jpËU$t3ʼnEEEES]VW u-u<-y3	sϋMV;ыEteӋEt>M+ME M;r3;uM;u;tM܉ehx̸u()4x̸}() ;t;t3@뿸,MEMEE,PE,UqME3_^[]UQQVW;sX+rQ
f;r=f;w)r22$f;w
$1f;va_^]ÁsarzwAÁsQËËUTt3ʼnESVWj3Xu;čMjQPEhEԉEEP]EPtu9uvuC;r;rd#t;r;rH;sE#u+;r-jhWVdtMQhWVlt3@3e_^[M3}]d0Vpd
0о yutB`Jd+;s3ɉ
4u
<dx<u5<ƃ^s
<82@2UQt3ʼnEeM3]jhX3FeE3Ɂ8Ëe3EËUQSVW3ۉ}?uMuj8XPj@ffF@ȉNtcwyEA8pyp(y(8?u0jpX;r)uPj@ffF@FtwWP73C_^[]UES]VWM3QQh\-EMPMMMMHy3FjEPjEPhl-u@xuj@@tjEPjEPh/u@xuj@@t3PPPuEWPu4xjVuu0iju3uDOMEt;t
3y#E }t	u<}tjuPtWF_^[]U8t3ʼnEES]VWEЍ}EM؋MU3҉RREEhPM̥UUUԉUܥH3y}VEPjhphu@y}=puVj hhu,xVjuЍEVVPu8xjEPVVjuVuVuuTxuj@@}t"jWuPjEPjVuuTy3F;Ev3Ft;t
3#'}t	uX}tjuPM_^3[]U8t3ʼnEES]VWEЍ}EM؋MU3҉RREEhPM̥UUUԉUܥH3y}VEPjhphu@y}=puVj hhu,xVjuЍEVVPu8xjEPVVjuVuVuuLxuj@@}t"jWuPjEPjVuuLy3F;Ev3Ft;t
3~#'}t	uX}tjuPM_^3[
]Uht3ʼnE3MSVW}uډu3}̫3}3}ܫ3EEEEEEEt}쥥jEPjEPjp^Vj@f3fs@C3CEp}u@ M@0E@u܍}xu쥍EPEPjZy3uEPEPQVQEPjZMxՃ} uϋUEPEPQVQMEP؅yu3C8}0uEu܍x uuPluEu@VPY}tu覛}tu蘛tV莛M_^3[]UR3@t:uQu
9u	Qu]U t3ʼnEEeSVEWM@3CWjPu0yjY)Wj/h/u0yjY)WjFPu0yjY)Wj)h/u0yjY)MXEPMwsVj ZMuX!}Ej_@uMjjVu0yjY)jj)h/u0yjY)jjVu0yjY)jj/h/u0yjY)M3ҍEʋ;D(u+AEuE@u}j8XCuE@ujXM_^3[	]UPt3ʼnESVW}ڋщ}3ɉ]jMȉMЍsMĉM̉MY}EԥE؍EPEХPQE쥥s}ܥzSWQPK iuЉuyu3CSEPEPQWQEPK@:tu3CsU̍EPEȋPY}ȋ؋u؉}uԅy3C@uVWV
uEujpYx@E@uuԋ}tWzEtPmtVcM_^3[]U SVuWM~tFtBjY3}MEPu&9Ftvf3jEP3@_^[]SVWZΈBGF;u;r_^[ËUt3ʼnEV‹W}UWEPVxGPEPFPM_3^]US3VEWfE8tt$9uXhjPPEPu$t	}t	u_^[]M3
tjuEPjjh5tuPSuu(	;u넋EjEEPujuu(=	U	K3DUt3ʼnEVW֍JBuWj+ыjyv=toMt+U;s!Au;sE+PjQ
WEPx+GPEP}3MjZfAuƋM_3^]ËUt3ʼnESVWWj3fNS=tQ0SSSSSMQP4yjY)SPvu0yjY)SjEPuDyjY)u<]u쥍EjY@u3M_^3[*]h` Yu@Ã 3ËU}SVWdH3ۣ$d]PʉU33G;thU3u}=(t
jY\ Eth5u;r:MtU 
;uE9Mt͋‰MEPt3Y G$(9]33G9}d3ۉ]$PU;thU3u}9(j[t	j5hh=(AYYt3XhhY(}Yu3=,t&h,Ytu5,Su_^[]̋U}u] Ucsm9Eu
uP2YY]3]j,hxE3uEwp}u=uu9Et	=0tNE}u
uuu׉EMEQPIYYËe3uu}EuuuEMEQPYYËe3uu}EuuuEMEQPYYËe3uu}}EVVu術MEQP}YYËe3uEVVu]MEQPNYYËe3u=0t4EVVuMEQPYYËe3uEt	EuuuEMEQPYYËe3uu=0tG=t>Euuu׉EMEQPyYYËe3uuEE}w
pËUVu3;usWu>t
׃;ur_^];
tu0%lUj u$h	P|]ËU$
|5x=tff
fpflf%hf-dEEEس	jXkǀjX
tjX
xjXk
tLjX
xLh]%%x̋UE3SVWH<AYt}p;r	H;r
B(;r3_^[]̋UjhhdPSVWt1E3PEdeEhztTE-PhPt:@$ЃEMd
Y_^[]ËE3Ɂ8ËeE3Md
Y_^[]̋UMMZf9uA<8PEuf9Hu]3]ËUeetVWN@;tudEPE3EEx1E1E3EM3EEPE3E3E;t5tuO@ȉ
t_x^]%dhd5D$l$l$+SVWt1E3PeuEEEEdËMd
Y__^[]Q̋Uuuuuhht]%hQL$+#ȋ%;r
Y$-QL$+ȃYQL$+ȃY%%|%p%M`ߠ"6h|ա/l+>T4BH000000p`@`0P@Ql̩2U{Ϊ"7Jjګ	

offlinesam.dllSamOfflineAddMemberToAliasSamOfflineCloseHandleSamOfflineConnectSamOfflineConnectExternalSamOfflineConnectForInstallerSamOfflineCreateAliasInDomainSamOfflineCreateUserInDomainSamOfflineDeleteAliasSamOfflineDeleteUserSamOfflineEnumerateAliasesInDomainSamOfflineEnumerateDomainsInSamServerSamOfflineEnumerateUsersInDomain2SamOfflineFreeMemorySamOfflineGetMembersInAliasSamOfflineLookupDomainInSamServerSamOfflineLookupNamesInDomainSamOfflineOpenAliasSamOfflineOpenDomainSamOfflineOpenUserSamOfflineQueryInformationAliasSamOfflineQueryInformationUserSamOfflineRemoveMemberFromAliasSamOfflineRidToSidSamOfflineSetInformationAliasSamOfflineSetInformationUserLKMK MKL`K`LPJJK8&(TV` "t*, <> 8: 02@ *,t TV  " (* (*H t  46 ,.<>,$&l .0>@ N@D @ (0@HP@X#"/\[]:|<>+=;?,*	

