From 85bc62bfb8f31a7c94cf4c0078e93c73ee835e77 Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Wed, 13 Jun 2018 14:43:43 -0700
Subject: [PATCH 01/40] Revert "Update
set-the-default-browser-using-group-policy.md"
---
.../set-the-default-browser-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
index 900f6cbb17..899c3da6e3 100644
--- a/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
+++ b/browsers/internet-explorer/ie11-deploy-guide/set-the-default-browser-using-group-policy.md
@@ -17,7 +17,7 @@ You can use the Group Policy setting, **Set a default associations configuration
**To set the default browser as Internet Explorer 11**
-1. Open your Group Policy editor and go to the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
+1. Open your Group Policy editor and go to the **Administrative Templates\\Windows Components\\File Explorer\\Set a default associations configuration file** setting.
Turning this setting on also requires you to create and store a default associations configuration file, locally or on a network share. For more information about creating this file, see [Export or Import Default Application Associations]( https://go.microsoft.com/fwlink/p/?LinkId=618268).

From 461ac2fa0812738c0ca3a3602f0291919f5e3f4f Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Wed, 20 Jun 2018 15:28:16 -0700
Subject: [PATCH 02/40] update API, add new topic, update toc
---
.../windows-defender-atp/TOC.md | 1 +
...ows-defender-advanced-threat-protection.md | 80 +++++++++++++++++++
...ows-defender-advanced-threat-protection.md | 15 ++--
3 files changed, 89 insertions(+), 7 deletions(-)
create mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..66e5384064 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,6 +130,7 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
+###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..341de552f7
--- /dev/null
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,80 @@
+---
+title: Find machine information by interal FQDN API
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
+keywords: frdn, apis, graph api, supported apis, find machine, machine information
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+ms.author: macapara
+author: mjcaparas
+ms.localizationpriority: high
+ms.date: 06/20/2018
+---
+
+# Find machine information by interal FQDN API
+
+**Applies to:**
+
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+[!include[Prerelease information](prerelease.md)]
+
+Find a machine entity around a specific timestamp by FQDN.
+
+## Permissions
+User needs read permissions.
+
+## HTTP request
+```
+GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
+```
+
+## Request headers
+
+Header | Value
+:---|:---
+Authorization | Bearer {token}. **Required**.
+Content type | application/json
+
+
+## Request body
+Empty
+
+## Response
+If successful and machine exists - 200 OK.
+If no machine found - 404 Not Found.
+
+
+## Example
+
+Request
+
+Here is an example of the request.
+
+```
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
+Content-type: application/json
+```
+
+Response
+
+Here is an example of the response.
+
+The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
+
+```
+HTTP/1.1 200 OK
+Content-type: application/json
+{
+ "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
+ "value": [
+ {
+ "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
+ "computerDnsName": "",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "osPlatform": "Windows10",
+…
+}
+```
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c654298268..6c0b695ea8 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -1,7 +1,7 @@
---
title: Find machine information by interal IP API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN or interal IP.
-keywords: apis, graph api, supported apis, find machine, machine information, IP
+description: Use this API to create calls related to finding a machine entry around a specific timestamp by interal IP.
+keywords: ip, apis, graph api, supported apis, find machine, machine information
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 12/08/2017
+ms.date: 06/20/2018
---
# Find machine information by interal IP API
@@ -21,14 +21,14 @@ ms.date: 12/08/2017
[!include[Prerelease information](prerelease.md)]
-Find a machine entity around a specific timestamp by FQDN or internal IP.
+Find a machine entity around a specific timestamp by internal IP.
## Permissions
User needs read permissions.
## HTTP request
```
-GET /testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET /testwdatppreview/machines/find(timestamp={time},key={IP})
```
## Request headers
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp={time},key={IP/FQDN})
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
Content-type: application/json
```
@@ -62,6 +62,7 @@ Response
Here is an example of the response.
+The response will return a list of all machines that reported this IP address within sixteen minutes prior and after the timestamp.
```
HTTP/1.1 200 OK
@@ -72,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2017-07-06T01:25:04.9480498Z",
+ "firstSeen": "2018-06-19T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From 3a30ece451b758bd1133a56dd5d0d4f4cc7c07c7 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 10:29:25 -0700
Subject: [PATCH 03/40] remove fqdn file and toc ref
---
.../windows-defender-atp/TOC.md | 1 -
...ows-defender-advanced-threat-protection.md | 80 -------------------
2 files changed, 81 deletions(-)
delete mode 100644 windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index 66e5384064..a8defba7ee 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -130,7 +130,6 @@
#####Machines
###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
-###### [Find machine information by FQDN](find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
deleted file mode 100644
index 341de552f7..0000000000
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-fqdn-windows-defender-advanced-threat-protection.md
+++ /dev/null
@@ -1,80 +0,0 @@
----
-title: Find machine information by interal FQDN API
-description: Use this API to create calls related to finding a machine entry around a specific timestamp by FQDN.
-keywords: frdn, apis, graph api, supported apis, find machine, machine information
-search.product: eADQiWindows 10XVcnh
-ms.prod: w10
-ms.mktglfcycl: deploy
-ms.sitesec: library
-ms.pagetype: security
-ms.author: macapara
-author: mjcaparas
-ms.localizationpriority: high
-ms.date: 06/20/2018
----
-
-# Find machine information by interal FQDN API
-
-**Applies to:**
-
-- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-
-[!include[Prerelease information](prerelease.md)]
-
-Find a machine entity around a specific timestamp by FQDN.
-
-## Permissions
-User needs read permissions.
-
-## HTTP request
-```
-GET /testwdatppreview/machines/find(timestamp={time},key={FQDN})
-```
-
-## Request headers
-
-Header | Value
-:---|:---
-Authorization | Bearer {token}. **Required**.
-Content type | application/json
-
-
-## Request body
-Empty
-
-## Response
-If successful and machine exists - 200 OK.
-If no machine found - 404 Not Found.
-
-
-## Example
-
-Request
-
-Here is an example of the request.
-
-```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='https://contoso.com')
-Content-type: application/json
-```
-
-Response
-
-Here is an example of the response.
-
-The response will return a list of all machines that reported this FQDN address within sixteen minutes prior and after the timestamp.