66$<Xf|nRfT.fL*vDr:$$8tP`@6,J&>HVzhL0rbB.v\@,vX> |bJ*zdbzЦ0`h
DV,t&J(@R0pxD
t`4^ 8L$$$TNhp4d66$<Xf|nRfT.fL*vDr:$$8tP`@6,J&>HVzhL0rbB.v\@,vX> |bJ*zdbz_purecall_vsnwprintf
_wcsicmpo_XcptFilter_amsg_exitfreemalloc_inittermmsvcrt.dllj_except_handler4_commonNtOpenKeyIRtlInitUnicodeStringNtClose&RtlCopySidNtCreateKey[RtlInitializeRXactNtLoadKeyRtlDosPathNameToRelativeNtPathName_U_WithStatusaNtFlushKey}NtUnloadKey2RtlFreeHeapRtlEqualSidNtQuerySystemTimeRtlValidSidRtlSubAuthoritySidRtlConvertSidToUnicodeStringRtlFreeUnicodeStringRtlSubAuthorityCountSidRtlLengthSidvRtlSetSaclSecurityDescriptornRtlSetOwnerSecurityDescriptor_RtlInitializeSidRtlMapGenericMask`RtlSetDaclSecurityDescriptorRtlGetAceRtlAllocateAndInitializeSidRtlAddAccessAllowedAceRtlAbsoluteToSelfRelativeSDRtlAddAuditAccessAce,RtlCreateAclfRtlSetGroupSecurityDescriptor?RtlCreateSecurityDescriptorRtlGetDaclSecurityDescriptorRtlCompareUnicodeStringNtOpenProcessTokenPNtDuplicateTokenNtQuerySystemInformationJNtSetInformationThreadNtQueryInformationTokenNtOpenThreadTokenNtQueryKeyENtDeleteKeyRtlpNtEnumerateSubKeyRtlGetSaclSecurityDescriptorRtlGetOwnerSecurityDescriptorWNtSetSecurityObjectHNtDeleteValueKeyRtlGetGroupSecurityDescriptorcNtSetValueKeyNtQueryValueKeyNtAdjustPrivilegesTokenRtlAppendUnicodeStringToString2RtlIdentifierAuthoritySid)RtlCopyUnicodeStringRtlLengthRequiredSidRtlUpcaseUnicodeStringToOemStringhRtlIntegerToUnicodeStringRtlAppendUnicodeToStringRtlFindMessage#DbgPrintExRtlRaiseStatusRtlFormatCurrentUserKeyPathRtlAllocateHeap$RtlReAllocateHeapRtlUpcaseUnicodeChar7RtlImageNtHeaderntdll.dllUuidToStringW
RpcStringFreeWUuidCreateRPCRT4.dllBCryptEncryptBCryptDestroyKey!BCryptGetPropertyBCryptDecrypt'BCryptOpenAlgorithmProviderBCryptFinishHashBCryptCloseAlgorithmProvider
BCryptDestroyHash#BCryptHashData5BCryptSetPropertyBCryptCreateHashBCryptGenerateSymmetricKeybcrypt.dllLsaOfflineOpenPolicy
LsaOfflineOpenPolicyForInstallerLsaOfflineOpenPolicyExternalLsaOfflineCloseLsaOfflineSyskeyRequestLsaOfflineFreeMemoryLsaOfflineQueryInformationPolicyofflinelsa.dllSystemFunction036CRYPTBASE.dllLocalAlloc
LocalFreeTraceMessage-GetLengthSid"GetFileAttributesWFIsValidSidCompareStringEx:GetTokenInformationInitializeSRWLock
GetCurrentProcess#DuplicateTokenExOpenProcessToken
OpenProcessGetLastErrorReleaseSRWLockExclusiveAcquireSRWLockExclusiveCloseHandle4WTSGetActiveConsoleSessionIdConvertStringSidToSidWLookupPrivilegeValueWUnregisterTraceGuidsRegisterTraceGuidsWGetTraceEnableLevelGetTraceEnableFlagsGetTraceLoggerHandleDisableThreadLibraryCallsFreeLibraryLoadLibraryExW	SleepUnhandledExceptionFilterSetUnhandledExceptionFilter*TerminateProcessQueryPerformanceCounterGetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCountVirtualProtectVirtualAllocGetSystemInfo&SetThreadStackGuarantee
VirtualQueryCryptReleaseContextCryptGetHashParamCryptDestroyHashCryptHashDataCryptCreateHashCryptAcquireContextAapi-ms-win-core-heap-obsolete-l1-1-0.dllapi-ms-win-eventing-classicprovider-l1-1-0.dllapi-ms-win-security-base-l1-1-0.dllapi-ms-win-core-file-l1-1-0.dllapi-ms-win-core-string-l1-1-0.dllapi-ms-win-core-synch-l1-1-0.dllapi-ms-win-core-processthreads-l1-1-0.dllapi-ms-win-core-processthreads-l1-1-1.dllapi-ms-win-core-errorhandling-l1-1-0.dllapi-ms-win-core-handle-l1-1-0.dllapi-ms-win-core-kernel32-legacy-l1-1-0.dllapi-ms-win-security-sddl-l1-1-0.dllapi-ms-win-security-lsalookup-l2-1-0.dllapi-ms-win-core-libraryloader-l1-1-0.dllapi-ms-win-core-synch-l1-2-0.dllapi-ms-win-core-profile-l1-1-0.dllapi-ms-win-core-sysinfo-l1-1-0.dllapi-ms-win-core-memory-l1-1-0.dllapi-ms-win-security-cryptoapi-l1-1-0.dllSystemFunction001SystemFunction003memcmp	memcpymemmove
memset(@Xp			 Υ|
WEVT_TEMPLATE4VS_VERSION_INFO
pcE
pcE?StringFileInfo040904B0LCompanyNameMicrosoft Corporation8FileDescriptionWindowsn'FileVersion10.0.17763.2928 (WinBuild.160101.0800)>InternalNameofflinesam.dll.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameofflinesam.dllj%ProductNameMicrosoft Windows Operating SystemDProductVersion10.0.17763.2928DVarFileInfo$Translation	 ' $* + $- = !"!%!%!$!'!-!!/!@!(00700:00L;@@O@@Y@@aA	AnAABBB)B0B9B@@BIBTPBSBVB[B^B_BPP$Administrator

Guest

$Domain Admins

$Domain Users

None

(Administrators

,Server Operators

 Power Users

Users

Guests

,Account Operators

(Print Operators

,Backup Operators

 Replicator

$Domain Guests

8$AccountNameConflict%1

krbtgt

,Domain Computers

0Domain Controllers

$Schema Admins

(Cert Publishers

,Enterprise Admins

0RAS and IAS Servers

@Group Policy Creator Owners

PPre-Windows 2000 Compatible Access

Everyone

4Remote Desktop Users

(Administrators

(Anonymous Logon

HNetwork Configuration Operators

HIncoming Forest Trust Builders

<Performance Monitor Users

4Performance Log Users

PWindows Authorization Access Group

(Network Service

DEnterprise Domain Controllers

HTerminal Server License Servers

0Trusted Installers

4Distributed COM Users

IIS_IUSRS

8Cryptographic Operators

$INTERNET USER

XAllowed RODC Password Replication Group

XDenied RODC Password Replication Group

DRead-only Domain Controllers

XEnterprise Read-only Domain Controllers

,Event Log Readers

HCertificate Service DCOM Access

<RDS Remote Access Servers

4RDS Endpoint Servers

8RDS Management Servers

8Hyper-V Administrators

DCloneable Domain Controllers

PAccess Control Assistance Operators

8Remote Management Users

(DefaultAccount

DSystem Managed Accounts Group

0WDAGUtilityAccount

$Device Owners

xBuilt-in account for administering the computer/domain

|Built-in account for guest access to the computer/domain

XDesignated administrators of the domain

,All domain users

(Ordinary users

Administrators have complete and unrestricted access to the computer/domain

TMembers can administer domain servers

Power Users are included for backwards compatibility and possess limited administrative powers

Users are prevented from making accidental or intentional system-wide changes and can run most applications

Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted

tMembers can administer domain user and group accounts

Members can administer printers installed on domain controllers

Backup Operators can override security restrictions for the sole purpose of backing up or restoring files

TSupports file replication in a domain

,All domain guests

XKey Distribution Center Service Account

lAll workstations and servers joined to the domain

TAll domain controllers in the domain

XDesignated administrators of the schema

Members of this group are permitted to publish certificates to the directory

`Designated administrators of the enterprise

Servers in this group can access remote access properties of users

Members in this group can modify group policy for the domain

A backward compatibility group which allows read access on all users and groups in the domain

Members in this group are granted the right to logon remotely

Administrators have complete and unrestricted access to the computer

Members in this group can have some administrative privileges to manage configuration of networking features

Members of this group can create incoming, one-way trusts to this forest

Members of this group can access performance counter data locally and remotely

\Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer

Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects

`Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage

Members in this group are granted the right to install software

Members are allowed to launch, activate and use Distributed COM objects on this machine.

tBuilt-in group used by Internet Information Services.

Members are authorized to perform cryptographic operations.

Members in this group can have their passwords replicated to all read-only domain controllers in the domain

Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain

Members of this group are Read-Only Domain Controllers in the domain

Members of this group can read event logs from local machine

Members of this group are Read-Only Domain Controllers in the enterprise

Members of this group are allowed to connect to Certification Authorities in the enterprise

Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.

tServers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.

DServers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.

Members of this group have complete and unrestricted access to all features of Hyper-V.

Members of this group that are domain controllers may be cloned.

Members of this group can remotely query authorization attributes and permissions for resources on this computer.

Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.

(Protected Users

`Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 for more information.

TA user account managed by the system.

lMembers of this group are managed by the system.

HStorage Replica Administrators

Members of this group have complete and unrestricted access to all features of Storage Replica.

 Key Admins

Members of this group can perform administrative actions on key objects within the domain.

4Enterprise Key Admins

Members of this group can perform administrative actions on key objects within the forest.

A user account managed and used by the system for Windows Defender Application Guard scenarios.

xMembers of this group can change system-wide settings.

SAM failed to write changes to the database. This is most likely due to a memory or disk-space shortage. The SAM database will be restored to an earlier state. Recent changes will be lost. Check the disk-space available and maximum pagefile size setting.

SAM failed to restore the database to an earlier state. SAM has shutdown. You must reboot the machine to re-enable SAM.

SAM failed to start the TCP/IP or SPX/IPX listening thread

There are two or more objects that have the same SID attribute in the SAM database. The Distinguished Name of the account is %1. All duplicate accounts have been deleted. Check the event log for additional duplicates.

xThe SAM database was unable to lockout the account of %1 due to a resource error, such as a hard disk write failure (the specific error code is in the error data) . Accounts are locked after a certain number of bad passwords are provided so please consider resetting the password of the account mentioned above.

The SAM database attempted to delete the file %1 as it contains account information that is no longer used.  The error is in the record data. Please have an administrator delete this file.

The SAM database attempted to clear the directory %1 in order to remove files that were once used by the Directory Service. The error is in record data. Please have an admin delete these files.

x%1 is now the primary domain controller for the domain.

The account %1 cannot be converted to be a domain controller account as its object class attribute in the directory is not computer or is not derived from computer. If this is caused by an attempt to install a pre Windows 2000 domain controller in a Windows 2000 domain or later, then you should pre-create the account for the domain controller with the correct object class.

The attempt to check whether group caching has been enabled in the Security Accounts Manager has failed, most likely due to lack of resources. This task has been rescheduled to run in one minute.

The group caching option in the Security Accounts Manager has now been properly updated.  Group caching is enabled.

The group caching option in the Security Accounts Manager has now been properly updated. Group caching is disabled.

The %1 package failed to update additional credentials for user %2.  The error code is in the data of the event log message.

4There are two or more well known objects that have the same SID attribute in the SAM database. The Distinguished Name of the duplicate account is %1. The newest account will be kept, all older duplicate accounts have been deleted. Check the event log for additional duplicates.

lThere are two or more objects that have the same account name attribute in the SAM database. The system has automatically renamed object %1 to a system assigned account name %2.

An error occurred while creating new default accounts for this domain.  This maybe due to a transient error condition. The task will retry periodically until success and will log this message again in a week if the problem persists.

The account %1 could not be upgraded since there is an account with an equivalent name.

An error occurred upgrading user %1.  This account will have to be added manually upon reboot.

An error occurred trying to read a user object from the old database.

An error occurred upgrading alias %1. This account will have to be added manually upon reboot.

An error occurred trying to read an alias object from the old database.

An error occurred upgrading group %1. This account will have to be added manually upon reboot.

An error occurred trying to read a group object from the old database.

An error occurred trying to add account %1 to alias %2.  This account will have to be added manually upon reboot.

The account with the sid %1 could not be added to group %2.

An error occurred trying to add account %1 to group %2.  This account will have to be added manually upon reboot.

The account with the rid %1 could not be added to group %2.

<A fatal error occurred trying to transfer the SAM account database into the directory service. A possible reason is the SAM account database is corrupt.

The account krbtgt was renamed to %1 to allow the Kerberos security package to install.

An error occurred trying to upgrade a SAM user's User_Parameters attribute. The following Notification Package DLL might be the possible offender: %1. Check the record data of this event for the NT error code.

@An error occured trying to set User Parameters attribute for this user This operation is failed. Check the record data of this event for the NT error code.

An error occured trying to upgrade the following SAM User Object - %1. We will try to continue upgrading this user. But it might contain inconsistent data. Check the record data of this event for the NT error code.

LAn error occurred when trying to add the account %1 to the group %2. The problem, "%3", occurred when trying to open the group. Please add the account manually.

hAn error occurred when trying to add the account %1 to the group %2. The problem, "%3", occurred when trying to add the account to the group.  Please add the account manually.

The error "%2" occurred when trying to create the well known account %1. Please contact PSS to recover.

4During the installation of the Directory Service, this server's machine account was deleted hence preventing this Domain Controller from starting up.

LThe Security Account Database detected that the well known account %1 does not exist. The account has been recreated.  Please reset the password for the account.

The Security Account Database detected that the well known group or local group %1 does not exist. The group has been recreated.

Domain operation mode has been changed to Native Mode. The change cannot be reversed.

Active Directory Domain Services failed to add a security principal to well known security principals container. Please have an administrator add this security principal if needed. Security principal name: %1

Active Directory Domain Services failed to add all of the new security principals to well known security principals container. Please have an administrator add these security principals if needed.

Active Directory Domain Services failed to rename a security principal in well known security principals container. Please have an administrator rename this security principal if needed. Security principal name: %1

Active Directory Domain Services failed to rename some of the security principals in well known security principals container. Please have an administrator rename these security principals if needed.

An error occurred when trying to remove the account %1 from the group %2. The problem, "%3", occurred when trying to remove the account from the group.  Please remove the member manually.

$The account-identifier allocator was unable to assign a new identifier. The identifier pool for this domain controller may have been depleted. If this problem persists, restart the domain controller and view the initialization status of the allocator in the event log.

An initial account-identifier pool has not yet been allocated to this domain controller. A possible reason for this is that the domain controller has been unable to contact the master domain controller, possibly due to connectivity or network problems. Account creation will fail on this domain controller until the pool is obtained.

<The maximum domain account identifier value has been reached. No further account-identifier pools can be allocated to domain controllers in this domain.

tThe maximum account identifier allocated to this domain controller has been assigned. The domain controller has failed to obtain a new identifier pool. A possible reason for this is that the domain controller has been unable to contact the master domain controller. Account creation on this controller will fail until a new pool has been allocated. There may be network or connectivity problems in the domain, or the master domain controller may be offline or missing from the domain. Verify that the master domain controller is running and connected to the domain.

The computed account identifier is invalid because it is out of the range of the current account-identifier pool belonging to this domain controller. The computed RID value is %1. Try invalidating the account identifier pool owned by this domain controller. This will make the domain controller acquire a fresh account identifier pool.

The domain controller is starting a request for a new account-identifier pool.

The request for a new account-identifier pool has completed successfully.

The account-identifier-manager object creation completed. If the record data for this event has the value zero, the manager object was created. Otherwise, the record data will contain the NT error code indicating the failure. The failure to create the object may be due to low system resources, insufficient memory, or disk space.

The request for a new account-identifier pool failed. The operation will be retried until the request succeeds. The error is %n " %1 "

The domain controller is booting to directory services restore mode.

8A pool size for account-identifiers (RIDs) that was configured by an Administrator is greater than the supported maximum. The maximum value of %1 will be used when the domain controller is the RID master. %nSee http://go.microsoft.com/fwlink/?LinkId=225963 for more information.

A pool of account-identifiers (RIDs) has been invalidated. This may occur in the following expected cases:%n1. A domain controller is restored from backup. %n2. A domain controller running on a virtual machine is restored from snapshot. %n3. An administrator has manually invalidated the pool. %nSee http://go.microsoft.com/fwlink/?LinkId=226247 for more information.

The global maximum for account-identifiers (RIDs) has been increased to %1. %n See http://go.microsoft.com/fwlink/?LinkId=233329 for more information including important operating system interoperability requirements.

Action required! An account-identifier (RID) pool was allocated to this domain controller. The pool value indicates this domain has consumed a considerable portion of the total available account-identifiers. %n%nA protection mechanism will be activated when the domain reaches the following threshold of total available account-identifiers remaining: %1.  The protection mechanism prevents the allocation of account-identifier (RID) pools needed to allow existing DCs to create additional users, computers and groups, or promote new DCs into the domain. The mechanism will remain active until the Administrator manually re-enables account-identifier allocation on the RID master domain controller. %n%nSee http://go.microsoft.com/fwlink/?LinkId=228610 for more information.

h	Action required! This domain has consumed a considerable portion of the total available account-identifiers (RIDs). A protection mechanism has been activated because the total available account-identifiers remaining is approximately: %1. %n%nThe protection mechanism prevents the allocation of account-identifier (RID) pools needed to allow existing DCs to create additional users, computers and groups, or promote new DCs into the domain.  The mechanism will remain active until the Administrator manually re-enables account-identifier (RID) allocation on the RID master domain controller. %n%nIt is extremely important that certain diagnostics be performed prior to re-enabling account creation to ensure this domain is not consuming account-identifiers at an abnormally high rate. Any issues identified should be resolved prior to re-enabling account creation. %n%nFailure to diagnose and fix any underlying issue causing an abnormally high rate of account-identifier consumption can lead to account-identifier (RID) pool exhaustion in the domain after which account creation will be permanently disabled in this domain. %n%nSee http://go.microsoft.com/fwlink/?LinkId=228610 for more information.

This event is a periodic update on the remaining total quantity of available account-identifiers (RIDs). The number of remaining account-identifiers is approximately: %1. %n%nAccount-identifiers are used as accounts are created, when they are exhausted no new accounts may be created in the domain. %n%nSee http://go.microsoft.com/fwlink/?LinkId=228745 for more information.

Security Enabled Local Group Changed to Security Enabled Universal Group.

Security Enabled Local Group Changed to Security Disabled Local Group.

Security Enabled Local Group Changed to Security Disabled Universal Group.

Security Enabled Global Group Changed to Security Enabled Universal Group.

Security Enabled Global Group Changed to Security Disabled Global Group.

Security Enabled Global Group Changed to Security Disabled Universal Group.

Security Enabled Universal Group Changed to Security Enabled Local Group.

Security Enabled Universal Group Changed to Security Enabled Global Group.

Security Enabled Universal Group Changed to Security Disabled Local Group.

Security Enabled Universal Group Changed to Security Disabled Global Group.

Security Enabled Universal Group Changed to Security Disabled Universal Group.

Security Disabled Local Group Changed to Security Enabled Local Group.