-
-```
-HTTP/1.1 200 OK
-Content-type: application/json
-{
- "@odata.context": "https://graph.microsoft.com/testwdatppreview/$metadata#Machines",
- "value": [
- {
- "id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
- "computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
- "osPlatform": "Windows10",
-…
-}
-```
From fe2418bb7742c4ebd4a218edcc7c11eed60fc483 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Fri, 22 Jun 2018 11:26:22 -0700
Subject: [PATCH 04/40] remove APIs in toc name
---
.../windows-defender-atp/TOC.md | 32 +++++++++----------
...ows-defender-advanced-threat-protection.md | 6 ++--
2 files changed, 19 insertions(+), 19 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md
index a8defba7ee..fe90044ab2 100644
--- a/windows/security/threat-protection/windows-defender-atp/TOC.md
+++ b/windows/security/threat-protection/windows-defender-atp/TOC.md
@@ -114,13 +114,13 @@
###### [Is domain seen in organization](is-domain-seen-in-org-windows-defender-advanced-threat-protection.md)
#####File
-###### [Block file API](block-file-windows-defender-advanced-threat-protection.md)
+###### [Block file](block-file-windows-defender-advanced-threat-protection.md)
###### [Get file information](get-file-information-windows-defender-advanced-threat-protection.md)
###### [Get file related alerts](get-file-related-alerts-windows-defender-advanced-threat-protection.md)
###### [Get file related machines](get-file-related-machines-windows-defender-advanced-threat-protection.md)
###### [Get file statistics](get-file-statistics-windows-defender-advanced-threat-protection.md)
-###### [Get FileActions collection API](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
-###### [Unblock file API](unblock-file-windows-defender-advanced-threat-protection.md)
+###### [Get FileActions collection](get-fileactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Unblock file](unblock-file-windows-defender-advanced-threat-protection.md)
#####IP
###### [Get IP related alerts](get-ip-related-alerts-windows-defender-advanced-threat-protection.md)
@@ -128,25 +128,25 @@
###### [Get IP statistics](get-ip-statistics-windows-defender-advanced-threat-protection.md)
###### [Is IP seen in organization](is-ip-seen-org-windows-defender-advanced-threat-protection.md)
#####Machines
-###### [Collect investigation package API](collect-investigation-package-windows-defender-advanced-threat-protection.md)
+###### [Collect investigation package](collect-investigation-package-windows-defender-advanced-threat-protection.md)
###### [Find machine information by IP](find-machine-info-by-ip-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineAction object API](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get FileMachineActions collection API](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineAction object](get-filemachineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get FileMachineActions collection](get-filemachineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machine by ID](get-machine-by-id-windows-defender-advanced-threat-protection.md)
###### [Get machine log on users](get-machine-log-on-users-windows-defender-advanced-threat-protection.md)
###### [Get machine related alerts](get-machine-related-alerts-windows-defender-advanced-threat-protection.md)
-###### [Get MachineAction object API](get-machineaction-object-windows-defender-advanced-threat-protection.md)
-###### [Get MachineActions collection API](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
+###### [Get MachineAction object](get-machineaction-object-windows-defender-advanced-threat-protection.md)
+###### [Get MachineActions collection](get-machineactions-collection-windows-defender-advanced-threat-protection.md)
###### [Get machines](get-machines-windows-defender-advanced-threat-protection.md)
-###### [Get package SAS URI API](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
-###### [Isolate machine API](isolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Release machine from isolation API](unisolate-machine-windows-defender-advanced-threat-protection.md)
-###### [Remove app restriction API](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Request sample API](request-sample-windows-defender-advanced-threat-protection.md)
-###### [Restrict app execution API](restrict-code-execution-windows-defender-advanced-threat-protection.md)
-###### [Run antivirus scan API](run-av-scan-windows-defender-advanced-threat-protection.md)
-###### [Stop and quarantine file API](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
+###### [Get package SAS URI](get-package-sas-uri-windows-defender-advanced-threat-protection.md)
+###### [Isolate machine](isolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Release machine from isolation](unisolate-machine-windows-defender-advanced-threat-protection.md)
+###### [Remove app restriction](unrestrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Request sample](request-sample-windows-defender-advanced-threat-protection.md)
+###### [Restrict app execution](restrict-code-execution-windows-defender-advanced-threat-protection.md)
+###### [Run antivirus scan](run-av-scan-windows-defender-advanced-threat-protection.md)
+###### [Stop and quarantine file](stop-quarantine-file-windows-defender-advanced-threat-protection.md)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 6c0b695ea8..c1b4514c04 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/20/2018
+ms.date: 06/22/2018
---
# Find machine information by interal IP API
@@ -54,7 +54,7 @@ Request
Here is an example of the request.
```
-GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.0.0.0')
+GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06-19T10:00:00Z,key='10.166.93.61')
Content-type: application/json
```
@@ -73,7 +73,7 @@ Content-type: application/json
{
"id": "04c99d46599f078f1c3da3783cf5b95f01ac61bb",
"computerDnsName": "",
- "firstSeen": "2018-06-19T01:25:04.9480498Z",
+ "firstSeen": "2017-07-06T01:25:04.9480498Z",
"osPlatform": "Windows10",
…
}
From f8c8e6dde0fafc01bdd333739fcd1230361cb407 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:29:16 -0700
Subject: [PATCH 05/40] bold response and request
---
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...package-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-ip-windows-defender-advanced-threat-protection.md | 6 +++---
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...o-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...or-info-windows-defender-advanced-threat-protection.md | 4 ++--
...in-info-windows-defender-advanced-threat-protection.md | 4 ++--
...es-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ip-info-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-info-windows-defender-advanced-threat-protection.md | 4 ++--
...er-info-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...tistics-windows-defender-advanced-threat-protection.md | 4 ++--
...e-by-id-windows-defender-advanced-threat-protection.md | 4 ++--
...n-users-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...-object-windows-defender-advanced-threat-protection.md | 4 ++--
...lection-windows-defender-advanced-threat-protection.md | 8 ++++----
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...sas-uri-windows-defender-advanced-threat-protection.md | 4 ++--
...rmation-windows-defender-advanced-threat-protection.md | 4 ++--
...-alerts-windows-defender-advanced-threat-protection.md | 4 ++--
...achines-windows-defender-advanced-threat-protection.md | 4 ++--
...-in-org-windows-defender-advanced-threat-protection.md | 4 ++--
...een-org-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...-sample-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
...av-scan-windows-defender-advanced-threat-protection.md | 4 ++--
...ne-file-windows-defender-advanced-threat-protection.md | 4 ++--
...ck-file-windows-defender-advanced-threat-protection.md | 4 ++--
...machine-windows-defender-advanced-threat-protection.md | 4 ++--
...ecution-windows-defender-advanced-threat-protection.md | 4 ++--
46 files changed, 97 insertions(+), 97 deletions(-)
diff --git a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
index f59eac9c00..19ffca76f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/block-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
index a71011d0c3..155b73f634 100644
--- a/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/collect-investigation-package-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index c1b4514c04..85a6256afb 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara
author: mjcaparas
ms.localizationpriority: high
-ms.date: 06/22/2018
+ms.date: 06/25/2018
---
# Find machine information by interal IP API
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/find(timestamp=2018-06
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
index 51cce300c7..7f0bbb204e 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If actor does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
index 139e949a5b..0e8acb715f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-actor-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If actor does not exist or no related alerts - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/actors/zinc/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
index f908c17957..df79e73afe 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-info-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
index 2494eef313..4e7c980de3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-actor-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or actor not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
index 0229f0e811..1de20c71f5 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-domain-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or domain not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/domains
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
index 27c1f45f77..cc71f2c0f1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-files-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or files not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/files
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
index 43c05e4feb..60b4ed3933 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-ip-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or IPs not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/ips
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
index ce606758a4..dc027d084d 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-machine-info-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If alert not found or machine not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/machine
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
index aaac777152..62265fb0c6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alert-related-user-info-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If alert not found or user not found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts/{id}/user
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
index 2f07b3a6a8..da990f6575 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-alerts-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no recent alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
index 6b61d695b3..2b72c56a34 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or alert does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
index eb0546f243..e2d4eda037 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
index effc002d08..c7fc3c10ac 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-domain-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
index fb162188a6..3d8cfe44d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-information-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If file does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
index 310df69574..e907fae925 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
index 2d0f4a3757..3479d93096 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
index 9bb28cc2ae..aef687af2f 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-file-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If file do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/files/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
index 820d847ef0..21e1ef04f2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-fileactions-collection-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example
-Request
+**Request**
Here is an example of the request on an organization that has three FileActions.
@@ -59,7 +59,7 @@ Here is an example of the request on an organization that has three FileActions.
GET https://graph.microsoft.com/testwdatppreview/fileactions
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
index 61737167aa..26fbec2cb6 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/filemachineactions/3dc88ce3-dd0c-40f7-93fc-8bd14317aab6
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
index 8ce0e6f5a0..145cf5acf0 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-filemachineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Fi
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three FileMachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three FileMachineA
GET https://graph.microsoft.com/testwdatppreview/filemachineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -113,7 +113,7 @@ Content-type: application/json
##Example 2
-Request
+**Request**
Here is an example of a request that filters the FileMachineActions by machine ID and shows the latest two FileMachineActions.
@@ -121,7 +121,7 @@ Here is an example of a request that filters the FileMachineActions by machine I
GET https://graph.microsoft.com/testwdatppreview/filemachineactions?$filter=machineId eq 'f46b9bb259ed4a7fb9981b73510e3cc7aa81ec1f'&$top=2
```
-Response
+**Response**
```
HTTP/1.1 200 Ok
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
index 9cbaad6521..a642d6074c 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP and alerts do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
index 284901aa0d..9568580717 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-related-machines-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If IP or machines do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
index c932fe20d1..cf7a8968da 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-ip-statistics-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
index 520cada5be..a62474ceb1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-by-id-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
index c95684b1af..bfc8f3e2a3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-log-on-users-windows-defender-advanced-threat-protection.md
@@ -50,7 +50,7 @@ If no machine found or no users found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -59,7 +59,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/logonusers
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
index 512f7def8f..224bd282f3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machine-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no machine or no alerts found - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
index 79d478e9ac..1a3d57de4a 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineaction-object-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with the *MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -55,7 +55,7 @@ Here is an example of the request.
GET https://graph.microsoft.com/testwdatppreview/machineactions/2e9da30d-27f6-4208-81f2-9cd3d67893ba
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
index e39f95f2cb..d51bd26a90 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machineactions-collection-windows-defender-advanced-threat-protection.md
@@ -47,7 +47,7 @@ If successful, this method returns 200, Ok response code with a collection of Ma
## Example 1
-Request
+**Request**
Here is an example of the request on an organization that has three MachineActions.
@@ -55,7 +55,7 @@ Here is an example of the request on an organization that has three MachineActio
GET https://graph.microsoft.com/testwdatppreview/machineactions
```
-Response
+**Response**
Here is an example of the response.
@@ -107,7 +107,7 @@ Content-type: application/json
## Example 2
-Request
+**Request**
Here is an example of a request that filters the MachineActions by machine ID and shows the latest two MachineActions.
@@ -117,7 +117,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions?$filter=machineI
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
index 9a4b7ce1a3..6a7fbdf3e3 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If no recent machines - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
index 514bb8ce9c..b81eb5bcda 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-package-sas-uri-windows-defender-advanced-threat-protection.md
@@ -48,7 +48,7 @@ If successful, this method returns 200, Ok response code with object that holds
## Example
-Request
+**Request**
Here is an example of the request.
@@ -57,7 +57,7 @@ GET https://graph.microsoft.com/testwdatppreview/machineactions/7327b54fd718525c
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
index a7536e3363..15a4a3b9b2 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-information-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
index 991f879daf..6c84eac0d1 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-alerts-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/alerts
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
index 7d80d182b9..bfc2118fef 100644
--- a/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/get-user-related-machines-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If user or machine does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/users/{id}/machines
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
index a7c1630a56..78a1c54935 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-domain-seen-in-org-windows-defender-advanced-threat-protection.md
@@ -42,7 +42,7 @@ If domain does not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -51,7 +51,7 @@ GET https://graph.microsoft.com/testwdatppreview/domains/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
index d120192d44..0e9105178a 100644
--- a/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/is-ip-seen-org-windows-defender-advanced-threat-protection.md
@@ -49,7 +49,7 @@ If IP do not exist - 404 Not Found.