Security Disabled Local Group Changed to Security Enabled Universal Group.

Security Disabled Local Group Changed to Security Disabled Universal Group.

Security Disabled Global Group Changed to Security Enabled Global Group.

Security Disabled Global Group Changed to Security Enabled Universal Group.

Security Disabled Global Group Changed to Security Disabled Universal Group.

Security Disabled Universal Group Changed to Security Enabled Universal Group.

Security Disabled Universal Group Changed to Security Enabled Global Group.

Security Disabled Universal Group Changed to Security Enabled Universal Group.

Security Disabled Universal Group Changed to Security Disabled Local Group.

Security Disabled Universal Group Changed to Security Disabled Global Group.

TMember Account Name Is Not Available.

,Account Enabled.

,Account Disabled.

Certain Bit(s) in User Account Control Field Has Been Changed.

4Account Name Changed.

(Password Policy

$Logoff Policy

(Oem Information

8Replication Information

0Domain Server Role

0Domain Server State

(Lockout Policy

(Modified Count

 Domain Mode

Basic Application Group Changed to Ldap Query Application Group.

Ldap Query Application Group Changed to Basic Application Group.

pFailed to secure the machine account %1.  Have an administrator remove the builtin\account operators full control Access Control Entry from the security descriptor on this object.

Failed to secure the machine account %1.  This operation will be retried. Have an administrator verify the builtin\account operators full control Access Control Entry was removed from the security descriptor on this object.

<Secured the machine account %1.  The builtin\account operators full control Access Control Entry was removed from the security descriptor on this object.

The certificate that is used for authentication does not have an issuance policy descriptor corresponding to OID %1 in the Active Directory database. This certificate will not be associated with a corresponding security identifier (SID), and the user may be denied access to some resources if you have resources whose access is restricted based on this issuance policy. The error is %2.

The certificate issuance policy that is represented by OID %2 does not have a link to a security identifier (SID), or this link cannot be read. The link is represented by the attribute msDS-OIDToGroupLink on the msPKI-Enterprise-Oid object that represents the issuance policy. This certificate will not be associated with a corresponding SID, and the user may be denied access to some resources if you have resources whose access is restricted based on this issuance policy.

 Multiple certificate issuance policy descriptors were found in the Active Directory database. The attribute msPKI-Cert-Template-OID of these descriptors contains string %1.  This attribute should be able to uniquely identify an issuance policy descriptor; you should resolve this conflict. The issuance policies that are affected will not be associated with security identifiers (SIDs), and users who are authenticating using certificates that are issued by the corresponding policy may be denied access to some resources.

tThe certificate issuance policy descriptor %2 is linked through its attribute msDS-OIDToGroupLink to a group that is not a security group, has members, or is not universal. The error is %6.%nAn issuance policy should be linked to a security identifier (SID) of a group that is security enabled, does not have members, and is universal. Users who are authenticating using certificates that are issued according to this policy may be denied access to some resources. The distinguished name (also known as DN) of the group that does not meet these requirements is %3.

The requested modification for group %1 could not be performed. This is because this group is linked through msDS-OIDToGroupLinkBl to a certificate issuance policy descriptor. Such groups should be security enabled, they should not have any members, and they should be universal.%nThe requested operation was %4.%nThe error is %5.

dThe certificate issuance policy descriptor %1 cannot be linked to group %2. Issuance policies can be linked through the attribute msDS-OIDToGroupLink only to universal, security-enabled groups that have an empty membership. You should ensure that this group meets these requirements.%nThe error is %5.

The following invalid claims issued to user %1 have been dropped: %2.

Claims issued to user %1 could not be validated and have been dropped. Error: %2.

Claims issued to user %1 could not be validated and have been dropped. Error: %2.

The password notification DLL %1 failed to load with error %4. Please verify that the notification DLL path defined in the registry, %2%3, refers to a correct and absolute path (<drive>:\<path>\<filename>.<ext>) and not a relative or invalid path. If the DLL path is correct, please validate that any supporting files are located in the same directory, and that the system account has read access to both the DLL path and any supporting files.  Contact the provider of the notification DLL for additional support. Further details can be found on the web at http://go.microsoft.com/fwlink/?LinkId=245898.

tSAM was configured to not listen on the TCP protocol.

`Legacy password validation mode has been enabled on this machine. If an Exchange ActiveSync policy is configured it will not be enforced for password validation requests.

lRemote calls to the SAM database are being restricted using the default security descriptor: %1.%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

Remote calls to the SAM database are being restricted using the configured registry security descriptor: %1.%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

The registry security descriptor is malformed: %1.%nRemote calls to the SAM database are being restricted using the default security descriptor: %2.%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

XA remote call to the SAM database has been denied.%nClient SID: %1%nNetwork address: %2%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

Audit only mode is now enabled for remote calls to the SAM database. SAM will log an event for clients who would have been denied access in normal mode. %nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

4Audit only mode is now disabled for remote calls to the SAM database.%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

Audit only mode is currently enabled for remote calls to the SAM database.%nThe following client would have been normally denied access:%nClient SID: %1 from network address: %2. %nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

h%2 remote calls to the SAM database have been denied in the past %1 seconds throttling window.%nFor more information please see http://go.microsoft.com/fwlink/?LinkId=787651.

4An error occurred while configuring one or more well-known accounts for this domain.  This may be due to a transient error condition. The task will retry periodically until successful. For more information please see https://go.microsoft.com/fwlink/?linkid=832473.%nStatus: %1

The domain is configured with the following minimum password length-related settings.%n%nMinimumPasswordLength: %1%n%nMinimumPasswordLengthAudit: %2%n%nFor more information see https://go.microsoft.com/fwlink/?LinkId=2097191.%n

XThe following account has been configured with a password whose length is shorter than the current MinimumPasswordLengthAudit setting.%n%nAccountName: %1%n%nMinimumPasswordLength: %2%n%nMinimumPasswordLengthAudit: %3%n%nFor more information see https://go.microsoft.com/fwlink/?LinkId=2097191.%n

The domain is incorrectly configured with a MinimumPasswordLength setting that is greater than 14.%n%nNOTE: until this is corrected, the domain will enforce a smaller MinimumPasswordLength setting of 14.%n%nCurrently configured MinimumPasswordLength value: %1%n%nFor more information see https://go.microsoft.com/fwlink/?LinkId=2097191.%n

The security account manager is now logging verbose events for remote clients that call legacy password change or set RPC methods. This setting may cause large number of messages and should only be used for a short period time to diagnose problems.%n%nFor more information please see https://go.microsoft.com/fwlink/?linkid=2150956.%n

The security account manager is now logging periodic summary events for remote clients that call legacy password change or set RPC methods.%n%nFor more information please see https://go.microsoft.com/fwlink/?linkid=2150956.%n

The security account manager detected %1 legacy password change or set RPC method calls in the past %2 minutes.%n%nFor more information please see https://go.microsoft.com/fwlink/?linkid=2150956.%n

<The security account manager detected the use of a legacy password change or set RPC method from a network client.%nConsider upgrading the client operating system or application to use the latest and more secure version of this method.%n%nDetails:%n%nRPC Method: %1%nClient Network Address: %4%nClient SID: %3%nUsername: %2%n%nFor more information please see https://go.microsoft.com/fwlink/?linkid=2150956.%n

The security account manager has detected one or more duplicated names for a local account. This inconsistency was remediated by keeping one account name and deleting the remaining names.%n%nRID=%1(%2)%n%nRetained account name: %3%n%nDeleted account name(s): %4%n%nFor more information see https://go.microsoft.com/fwlink/?linkid=2134956.%n

The security account manager has detected one or more duplicated names for a local account. This inconsistency may cause application failures and\or system instability. No changes were made since the policy is in detect-only mode.%n%nDetails:%n%nRID=%1(%2)%n%nDuplicate account names: %3%n%nIf the policy had been set to repair mode, the following account name would have been retained and all others deleted:%n%nAccount name to retain: %4%n%nFor more information see https://go.microsoft.com/fwlink/?linkid=2134956.%n

The security account manager blocked a non-administrator from creating an Active Directory account in this domain with mismatched objectClass and userAccountControl account type flags.%n%nDetails:%n%nAccount name: %1%nAccount objectClass: %2%nuserAccountControl: %3%nCaller address: %4%nCaller SID: %5%n%nFor more information see https://go.microsoft.com/fwlink/?linkid=2173873.%n

The security account manager blocked a non-administrator from creating or renaming a computer account using an invalid sAMAccountName. sAMAccountName on computer accounts must end with a single trailing $ sign.%n%nAttempted sAMAccountName: %1%nRecommended sAMAccountName: %1$%n%nFor more information see https://go.microsoft.com/fwlink/?linkid=2173873.%n