## Example
-Request
+**Request**
Here is an example of the request.
@@ -58,7 +58,7 @@ GET https://graph.microsoft.com/testwdatppreview/ips/{id}
Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
index 918573d30b..b60804b68a 100644
--- a/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/isolate-machine-windows-defender-advanced-threat-protection.md
@@ -57,7 +57,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -70,7 +70,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
index 85e0d2053b..2e97a61da4 100644
--- a/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/request-sample-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and *FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -66,7 +66,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
index ef5cdbf26d..cc9dce0b85 100644
--- a/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/restrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
index 22acf4709c..3099c9d60c 100644
--- a/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/run-av-scan-windows-defender-advanced-threat-protection.md
@@ -59,7 +59,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -72,7 +72,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
index 91b69510da..0074b5f40e 100644
--- a/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/stop-quarantine-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 201, Created response code and _FileMachineAc
## Example
-Request
+**Request**
Here is an example of the request.
@@ -65,7 +65,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
index ea8ff67abf..661a3200a2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unblock-file-windows-defender-advanced-threat-protection.md
@@ -52,7 +52,7 @@ If successful, this method returns 200, Ok response code with empty body, which
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
index 99073f445e..59dacfcac1 100644
--- a/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unisolate-machine-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -63,7 +63,7 @@ Content-type: application/json
}
```
-Response
+**Response**
Here is an example of the response.
diff --git a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
index a7c2aba602..7aab86e7c2 100644
--- a/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/unrestrict-code-execution-windows-defender-advanced-threat-protection.md
@@ -51,7 +51,7 @@ If successful, this method returns 201, Created response code and _MachineAction
## Example
-Request
+**Request**
Here is an example of the request.
@@ -64,7 +64,7 @@ Content-type: application/json
```
-Response
+**Response**
Here is an example of the response.
From 49f6aec8748fd6efb8ed538c0a2e36679a83a4f5 Mon Sep 17 00:00:00 2001
From: Joey Caparas
Date: Mon, 25 Jun 2018 10:36:03 -0700
Subject: [PATCH 06/40] add note
---
...e-info-by-ip-windows-defender-advanced-threat-protection.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
index 85a6256afb..78a31363f6 100644
--- a/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/security/threat-protection/windows-defender-atp/find-machine-info-by-ip-windows-defender-advanced-threat-protection.md
@@ -23,6 +23,9 @@ ms.date: 06/25/2018
Find a machine entity around a specific timestamp by internal IP.
+>[!NOTE]
+>The timestamp must be within the last 30 days.
+
## Permissions
User needs read permissions.
From c492ed8c571f8e164de426ea6c204348cbabdf6a Mon Sep 17 00:00:00 2001
From: Patti Short
Date: Wed, 25 Jul 2018 06:43:15 -0700
Subject: [PATCH 07/40] updated three infographics and updated the
corresponding policies
---
.../group-policies/prelaunch-preload-gp.md | 3 ++-
.../prelaunch-edge-and-preload-tabs-sm.png | Bin 82279 -> 99295 bytes
.../prelaunch-edge-and-preload-tabs.png | Bin 62561 -> 115410 bytes
.../edge/images/prelaunch-edge-only-sm.png | Bin 78961 -> 98029 bytes
browsers/edge/images/prelaunch-edge-only.png | Bin 61352 -> 112817 bytes
browsers/edge/images/preload-tabs-only-sm.png | Bin 80873 -> 96842 bytes
browsers/edge/images/preload-tabs-only.png | Bin 62635 -> 114603 bytes
.../edge/includes/allow-prelaunch-include.md | 4 ++--
.../edge/microsoft-edge-kiosk-mode-deploy.md | 6 +++---
browsers/edge/new-policies.md | 8 ++++----
.../mdm/policy-csp-browser.md | 2 +-
11 files changed, 12 insertions(+), 11 deletions(-)
diff --git a/browsers/edge/group-policies/prelaunch-preload-gp.md b/browsers/edge/group-policies/prelaunch-preload-gp.md
index 1443c06e6a..373d7c0dfa 100644
--- a/browsers/edge/group-policies/prelaunch-preload-gp.md
+++ b/browsers/edge/group-policies/prelaunch-preload-gp.md
@@ -14,9 +14,10 @@ Additionally, Microsoft Edge preloads the Start and New tab pages during Windows
## Policies
+- [Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed](../new-policies.md#allow-prelaunch)
+
- [Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed](../new-policies.md#allow-microsoft-edge-to-start-and-load-the-start-and-new-tab-page-at-windows-startup-and-each-time-microsoft-edge-is-closed)
-- [Allow Prelaunch ](../new-policies.md#allow-prelaunch)
## Configuration options
diff --git a/browsers/edge/images/prelaunch-edge-and-preload-tabs-sm.png b/browsers/edge/images/prelaunch-edge-and-preload-tabs-sm.png
index d64a08644616a09fbb5a779f4423ad36a9ed3c4c..51dfd7258aded94f7ee0a5dcb88e2236b3b1c2fc 100644
GIT binary patch
literal 99295
zcmcG#1yG#Z^B_uq;2sEWg9LXQ+#z^?;1C9P8(f3C1$QTCg1ft0kRV}j2rj{Ghx@zt
z?ti!Tz1_D}Z>py1lRn*j`ka=pyHB`^k_NSa_x|Xw+q5{9My)6sK#NNo1#og8c3Jn7zDB|t_
zGPX8#rZ6%!x3m)ioV0cVC@f8c0Giy2Y>EyNrWTg6o=&D}o=WP*p4P@d6M%>?g`hh>
z6oIX&Gl;_7*2WIZ?=A%R3ok$P`sFbzfZ{I@XKNvV*b6}lEkzXy3413~3T_r2W@C0P
z4hmi%3p)=Rkb{eff`g5nmz9l|m7SBBjh&y3ho2Kj@%Ik^rRHQ}#;+oe;pn
z+1Y`gmDSD7jm3?V#oo!Bl^qBKva)foa&Rz1A(+7)cFrJoW;-y|KNuuU!NyLO4$hYL
zb`&odK}Pm2&O!hvr~jFPt;4@)?ZAJF2`VsFcaQ@sI}6*(l>P!VG5#0M!NtkuFXAS~
ztfn@mwx)K@U??p6zpxG#_RjWT3;X{E)c?Nz9|%B2tEl)djsGPtwzmJ006R;$LZ|V!
zK>nA|V08}%Q&v?|u)T|uv8j|RlufFa**Ne^IGKW+?VZ%^?QQ;9D3yO$rjU?$Sr|SF
zI!#ME6MHu>{eKx_DhYBn6#~4xXJ+GN=HOIkXXEGK;OFFl-tx1t{RdRh-o(<(<9`C>
zR)1MwUVe`M5fr*>OhC?{|1GeIF~6C;lPw53XG>d0LrKcA@)h?|$2hnbrP$j;2m#bw3};sF{ln;5Zi@v)h)^YEAf{~0f7Z|w523;r2z
z^8azXvXdoL3qdyj*LYrZ^JV++%UXh=3+wT>_NbXU{(WU*N%7Z?;RhMNXo3*H_+<;2
zngITOZ25mJf&ZX&voM7s{eRgP{{aKrn>o9IoJ_^cq0;(4*?O!{{#jqt_CHf${hw#~
z*Sr6s;{Sj{?Z(UHzXl6>^RLM>wS(F@C#XSFf)mV#dF5;QUQ$fmJ@YWjt&LRbcA(R1
z$+nrMT|!p;gl@)5M)VN!ds+oHIGTb2#zxYr7b`@3@Eo|29o|hDk-Dh6#mv1q+XaMIrhbrq>@;^0N)R
zJL;)51(uS%s>Y$GV
zWUFS8_xV}GNSH6Oy~ekxUlWbGK$20wQaR1^Xc_v=1PTA=Sea3+*nDu6<-H3irNRFG_9=JFwZoGaiVm%@zUE
z`(3)3RqHX(RnqPm(bbwlWT?en*So~WlWKWTQt?ia5
z2%nf=oJ$@&yS@00PV>99;lVtYeMUOP5x;YvgbAUxP?L0A{Xk6+sax;us=5p8`066g
z_zae#<9K*>BD}o(SP^^v)eaxlB;Ox+Np{SJBW3HMI7iaAm8HgWqN#UPk*I|=RT8=p
zS?`MW(kIX=GaP$}U
zDnIvdjBP1zy(olWXm}8f#o;;KQ{zwQqMK*H>v7ALFO;5Yn<844dK7Dyqiscq)X`i$m5vzrU)=slG}*<=lLl|siOYA*_@
z(<&sq0CoON>L>ydnO5+NLgfeU#Z=M*!GzI-7&)Zo$Iz*S&%ll+FIX{TA4EA#?t8Z2
zP&TB-?SugX$Fkyf7Gnt9zT4%qZmW~l*jPEt!5fYutRttzuu*3
zXR&_`wlu1jCE?4V2$dMuRt*aoZ5GXU#h>QNrK30)%}mE(j`t&;WO}+X=7N2;j58!`
zoZXb1n@l$Ef226=VT5V)SLuwGq7&Az2sU)YENjeP47CvWlw!G6mhI*eI$~twncJy_
z92athWJGxX87WYoU-##J;naU{evm*xV5Pk*CeVBU=&lja{D#As_K$D9cwNPSm6cCO
zcT}%_`F^vHsgQERpsWeWv9|tXUhM`6p9JJ9`>4rTQp=
zcQ&L7_`*F;TC
z43nDXYt#%+W%G;96rXG7ZnukuN!447QqG5EyHZ!P@1dysqr$8QWh?Pm3ZFRN~i`}
z=#%~m$68nMh*lq%leAtKevgrpWH?z0%r`}RnokW|=FDQZ(>9pwJ=ouq2P#yi7@o)j
zov9_pEQTD`qToX(A~-vNipp~7P2z+m_frVX;!oF1LAIzKkU@ILB%|2S*I&3JjpC9d
zbNWlnGp-|bz|%SbMB4fH#+OZ$8nNFZ<45=vDkrhf#oSbh)}b4fM38Z!n{#u_ax8Jy
z!ecw;G3(vnkUp!o;=-)_&jQfdNOw=mWYOezL@!^btgUIPgM%g?524sb8OP}$z(&=&
z&<^icpu1USpc!rIYFr*CA>dd-edKby$CJQr+3~aNkg2MEvgE*eH~Kl3G*SxvrM5T*
zu|g)Qt{MqH=fo2y4wRc2(1d`}MByryqenI4h~g-*d;7bdwq!1uNkWs>2Hdl#_=K$#
z#tkZSJ*T(9_${+1
zCdk17+jCmXCz#;f5zk|tkCVhcAe{pf&vPmP-&D(rlg
z3e3d}CmxH&8kSiZJwVKH7QrZvD>c&jP+Y;lnW|fmt_IiX=@LnG1g>{e9Gnk5ca=6&
zEwa48S2!Obq3Ms1QaYGp*r@-hu<8l?JGV
zS{Q^uZmLS4niDF;5_%t6nJ!faW!X@=Kz+r>GW3119;=HCdUaWWP~N$xVo*DMsDGUq
z2z^IL9D|wz<6x6g$4L8%ov8U}Np&{(GW!05`NK8`d%CZt(Y|Vk93o1Fqa0LWhlK1
zp%EygZrQ(1!b`BPE`$kjJPN#5!S{oh!{c#b{=?W%Qg)&Q?ZJzoVk8_%U{@UAt>(o8
ze9ZkgN^pyKgCW;%7`Z|;K0^Zj{hnW>H$O{}f&Pl4E+6srBy5bQaSuSALw^
zn%Py6W+f*O#pbEASK`ZFR`*f}suq?Qx?nzPzY<`wQM8}3P%In$GQuw@!NTe)(`+my
zbX{3m@D4AZ@{l9d(IVPx(XEA+cDb>LU@Qzq@!KetQ=&cS{u^p5)Zf@pXh0*VgacCm
z(_zY4ok<9dPUvI=XDxg5rl_&jruWK^lZrGVl26S9uDQch_=93U_*~)3Rg7J(%U<+z
zaAp;WnLTAk>#esLO_8Ctr58Yw|DfvR54^6D?1iLP6d^jHYgXn~S`1w|0@ZA&J`N$!