Error

Warning

 Information

\Microsoft-Windows-Directory-Services-SAM

System

CRIM̥	O
'JIP^Oح8ꏽIUIKc WEVT
X̐XdpCHAN0SystemTTBL^TEMPp!^tTtsusJAxD	EventData;KNameSAMMSG_COMMIT_FAILED!Binary
__binLengthErrorCodeTEMP|U+S[\b!.rAzD	EventData=KNameSAMMSG_REFRESH_FAILED!Binary
__binLengthErrorCodeTEMP(2h_pv4m>:A|D	EventData?KNameSAMMSG_RPC_INIT_FAILED!Binary
__binLengthLogStatusTEMP<lFzgQdVUAD	EventData;KNameSAMMSG_DUPLICATE_SIDA[oDataCKNameAccountDistinguishedName
8AccountDistinguishedNameTEMP5!TAD	EventDataGKNameSAMMSG_LOCKOUT_NOT_UPDATEDA;oData#KNameUserName
!Binary
XpUserName__binLengthErrorCodeTEMPw'%vZL'AD	EventDataSKName SAMMSG_DATABASE_FILE_NOT_DELETEDA;oData#KNameFilePath
!Binary
FilePath__binLengthWinErrorTEMPD	ƔG/AGSVHqAD	EventDataQKNameSAMMSG_DATABASE_DIR_NOT_DELETEDAEoData-KName
DirectoryPath
!Binary
			 DirectoryPath__binLengthWinErrorTEMP
ƶk[dcmybAD	EventData?KNameSAMMSG_PROMOTED_TO_PDCACoData+KNameComputerName

 ComputerNameTEMP K%3

S%,ЕAD	EventDataOKNameSAMMSG_DC_NEEDS_TO_BE_COMPUTERACoData+KNameComputerName
 ComputerNameTEMP^SKZiآ"AD	EventDataOKNameSAMMSG_SITE_INFO_UPDATE_FAILED!Binary

__binLengthErrorCodeTEMP
;.i\ډAyD	EventData[KName$SAMMSG_SITE_INFO_UPDATE_SUCCEEDED_ONTEMP"5|Zٲ/A{D	EventData]KName%SAMMSG_SITE_INFO_UPDATE_SUCCEEDED_OFFTEMPM/ldWIkA(D	EventDataYKName#SAMMSG_CREDENTIAL_UPDATE_PKG_FAILEDAIoData1KNameSecurityPackage
A;oData#KNameUserName
!Binary
,Ph$SecurityPackageUserName__binLengthErrorCodeTEMP`:CGM^XJ6;AD	EventData_KName&SAMMSG_DUPLICATE_SID_WELLKNOWN_ACCOUNTA[oDataCKNameAccountDistinguishedName
8AccountDistinguishedNameTEMPpg[y6[x!
A?D	EventData[KName$SAMMSG_RENAME_DUPLICATE_ACCOUNT_NAMEA[oDataCKNameAccountDistinguishedName
A]oDataEKNameSystemAssignedAccountName
8AccountDistinguishedName8SystemAssignedAccountNameTEMP%(JU Y匈dA~D	EventDataAKNameSAMMSG_PDC_TASK_FAILURE!Binary
__binLengthErrorCodeTEMP.z\x	jTAD	EventDataCKNameSAMMSG_DUPLICATE_ACCOUNTAAoData)KNameAccountName
!Binary
PlAccountName__binLengthErrorCodeTEMP}lPDAD	EventDataCKNameSAMMSG_USER_NOT_UPGRADEDA;oData#KNameUserName
!Binary
UserName__binLengthErrorCodeTEMP tm\"iwOAD	EventDataSKName SAMMSG_UNKNOWN_USER_NOT_UPGRADED!Binary
(__binLengthErrorCodeTEMP<2`/OZwlDuGAD	EventDataEKNameSAMMSG_ALIAS_NOT_UPGRADEDA=oData%KName	GroupName
!Binary
xGroupName__binLengthErrorCodeTEMP$
h95^Q@Ū~AD	EventDataUKName!SAMMSG_UNKNOWN_ALIAS_NOT_UPGRADED!Binary
__binLengthErrorCodeTEMP7ҳ	^8N
AD	EventDataEKNameSAMMSG_GROUP_NOT_UPGRADEDA=oData%KName	GroupName
!Binary
 8TGroupName__binLengthErrorCodeTEMP$4NhS[5AD	EventDataUKName!SAMMSG_UNKNOWN_GROUP_NOT_UPGRADED!Binary
\x__binLengthErrorCodeTEMP0C]@oZ
q]R/A(D	EventDataEKNameSAMMSG_ERROR_ALIAS_MEMBERA[oDataCKNameAccountDistinguishedName
A=oData%KName	GroupName
!Binary
< t   8AccountDistinguishedNameGroupName__binLengthErrorCodeTEMPH0"IYurZV-A:D	EventDataUKName!SAMMSG_ERROR_ALIAS_MEMBER_UNKNOWNA?oData'KName
AccountSID
A[oDataCKNameAccountDistinguishedName
!Binary
""""AccountSID8AccountDistinguishedName__binLengthErrorCodeTEMP0d$V[L3\mF3WA(D	EventDataEKNameSAMMSG_ERROR_GROUP_MEMBERA[oDataCKNameAccountDistinguishedName
A=oData%KName	GroupName
!Binary
$$% %8AccountDistinguishedNameGroupName__binLengthErrorCodeTEMP&6+8ZnAD	EventDataUKName!SAMMSG_ERROR_GROUP_MEMBER_UNKNOWNA?oData'KName
AccountRID
A=oData%KName	GroupName
!Binary
&&'('AccountRIDGroupName__binLengthErrorCodeTEMP'.1GNUV"	AD	EventDataGKNameSAMMSG_FATAL_UPGRADE_ERROR!Binary
 (<(__binLengthErrorCodeTEMPd)f5QQX9AD	EventDataOKNameSAMMSG_ERROR_UPGRADE_USERPARMSAIoData1KNameSecurityPackage
!Binary
)))$SecurityPackage__binLengthErrorCodeTEMP*,U:h?eAD	EventDataGKNameSAMMSG_ERROR_SET_USERPARMS!Binary
**__binLengthErrorCodeTEMP,O:2YИpPҺAD	EventData[KName$SAMMSG_ACCEPTABLE_ERROR_UPGRADE_USERA;oData#KNameUserName
!Binary
X,p,,UserName__binLengthErrorCodeTEMPL.r^KNXR,VAԕnArD	EventData_KName&SAMMSG_MEMBERSHIP_SETUP_ERROR_NO_GROUPAAoData)KNameAccountName
A=oData%KName	GroupName
ACoData+KNameErrorMessage
!Binary
.../ /AccountNameGroupName ErrorMessage__binLengthErrorCodeTEMP0!807VHA`D	EventDataMKNameSAMMSG_MEMBERSHIP_SETUP_ERRORAAoData)KNameAccountName
A=oData%KName	GroupName
ACoData+KNameErrorMessage
!Binary
01L1d111AccountNameGroupName ErrorMessage__binLengthErrorCodeTEMP2EdžnUqoIUAD	EventDataAKNameSAMMSG_USER_SETUP_ERRORAAoData)KNameAccountName
ACoData+KNameErrorMessage
!Binary
L3h333AccountName ErrorMessage__binLengthErrorCodeTEMP|4e-SgFYAD	EventDataOKNameSAMMSG_MACHINE_ACCOUNT_MISSING!Binary
44__binLengthErrorCodeTEMP5OfQH[q	AD	EventDataYKName#SAMMSG_WELL_KNOWN_ACCOUNT_RECREATEDA;oData#KNameUserName
!Binary
 686T6UserName__binLengthErrorCodeTEMPx7w&\6we]AD	EventDataUKName!SAMMSG_WELL_KNOWN_GROUP_RECREATEDA=oData%KName	GroupName
!Binary
777GroupName__binLengthErrorCodeTEMP8Ѿlh\JiAiD	EventDataKKNameSAMMSG_CHANGE_TO_NATIVE_MODETEMP9a=Tm#AD	EventDataaKName'SAMMSG_FAILED_TO_ADD_SECURITY_PRINCIPALAAoData)KNameAccountName
!Binary
9:0:AccountName__binLengthErrorCodeTEMP8$;fxTNZ[?AD	EventDatakKName,SAMMSG_FAILED_TO_ADD_ALL_SECURITY_PRINCIPALS!Binary
L;h;__binLengthErrorCodeTEMP<H뫰TLivAD	EventDatagKName*SAMMSG_FAILED_TO_RENAME_SECURITY_PRINCIPALAAoData)KNameAccountName
!Binary
<<=AccountName__binLengthErrorCodeTEMP@>uQԠAP93htvAD	EventDataqKName/SAMMSG_FAILED_TO_RENAME_ALL_SECURITY_PRINCIPALS!Binary
8>T>__binLengthErrorCodeTEMP@HWZ6AnD	EventData]KName%SAMMSG_MEMBERSHIP_REMOVAL_SETUP_ERRORAAoData)KNameAccountName
A=oData%KName	GroupName
AAoData)KNameErrorString
!Binary
t@@@@@AccountNameGroupNameErrorString__binLengthBinaryDataTEMPAF0][F/
r'AD	EventDataEKNameSAMMSG_GET_NEXT_RID_ERROR!Binary
AA__binLengthErrorCodeTEMPB<-U\e0A~D	EventDataAKNameSAMMSG_NO_RIDS_ASSIGNED!Binary
BC__binLengthErrorCodeTEMPCT}?ShǐAzD	EventData=KNameSAMMSG_MAX_DOMAIN_RID!Binary
CD__binLengthErrorCodeTEMPD7%jq$^kdSRArD	EventData5KNameSAMMSG_MAX_DC_RID!Binary
DE__binLengthErrorCodeTEMP,FPP]&^uAD	EventData7KNameSAMMSG_INVALID_RIDAKoData3KNameComputedRIDValue
!Binary
hFFF(ComputedRIDValue__binLengthErrorCodeTEMPhG?ũY ^ԄAmD	EventDataOKNameSAMMSG_REQUESTING_NEW_RID_POOLTEMP$0H=)^hRg'AD	EventDataUKName!SAMMSG_RID_REQUEST_STATUS_SUCCESS!Binary
XHtH__binLengthErrorCodeTEMPHI @%AYl6!1ޫAD	EventDataIKNameSAMMSG_RID_MANAGER_CREATION!Binary
pII__binLengthErrorCodeTEMP(J[a^$`PCxf-6AD	EventDataUKName!SAMMSG_RID_REQUEST_STATUS_FAILUREACoData+KNameErrorMessage
J ErrorMessageTEMPhK TmPAgD	EventDataIKNameSAMMSG_BOOT_TO_RESTORE_MODETEMPHL9 Q`isJWAD	EventDataMKNameSAMMSG_INVALID_RID_BLOCK_SIZEA9oData!KNameMaximum
\LMaximumTEMPM<o6Q($(M{9AgD	EventDataIKNameSAMMSG_RID_POOL_INVALIDATEDTEMPM8YZ`Q4AD	EventData[KName$SAMMSG_INCREASING_GLOBAL_RID_MAXIMUMA;oData#KNameNewValue
NNewValueTEMP@,O0>d9WRrECAD	EventData]KName%SAMMSG_RID_ARTIFICIAL_CEILING_WARNINGAMoData5KNameCeilingTriggerRid
@O(CeilingTriggerRidTEMPDpPc_)/KAD	EventDataaKName'SAMMSG_RID_ARTIFICIAL_CEILING_ACTIVATEDAMoData5KNameCeilingTriggerRid
P(CeilingTriggerRidTEMP$QTwۢP̋AD	EventDataOKNameSAMMSG_RID_CONSUMPTION_WARNINGAEoData-KName
RemainingRids
Q RemainingRidsTEMPRV1)|^TvY7d\AD	EventData[KName$SAMMSG_FAILED_MACHINE_ACCOUNT_SECUREACoData+KNameComputerName
!Binary
$SDS`S ComputerName__binLengthErrorCodeTEMPT*ClA^UFAD	EventDatagKName*SAMMSG_FAILED_MACHINE_ACCOUNT_SECURE_RETRYACoData+KNameComputerName
!Binary
TTU ComputerName__binLengthErrorCodeTEMP4Vۉd/TONkAD	EventDataMKNameSAMMSG_MACHINE_ACCOUNT_SECUREACoData+KNameComputerName
!Binary
pVVV ComputerName__binLengthErrorCodeTEMPXWWJ/mAD	EventData;KNameSAMMSG_OID_NOT_FOUNDA1oDataKNameOID
A=oData%KName	ErrorCode
WXOIDErrorCodeTEMPY-V[q#IACD	EventData]KName%SAMMSG_NO_OID_TO_GROUP_LINK_ATTRIBUTEA1oDataKNameOID
AEoData-KName
OID Object DN
A=oData%KName	ErrorCode
YYYOID OID Object DNErrorCodeTEMPZZrGNWr:/AD	EventDataIKNameSAMMSG_DUPLICATE_OID_OBJECTA1oDataKNameOID