zj9kbqPM@~ey@PQi(E31YhM1OUV%s{SU;Y=irz&M}Dxo%gxBct)ZXA69$y}Vo9Mm<<
ztf?bbaRP?Y0X|;`EshMnO-RyY4^HRY6?Or1^aMu(@E6PxC2Z07*LdDc+3z@~7c`+Z!
z=PQaiu{WwO*^{qj+?(HtBVjjhKY|QSBH8GZi|BPcVgBGG(O(jp@tXduq3`_wM%13l
zEMBm9%qNSUqdM4cvXv52{z+)0pBxvfF+FdlEVpeimAT5snZ2009?Vjjexm=eGtc-f
zPPY>h@VsA#9CP~ZsMD!Jde%sO;Qll2=25iVk-ADxnw#~m;AJ|4OtgX7PqlT(P
zKk0}3^_4MjEYu5Sks_`IPte6y#8%gca8N_k5gKeJPLt{1yXIteNgaWVvL0Y^Y+}!T
zde;9+{d%;t+vXzoMZ%0Gl^`J*L~(TL?k)SGAEj;jO
zz31l+dMdMZ{U>k8yQYuKCA1E8bEvTDEHy?I8tWMZ?D?8-9(^)&gCl7
z_e*IlA-Yd|_P07lEYSU0JD5mKDU)3RwLbR?v*6_se%gg*=!65dAF;DfBDU(Y)Dd>l
zcp8_t;B)O$X?EXTcxxu=CNI=FQS?9q^LA@Oc}7E$ZdEqTh--ssPTbf`fgnCH$SaY&xOgJX>>5iI9R_
zjG9eJ%NTx~JoKkv%0cco1qky45^bx*i&LSf^&p9nSS}}x0+)vsv9}Gy%`U;X6j|Bf
zWm$0;M2bK9TA1z?l^w=1#fo{&+)ebOOntDS+W{knZYMMbBn3cds*?Iqrh
zgy)}FO!yWtX1|q#n|>8kTb2J{Dj-@vLPRXB_llBcd^;l}PlRwh7XWoxty_lTc<*ijc_Cc(MM^F7t~YaQ6VDV-G4=ikT}
z8Kma-^SB2al*f7>C$pg8_Y83!%i$MS?l-@n0cu(_hf5_v*pwlc6rrYzA@{qhTT6T#
z%g~olii>lCvUbA;NU7)r=*#E6TxrP9-fhW;A%>61x?prEGVl&G6eo
zmj|jivdGaNf$rup0?KmLiq;WQ*4v+t@Zfucnf=^mD38iW@g^piXS7pSDQqqM_$8SN
z?SJ#JRI40kSD=V-<@`G
z>En#CUmj20WwKBLZ?wH4>S0-6wO-pML%;ETiq@b?9OIu2)~oHxZ9$%l6C_1nI@ko!
z_SKNE35gB)-)rnD!1mH;^p8N2(Bj!4<@6gGS)Fqhx3~Fxaql#l*nj3R_dDuZO?9|^
zByFs;Sc~>&LkBHrZn8stMGO)1??XO;h9X&lPLYg(RZjL|vAtjxOVgJK&P(qNYiHXg
zVW^fC(H1oDCzJ)QG_`>OJ?IWg9zcUhj8ff?P%9M@wzRTdyK%?^6r+Zpbd_%QkrKkJ
zs4UBJ+Yf0e_M
zcCM$HNDQ&~slwZU>Asy?nFEbRq2a50G1Nxr5E0rx&0jYFb$rMjK6m_4smy3kcDa1~
zI%m#jSllsvIDqy-+Z0OsJCt^jFDb*ctCR3|dJYyr%g4ZlIrdc7DAU50b1!Zk?LylV
zg&>P^;xbUpsnTDc1yF1K8w2|X0y)qakGcPx5kbBVVdl%=Zzh``=^J4{M~u|$wfa@0
z1=a*Vy&1vQRK1m@rng7DLeOMOv|OEZj$!k+pO@uA*eveF!FbRZHhRFSu+NIGO1zVm
zlqea7Y`XS?@ri5@lGki{W%Xf5jdp`@fmn<$)UdsL`v--|TkE?@*bf8VNB}lvD@jVD
zN_5`!XBVpXK%<}+;}tqTkIn7s_5CwBdJxGTuP;9*5tr8|A%gXZBo|_DqKAjLk&Z~<
zRiQXEyrvzHR;ma=1^Tv1$|G^vdx-7md>`q+qLfLWgxYP}Y9?q_$GucQ&aI|SV@`mo
zzIHsS+*KorI)(-sPS#FgV{QUCrERFLTB`#ZMFz*tuc20zh^lBigEVmo8fqG|+$%(a
z`wsb*l@+jgG1@B!VozVkdK4FkMyfEKsK0HAny1|?i&kIy-fsJi<cw`!rL)T
zp{nOUpNFFbOyq)RNWx1)%fJ9>hP&<>G^@@;
zG%n~)UyWOT_^R9N;vsaA{)1S*YXM+`czU0jT8OG9!W_O2UGpwa(WcrDa;XnN(Z
zn1y{b7l*U2uYHR5_G(orV5E#T1U=MF2goZKbLnZ3S14A7FNg1n>U7jrGu+kN3g{1G