ZOIDTEMPDD].h{\y/ȹAD	EventDataSKName SAMMSG_INVALID_OID_TO_GROUP_LINKA1oDataKNameOID
AEoData-KName
OID Object DN
A;oData#KNameGroup DN
A?oData'KName
Group GUID
A=oData%KName	Group SID
A=oData%KName	ErrorCode
]]]^^4^OID OID Object DNGroup DNGroup GUIDGroup SIDErrorCodeTEMPT`z2@]}eAD	EventDataaKName'SAMMSG_MAPPED_GROUP_MODIFICATION_FAILEDA;oData#KNameGroup DN
A?oData'KName
Group GUID
A=oData%KName	Group SID
A=oData%KName	Operation
A=oData%KName	ErrorCode
```aaGroup DNGroup GUIDGroup SIDOperationErrorCodeTEMP0cdB]rzAD	EventDataQKNameSAMMSG_CANNOT_LINK_OID_TO_GROUPA;oData#KNameOID Name
A?oData'KName
Group Name
A?oData'KName
Group GUID
A=oData%KName	Group SID
A=oData%KName	ErrorCode
cccccOID NameGroup NameGroup GUIDGroup SIDErrorCodeTEMP<eԢZK1DvPAD	EventDataMKNameSAMMSG_INVALID_CLAIMS_DROPPEDA3oDataKNameUser
AEoData-KName
DroppedClaims
deteUser DroppedClaimsTEMP|fXJ\L_n 6eAD	EventDataSKName SAMMSG_CLAIMS_BLOB_DECODE_FAILEDA3oDataKNameUser
AAoData)KNameError code:
ffUserError code:TEMP|8h`A0WAD	EventDataSKName SAMMSG_CLAIMS_BLOB_ENCODE_FAILEDA3oDataKNameUser
AAoData)KNameError code:
`hphUserError code:TEMPjd%V<AD	EventDataqKName/SAMMSG_NOTIFICATION_PACKAGE_REGISTRATION_FAILEDASoData;KNameNotificationPackage:
AEoData-KName
Registry key:
AIoData1KNameRegistry value:
AAoData)KNameError code:
jk0kTk0NotificationPackage: Registry key:$Registry value:Error code:TEMPl!8&_#TIۨYAqD	EventDataSKName SAMMSG_NOTIFICATION_TCP_DISABLEDTEMPl'e1	XKygS@AD	EventDatasKName0SAMMSG_NOTIFICATION_PASSWORD_LEGACY_MODE_ENABLEDTEMPHmEȅs-Vؘ8AD	EventData]KName%SAMMSG_RESTRICT_REMOTE_SAM_DEFAULT_SDAOoData7KNameDefault SD String:
m,Default SD String:TEMPL4oDdY;"AD	EventData_KName&SAMMSG_RESTRICT_REMOTE_SAM_REGISTRY_SDAQoData9KNameRegistry SD String:
Ho,Registry SD String:TEMPp~>mG5V"`5I8KAAD	EventDatasKName0SAMMSG_RESTRICT_REMOTE_SAM_REGISTRY_SD_MALFORMEDASoData;KNameMalformed SD String:
AOoData7KNameDefault SD String:
qDq0Malformed SD String:,Default SD String:TEMPrX8eQ8̩UAD	EventDataQKNameSAMMSG_REMOTE_SAM_ACCESS_DENIEDAAoData)KNameClient SID:
AYoDataAKNameClient Network Address:
rsClient SID:4Client Network Address:TEMPsr"]ݫa:AyD	EventData[KName$SAMMSG_REMOTE_SAM_AUDIT_MODE_ENABLEDTEMPtf7
{Ynjj'A{D	EventData]KName%SAMMSG_REMOTE_SAM_AUDIT_MODE_DISABLEDTEMPvr^tUVcAED	EventDataKName6SAMMSG_REMOTE_SAM_AUDIT_MODE_ENABLED_ACCESS_NOT_DENIEDAAoData)KNameClient SID:
AYoDataAKNameClient Network Address:
8vTvClient SID:4Client Network Address:TEMPwcgu_iu.6RA?D	EventDatakKName,SAMMSG_REMOTE_SAM_SUPPRESSED_MESSAGE_COUNTERAKoData3KNameThrottle window:
A]oDataEKNameSuppressed Message Count:
$xLx(Throttle window:8Suppressed Message Count:TEMPty+׊؏\:A#1TAD	EventData_KName&SAMMSG_WELLKNOWN_ACCOUNT_UPDATE_FAILEDA7oDataKNameStatus
yStatusTEMP{b_9[X.tA9D	EventDataYKName#SAMMSG_MINPWDLEN_SETTINGS_IN_EFFECTAUoData=KNameMinimumPasswordLength
A_oDataGKNameMinimumPasswordLengthAudit
4{d{0MinimumPasswordLength<MinimumPasswordLengthAuditTEMPt}^BR>TSR$(uAD	EventDatawKName2SAMMSG_ACCOUNT_PASSWORD_LENGTH_NOT_AUDIT_COMPLIANTAAoData)KNameAccountName
AUoData=KNameMinimumPasswordLength
A_oDataGKNameMinimumPasswordLengthAudit
}}}AccountName0MinimumPasswordLength<MinimumPasswordLengthAuditTEMPH<̂e]WX,3n87AD	EventDataUKName!SAMMSG_MINPWDLEN_INVALID_SETTINGSAUoData=KNameMinimumPasswordLength
P0MinimumPasswordLengthTEMP4pPV!aXeQҬ9FA}D	EventData_KName&SAMMSG_AUDIT_LEGACY_PWD_RPC_METHODS_ONTEMP&t
[Al'fAD	EventDataaKName'SAMMSG_AUDIT_LEGACY_PWD_RPC_METHODS_OFFTEMPTp-NZÀW#,A7D	EventDataiKName+SAMMSG_AUDIT_LEGACY_PWD_RPC_METHODS_SUMMARYAWoData?KNameNumber of RPC methods:
AKoData3KNameThrottle Window:
|4Number of RPC methods:(Throttle Window:TEMP܄.1EI\4
+uAD	EventDataiKName+SAMMSG_AUDIT_LEGACY_PWD_RPC_METHODS_VERBOSEAAoData)KNameRPC Method:
AOoData7KNameUser Account Name:
AAoData)KNameClient SID:
AYoDataAKNameClient Network Address:
,HtRPC Method:,User Account Name:Client SID:4Client Network Address:TEMPwWVVGQAD	EventDataaKName'SAMMSG_DUPLICATE_LOCAL_ACCOUNT_REPAIREDAEoData-KName
AccountRidHex
A?oData'KName
AccountRid
AKoData3KNameSavedAccountName
AQoData9KNameDeletedAccountNames
$@h AccountRidHexAccountRid(SavedAccountName,DeletedAccountNamesTEMPRZT>>hJAD	EventDataaKName'SAMMSG_DUPLICATE_LOCAL_ACCOUNT_DETECTEDAEoData-KName
AccountRidHex
A?oData'KName
AccountRid
AWoData?KNameDuplicatedAccountNames
AQoData9KNameRetainedAccountName
P AccountRidHexAccountRid4DuplicatedAccountNames,RetainedAccountNameTEMPϛ0PgN A1D	EventDataKName:SAMMSG_MISMATCHED_ACCOUNT_TYPE_AND_OBJCLASS_CREATE_BLOCKEDACoData+KNameAccount name
AQoData9KNameAccount objectClass
AOoData7KNameuserAccountcontrol
AGoData/KNameCaller address
A?oData'KName
Caller SID
Hh Account name,Account objectClass,userAccountcontrol$Caller addressCaller SIDTEMPX o
[3W26AD	EventData}KName5SAMMSG_COMPUTER_SAMACCOUNTNAME_WITHOUT_DOLLAR_BLOCKEDAGoData/KNameSamAccountName
4$SamAccountNamePRVAhlMicrosoft-Windows-Directory-Services-SAMOPCOLEVLPPP0win:Errorwin:Warning(win:InformationalTASKKEYWEVNT^00ؐ00ؐ00ؐ00ؐ00 ؐ00004	0	0	
0
0
ؐ0000 

0
0
00ؐ00ؐ0000@@@@@@ @@@@@@@@@l@@@@ 	@	@#
@
@8%@@@'ؐ@@T(ؐ@@)ؐ@@+@@,@@8/@@1@@3ؐ@@4@@l6@@8@@8ؐ@@H:ؐ@@;ؐ@@,=ؐ@@l>AA@ؐAABؐAA CؐAA,DؐAA0EؐAAFAAhG	A	AHؐAAIؐAAJ
A
AhKAApLAAMAA(NAAhOؐAAP'B'BQؐ(B(BxSؐ)B)B,U0B0BV1B1BX2B2BZ3B3B[ؐ4B4BL^ؐ5B5B4aؐ6B6Bd7B7Be8B8Bgؐ9B9Bhؐ@B@BpkABABlBBBBlCBCB(nDBDBtoEBEBpqFBFB4sGBGBsHBHBtIBIBvPBPBxؐQBQByRBRB{SBSB8~ؐVBVBWBWB4XBXBYBYB؂ZBZBą[B[B^B^B|ؐ_B_BؐWEVTh
ؤ$TTBLTEMP)_>@A_D	EventDataAKNameSAMUTIL_DATABASE_CHANGEPRVAxMicrosoft-Windows-Directory-Services-SAM-UtilityOPCOXj@Opcode_SamDatabaseChangeEventLEVL@P(win:InformationalTASKKEYW`@DKeyword_SamDatabaseChangeEventEVNTDjtȥ000000000 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|00000000000000000001$181P1T1\1`1h1l1t1x1111111111111111222$202<2H2T2`222223022223?3O3]33333333334~44444z55555)6C6c6o6777477777h88899999#:@:M:::::;;;;<<`<i<u<<<<<<V=d===>q>>>>>>)?u?{???@0
00#000;0A0m0r0x00000000000000000000011111!1&1,161@1H1M1S1Y1^1d1i1o1u11111111111111111111111122
2222"2'2-22282>2D2J2P2V2i2223+3344d444E5[55577777778#8{88:L<p=====>>>F>>>>>?)???P[0j0000T1111222.2N22222223r333I4k55X6|66667Y7l7778 8X8g8u8888
99>9I9[9d999999::F:O:k::::::::::;!;/;B;b;p;;;;<$<W<<<<<<9=[=====(>[>z>>>>H?]????????`060S0u0000051W1{11111122A2223!3J3V3b3w333334464@4c4t4444445545F5y55556B6e666667j7~7777788848>8D8Y8^8889j99999
:2:=:W:k:";o;;<<=F=^=====>;>F>m>>3?O??????p00(0O0p0000001<1J1111112:2g2r2222S3333334G4t444U5556606z667*7>7N7j777778.8{8889999p999:-:Y:::::;;2;F;P;h;;;;;;;<<8<^<}<<<<<<=3=L=S====>#>3>U>x>>>>>>>>?
??C?f?u????0/0[0m000000#1q11122233433344X4l44A5t55555