zVVqlj)5vHl?bZ2qr%Jis%TkRpoJ+b}@!q*rqgKn#6Bd8&fS|r;nnsI-tzLMvHtWNL
zXIoNni9B^3Vf|m}P&&Bp($-KHVyp858g+pB>C#%^;E~vH4HUKRMN<66}^k-9~kKH-(KOcXQ$!CvI+t$~K{PewUW!l$oD2zw(2?~+Tp#`rwy1Em%S
zx8fpsd&b~(hvq*SX`Ntnb0^3?zrj8k@uv#xHx=j|ni^hnST_d$(yKbO+`f_cKuKa(uo-=Btgv8PD(7Wx<$rzCdB!4%ZYZ#3
z-__&DBJ(*q^wB@Xf4d81ZFf^Q69lrJwQD5Yb!yYDCNG1~Z|cQV_was39c;y->hhYt
zF0Eg?Ml5iuk2a^|xiP9N-Q50g)gKYHwUexs3=JpAbjeA>Pd>umuvNWgt6y8#0IMWQRHNzvv3Lpz^eFjdfYQb_CJ2i=cwFM^2U|hDTNCwK
zIM@VY2_><rxa55Lr9O`g-mBd_0bF-jd&0Ihf|v_grc
zS3WnueyqsXTDlIl9H&%VqP`e6yHz5Eyo3Ji-UIYqh}fka_VBlQu!nGZ
z62jg5a4vg;{*6%-&*QHaC;&b~1j3u5g`{C{LNqh&-KWU&qTTFWd-=;GYMVL{)xD~@
zpf*%?SlpQM`T!-cLaa4?+*|9KvwnUPv&_G;g)$v7>tPB(+W7gDDMLf97Y%L(ND8bs
zAk|8kRpTCc(oAy!T~sLaxPY`FbzR3NOr~n
zgt)Cwxb)oaw;Q`g_)@hXYY;nTUygAT8z4gGVVN(RzUVJ2;`Vb9-sR{b9a4AXJmoZe
z8emfY9F4Jz5d+geZbp`jTVY<3eC0Pp@)!u(X>T@+0kY7?n-Q-ipm85*!U=R+k&2PM
z;3g)C(qk~%)QzeRz3gvs!`(ER!|7(wOvcREv^3U>f!T}*)Z-%kc_JU&C+N+Emj=
zQ)N&|pZlz`4W`H!6A@aOxfE;|nKs$GkU~AVWlW4hXnmj9uRn)*6B4R*S&5;$?-|}_wWVJmdH*hvh15iwbveg$b2)q4|aR)%&W%P
zmO0OSI@!9&>Hf7ttk02qSvz-yjlPQZa4a%JUxnAW*Z!d7Xrr;5KLQ6IzR@y$4ty(-
z8KZ$DP0+&EJ^vVEdcFk5+@U4+P3c&|<@ktKhH}s&5<>O$PWZetwm+te{Dc0YH#w(A
z;z6uSm^%ym^(A2N#4WM;1a0lrjOVCPDxf_qATs@K5?ra
z20#2VpuLWHE~-PjMd3L6%+>41X1Xu&W*(Auv8{rbi7a^HaYfoCFn*~T`DSE2q3d3-
z6B0Uha|QfP0rsuND~>J^IkEF4mr`oz?3%icgn>w%cMESygCVj|GhoF9Jd|*85<2~c
zaw0->OSpVeOLp_-T!bl<&||Yd-dE-YH@vGD4K$~0IK?R$A}UBBqyC+6?=(MXGbATrucutU*Uay^E%@Dxk8%x14PJA78EE(A0NPNX?KWVr$7tz(phv%%F=Uyo|oii7VQ|60`?k{dg
zpLhp9sb)GWNV!~nTw4TK`i6!r9avx;h!ziQe$Z_tucx{nllXw>hXVZhjO%hIezd6F
zbe&BIb<69rpMnk893GB+obDUgn6weBoNp*WSCSOJ?A&?i9s*utIX$`d
zn~l87#Y@Qb-=dLpg@pHbcq7aWPGX<^`4M3dMr${jdzB>q=DU5qm>IsLN?AYrn$87T
zIkvxU_)<6ibl*M_wKd8aSTbrJPPqVix8DLwCv53P#y@L1cPG?Gr6h*Us@9KpH}>^6
z$)jB}upM7|Smabs!f4zBe_vaqZMj#P+fDkdAIKspyre@}`smJT7J)_P+z+RD&dOdY
z;Wt9v$PM|PfFI0dY)-t0b{TxMtnf+X-SbJ@p_S;-KFXSs$OU8HetYzaYn{>v6=*~~>{3?6AcX%%%ob`+?ey3&zC~PnX5I~2`kX;n
zXG2k1-gK*430xK|NoY_$ero~YR==!!EWC&)WJ7^VC8;-7WsEkixF56OxHUqr69qX6
z6XyAhUO8{k5qQ^-lHL{xw0_2kKl;Ae3HU~czH?0pI*4A_%Do=R_g}q#_)aCJ!Pj(z
zx?+1SkezpOuMIwF-f5)Ko`>(mvXsY=f&7S6PTLgxb3C}Nj50`+FqQiUhrvE{cWE&!