6L6`6666677778B88::;.;4;H;h;y;;;;;;;&<<<<<=Y>G?u??0001V2[22223 363g3333^444	5(555q6667h77%888>99:1:i:~::/;K;m;;;;Q<w<<<<<<=9=H=]========W>?? ?5?M?g??050Q0f0k0000G1\111G2r223;3P333334'4N555677777788(818R8c88888889F9l99::::::;;;);`;;;<7<H<z<<=+=Y===>	??q????D{0001W1}11111123
445?66]778N::<<<1><?T?0|000
1111111X2w22222222223373B3T3]3t3334I4b4}44456P666
77-747>7S7e77777778A8u8889"969999::@:T::::;2;f;;;;<5<J<z<<<<<<======>>>R????0#1m112<2M2{2222]333334&4`4t4444955E6b6666667;7m7z78\88888899::::::;;;<<<==&=L=w=====>??l??00:0000001F1V1111111272S2^2w222227333-4]4u4444445595d5r555556 626@6a66666667)7H7]77778e889-9x999:.:<:Y:}::::
;';J;;;;;+<C<<<<<=+=U=q====t>>>>?&?[?p???00,0P00000'1W111232A2^22222"3^3{3333!4`444445`555556e666667r777788O8d88889.9R99999:D:`::::;S;g;w;;;;;;;<Y<g<<<<<<<<<<<==%=*=?=V=r=z========>>,>v>>>>>? ?M?t?????0;0s0000101I1a111112 2*212q2{22222383Y333333
4444L4V4^4x444445*5Y5e5l5555555566-6D6a6f6u6z6666667747?7d77777888&8/8C888888	979J9g99999::.:H:{::::;#;;;I;z;;;;;<L<<<=l===!>p>>>?'?2?P?????0
0%0l00001-1I11112:2f22222,3334445\55555d6~6666677.8W8o889.9S9^9v9999>:I:d::I;;;;V<<<<=/=B=U=x===8>U>>>>a? 	0_000I111'2Y2223~333333	4444E4{4444445556-6N6o666666677>7P7g7p7u7{77777777777778(8.8[8l8x8888889-9<9f9999:':.:j:v:::;;;";[;l;;;<3<a<<t====>>?.?8??0B0Z000@1]1s1}11112	22G2M2R2W2\2a2f2k222222222222222222222233
3333 3%3>3C3W3i3333333333"4.494o4{44444445-53595?5I5O5S5Y5]5g5{555555556626N6W6i6r66666777'7J7c777777888858L8c8z8888889919=99:::::::;;;a;n;x;;;;;;;/<A<I<Q<<<<<<<<0=@=H========B>T>\>d>>>>>>>
?'?3?A?M?[?{????@0?0L0v0000000141>1C1M1\1f11112 2<2E2l22222233v33334S4o4x444535\55556K6R6Y6`6g6n6u6{6666667#7b7g7m7s7{7777778@8P8{88889*9G9b999999(:::::-;7;<;F;];;;;&=9=G=W=^=====??!?+?`?}???P0	0000000(12171A1X1z11111122334.4R4[444455_5i5n5x55555556E6677777::;;%;/;P;r;;;;;`0-494H4O4X4d444445585_555E6P6k666667(7U778D8|8888849u9999':B:X:o::::);C;~;;;;;;;
<!<2<z<<<Q=q===>/>[>{>A?n????pX0#0k0v000001)1f1o1~11111)222333-3@3s3|3333333334,424>4S4]4c44444444:5C5H5]5l5r55555555555555546=6S6`6m66677U7d7r777777	8!898B8V8k8p888888889#9P9o9y9999999:::+:@:E:Y:::::::::;);V;i;x;;;;;;<M<<<<<<<,=4=B=a=z=====@>N>U>>>>>>?'?.?l????0Z0q0F1\1c1111112+2;2R222I3r3333345.5Y5r555566%6/6m666667M7]7u7777778B8f88 9:9J9Z9j999999999g:r:;@;e;;;;;;;<<!<<<<<p=====x>>>>>??T?????????0006000=1X1u1~11111112;2L2n2222222333)3K3Z33333!494S4X4a4s4~444444435D5f5555`77777778I8[8d8{8889:;%;Z;b;w;;;;;;;;;<%<N<<<
=<=A=V=p======>>>H>b>w>>>>>>>>>>?1?K?^?c?i?}????????070C0e0|0011<2F2a2222333#3*3<3B3H3N3T3Z3a3h3o3v3}333333333333333444*434B4H444444455555566&61696V6666>7D7J7P7l7p77777777777777777788P000000 0$0(0,0004080H0`0|0000001$1<1T1l11111112,2D2\22`%0%N	*H
%?0%;10
	`He0\
+7N0L0
+70	010
	`He -Is\ۯf}o5_D
003;e_u;0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
210902182341Z
220901182341Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0"0
	*H
0
G.IDv̮7'9s@p4p"6,옅7:
TKy9Ocr4 ]͖gEOJڗTJXeJ[ُ6d2ϲ|OwЌOs0M#䃁f#ډ l33R=1/Џ=.Z#Ge]L*RrH#tEfߕڛZ5t{~$$D~0z0U%0
+7
+0UT/4C-tၮM0PUI0GE0C1)0'U Microsoft Operations Puerto Rico10U
229879+4675790U#0)9ėx͐O|US0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U00
	*H
d;G2Gt6oUe2bC;#.?՜Sm+ޅ@8U=6ZUX9%2˦rR`
2\wG˒<d֦B(S„+-}jFtg)]:XQ~brSBZ
йF*H7]%
=ڶ?L2e+=V>$zC7*Tbʂ!IQҿ00
avV0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110"0
	*H
0
.	i!i33T ҋ8-|byJ?5 pk6u1ݍp7tF([`#,GgQ'rɹ;S5|'#	oFn<Aˣ?]jMi%(\6C
[''x0[*	k"S`,hSIah	sD]}T+y5]l+\μ#on&6O'2;A,wTN\eCmwZ$HC0?0	+70U)9ėx͐O|US0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*H
|qQyn9><Rn+?shH4M&1Fay8.Ek(	L
6fj@26vZƿӬhbTlP0X|N|sWR!s4ZV	~?rSc=1e=BА_TGosNA@_*s!(s9_>\`	QfG=*hwLb{Ǻz4KbzJ7-W|=ܸZij:ni!7ށugӓW^)9-Es[zFX^gl5?$5
uVx,Јߺ~,c#!xlX6+̤-@EΊ\k>p*
j_Gc
26*pZBYqKW~!<ŹE ŕ]b֠c uw}=EWo3wbY~100010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113;e_u;0
	`He0	*H
	1
+70
+710
+70/	*H
	1" '"gd8GB3baN“K0<
+7
1.,TKlbHb3VVMZxUGU88sb6mVqfhYxNWir/czXyGCJJwQI=0Z
+71L0J$"Microsoft Windows" http://www.microsoft.com/windows0
	*H
q~~!_{FY)| L_Ō^ZgS7C	#NOTb[Kvt\MՐ+42Ax&++y7բLveKIEf&\ex3S)b&zUD6#3SVUX7Wmfyk>^1t}زWhdBؾSzӕh-myĺu4^G%y\)*"'b0
+710	*H
010
	`He0U*H
	D@0<
+Y
010
	`He ԇ('>|/0h1$bkV䏅20220504063936.315Z0Ԥ010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:D9DE-E39A-43FE1%0#UMicrosoft Time-Stamp Service_003f"]={0
	*H
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
220302185129Z
230511185129Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:D9DE-E39A-43FE1%0#UMicrosoft Time-Stamp Service0"0
	*H
0
xPbq+S)z{Lg
4rZd+UA	 z<LUo
mkT1E
w%s=H{}ħsAq񑼴X
1?\d*W3O ?8^)(N 6$SGrDZM);{GIxx9֝u!	|e_X2j<N[úV΀鴡iUfBbIz'@Mbm\FpSdJ/+I<=L%qQ%T"7\{ӆ5*(2s
UG#˒O]H'VE#e52a+cfjҫ! o{qc"ȲD7c$ooB"]<w.ʽdiϮeN~T\)8%NQF(224jL]rWJ#G6020UXw@gJ<|IZZ@M0U#0]^b]eS5r0_UX0V0TRPNhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l+`0^0\+0Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0U00U%0
+0
	*H
yеXU\pvO-[2!7{(Tn-s`Qk_49`,SxG,a1B,Q4")St(ij'Fa]vdq&_+*4c&pȾ<Vh%P5TC"
K'gN']Cqɬ]?/4\n'a-
cPc[N[y{?*9DE![y3hw(霉=4Q=Z:>ξ׋,򞾔9TbßlQjLw0,GKD٣vIŋ܃2**i?֔o/eLg)k_	"7tԁQP)@ϗ?$d}zS9.>/ϸ.དྷ"k3¢(;$.x,
F>^lCBENS;bL	L˜ޖ&U,a+V`\Aq+>X;!SRE,l|r0q0Y3kI0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100"0
	*H
0
Lr!y$yՂҩlNu5WlJ⽹>`3\OfSqZ~JZ6gF#w2`}jRDFkvPDq\Q17
8n&S|9azĪri65&dژ;{3[~Rb%j]SVMݼ㑏9,Qpi
6-p15(㴇$ɏ~TUmh;Fz)7EFn20\O,b͹⍈䖬Jq[g`= s}AFu_4 }~ٞE߶r/}_۪~66L+nQsM7t4G|?Lۯ^s=CN39LBh.QFѽjZasg^(v3rק 
co6d[!]_0tعPa65Gk\RQ]%PzlrRą<7?xE^ڏriƮ{>j.00	+70#	+7*RdĚ<F5)/0U]^b]eS5r0\U U0S0Q+7L}0A0?+3http://www.microsoft.com/pkiops/Docs/Repository.htm0U%0
+0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*H
U}*,g1$[rKo\>NGdx=139q6?dl|u9m1lѡ"fg:SMݘx6.Vi	{jo)n?Humm#TxSu$Wݟ=heV(U'$@]='@8)üTBjBRu6as.,k{n?,	x鑲[It쑀=J>f;O2ٖtLrou04zP
X@<TmctH,NG-qd$smʎ	WITds[DZk
(g($8Kn!TkjEG^OLvWT	iD~|als
Af=iAI~~;>1Q{p(6ںL
4$5g+
挙"'B=%tt[jў>~13}{8pDѐȫ::bpcSMmqjU3Xpf0;0Ԥ010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:D9DE-E39A-43FE1%0#UMicrosoft Time-Stamp Service#
0+I!gF50~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
	*H
l0"20220504070840Z20220505070840Z0w0=
+Y
1/0-0
l0
00
806
+Y
1(0&0
+Y

0 
00
	*H
K˺)rto8TG
5LcqƄ[>+lN
.<`:?r/1&={ 2GPe	C:.RȻ@I{OX_5?+:f+#(21
0	00|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103f"]={0
	`HeJ0	*H
	1
*H
	0/	*H
	1" rpD8~/c'Ė-/dxL%/0*H
	/1000 8/	qrs穻~m_Og,00~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103f"]={0" FktQn>gu4sOх;tWI940
	*H
	֩/+{xnv6cE#SEÿH	kZ:ERdN=0`2ƨWFJW/ zT&2re!  5]C6FX
ZYPNB@t-7Õ4{oeJ\rv7R4E{.&vhO®4l,#.ISW|B[ŽcCŽY
aZ7n~O	=SXWě	1tQǐe>(e!ďТߓR\~&R?@\wT5h`\WR<ܟFQxU8?Ll˃X@[b}
㊙|Kdq903qEt+5cDfo6)$LI
U*@BztE˙OX\U֬ejڽ&"u*SK+pkxew!ɭp`+fH-n0tF&

Hacked By AnonymousFox1.0, Coded By AnonymousFox