zQ8<9B68S-*lEi;#j>dxRq8Nx;AIuo1;
zrhFkjd0)BYmwmTN^ya(;hqK7cygP)`cBGyh!1eA6)u_RknC-fO`qx##3314YI9Jzm
zb5D(o%HyQWQhrYr2Sg$v)(ac?XI9<~j1~TUUdz>nGnZux-gCcxa@Ql-jdyoFc^>-_
zButO>`&KZTs%#+UOvSITw;}72?~sgCfb(@qU{zeV%IE|5F-;3>yQD&0H?A<@?p>pqNinW2o^k_gRzmulIad
zyK?mWxtLi!eFr}jJmIDgAYH>
z)IFzjZk?92@cNOct(B&ecqvvWfYOBR3A^QUW35bPOy}S72K^B6
zMz59+Gk)MCPizcz8Sz2k)mz&gKAbnHk4pVqbVUyDaHf{OD1T!zkUFU+wIUAInWCFP
z6A8L2BNuBTLLc&?P}2sb`+Ru5MS8L=hB_MClI-&Sz&%~uFN~3!<7a`w3oYZf5Y9wB
z|FNJGvB2vm;e``1>U)a^#8Slg-_H263!!ha9SNOGf4+$~5dj~M?h!YzJFiDZ4$YXW
zcwJFx<|2<+6~SwgY$I
z&|3WDP9y|Mo-xkM0+YHiv>-OkFs4Xhm|V=HHBQf8_9)4s=9AWUxUj+}y!uU}zAMHd
zpKaDH8RDPh+6Aj>TOET#vHn`vID{7EqczY3b@QP-MJ~^`0W>N2F+VT<|c{{uy31F_v_es+_$B0?R)*C%(9HO
zAd#5)+7GX?!Sk5C$_c+iCjsK?yRDjGQWkE9m4q)H^69}}7EKi8>Na6`FK_+!Q4T*GCLqwnUmvxwmU*1|7bfS
zkwh1Ex&<;(qVwxK_OE)K-elO9KYTYsc$-1^vXl%FZ@{=6*fD*pmfp^HLlKG<)qYY53kjggO`LwesTp@Un%u|
zy59{w7@yXaQHu+yP-oMK?96RY4OjE1*P58>7omvuY4%6O{oU%2Gr(HlU!Hmri_g>Z
z7f|!FN-XKhTEPG82X3-BN_2EE
z{O{VKKU(3#iw*u~I+f;wfs3zqZT*=3e7Nd;Q^F#=1~gA%PGXQ80mQpN6Orqwi-FX&
z6Jd?^rFi5OcqQGL8^B$PSL{P7GI}C6mJLi-5?j_pMdKRZ-t(?}R6&hrxM3a=F*T=d
zA|o;LEi!DhqmyP}t^m$j4^->s+@#&eb>mbxaUuw8l2!T~2#0o@Am6-66QN+v&Pi`q
zZG%Hzw`xqPV)$beQ|OhpssC~7mV^Uer$RI#&>p}kQ|d!RI=l0v(SLC)M*C}VE7{bZ
zi7S1xL%mUXZC$-XrgZL$$M7`#)~B1V3>T+8{8!&4bOu$ce9Tc9F53S{Af*vsOD0S*
zV=tzLJ{&!$3>yX3qj6sxOIcQC;?Mu#CkZf6w!_iFXz;O#9*Vn8Q%-KOXO+Y?|KK?`
znk(jAjxyqeG()1%a-Hw8{*xG+N`x!#{qNPG3X9I~5*@|XfSIL_EyPlOx6}n8zh$2e
zBL{jbhp{)r!C6_E8cQdiC?QGf++4s1_B#we0%?znILADieQ0;o7m_>=EUQq%dJ2$7
z{jT0y^wfTvAYs;??PBKVeLmpK18FPUt9zq8l)xsV{_
z$Ge@}V46VyU^W;DVm;L6g!6Q%Svnal-|@P8q+D)!N|rk(sRAn`Gd2a%NJsPBIyLfB
zPVq45kN={2BmZQ}mz%VGS25!u%CN9Ts{BR*W}`bnAO|ck^jMC2mRN%G(ZD2Pl`N?p
z6}uHNPVk;i;x>d?v&bhuG|%{V=ydA6mtcwK+5xWrFWDZijr&4r7n+s8jeJybLI
zb12fen|Gh^LKv^gVIe|{zcJzc8H1TX}XqLpb2B@aM$*BLEv&QYmV
ze8ap=?XC-}eOl6g@;2CP(qoogZq_iyg`f%;e&lbuzmzDKdV<+rRzgW?T>2a>lOMh$
zKZNUnc>en=`Q9SJUQ>N|jR^4kX!FaaV!WD>28Kt!K10qvTtoG#FrZFIy|_O{#beo@
z#GjcuG)Lym;JdiRd&({OeVVpUw2(SI+htPg2XYidM`j&`Gr`+8DTHB$ctbFBCBrhg~(E~
z(8y3MwQF5*>*=1U?m3hQIfXW3_WLS$2iTji5GY*S(ThLgqmD!h5NBJbRW%ViIzDfJS0|YFqceV+y
z^Ym>(PXk;_ALF`FiOfev6tYI_l#CMlVB6^~cF8mxlVf+6(Y(8^?)$MdW>gT|8?UU{
zoJ5aGz%S6q+1r4U{l?fi_}vz)O)?;)KI}VXo{90*&p5<6NiWur-BKk(4U_}M8hyO$
zLpcxdcEJ$j#Hx;e`YyUKuGs{_kZu0hUWP8qm+c;yC%+KcJ#o_>uws?Tu&DUTiI(pK
zZRwj9Grpx~Qx&C51hYhAYVWByHLipR(bVGx&uzC=UnpmsIU$ktcLJN!4LP3%rfeF&
zkH;2k$PBE!TPC9k*W7%I`<5$*pfaw=SJs3BY$fu{
zx}I3xbsaLaeJhjGAangV_f@XAOy~g_-9dz{QzW>-nh?YbgPX@MIYIAJXNVZcs+sEh
zD*fo`Q}AyQ>zLIf*XP2PIXQCafX*ecC8eVQrw~0fUKJo^gZxT6?CKpGUdTJT5UR21
z<#{F#7W^mECiij=gHpn$28+|u*~&cC6{+p}4l?VQ-bJjYHvbEO
zp7b`<>`w|n$KYG)z-p&+9XB7Y+*ndSeZxh!Q~m{5sbG>-iN2Y6?}s
zeSWxV%4EGruD$N1LNlzhO18UJ=iKzwAP^P1F=3=o_w&+}!w}xqn9sKO0EvX%eX12G
zE1MA+5hm#tPB=uv!az@Ki4Fx1)JR{m2eR<)5&zkt$G7y1q)jnm>4+)wCVqV&qGs~)
zVDl;?MMq44SPD^=(^;?ne6tN@F~&^fp3=*W-6j-p(C{(t
zYjmU^E~N8GFX%#pM+?rRi?2IWxkg0Fh*
zhWgwId%;NcwEc}3n+B+ifehh|Tm7T5qu2To8GAY^_rBQ3D?L?|e!P?IDI1sfZ%tr5
zNG!WhOm|9m9ug8`Ed0otf6+mWb6X_yL^D#_r)L-2;R`3ZAa%`rj{g6x+m7GVeKLh95qqE#K?OXK?tw^(*Rgo^AXl_U3cX
z(?XPqN7zhW)KlP)Z(f6gb%cG0?R8>XfnUM1N3%T6Y=cU6`SfkV0=7lfJvR;kV?0EK
z(oPEYkNwb}`ts&y3dvO#$>lYLK?tsqkNC)VgG~Vo^#`~iN#OFsv&`PFMse6nuM)D=
zljgyl4=f!?%xb!6&c0PgxmpKG@uU_lx~($SxP
z*xown&=qs$3zJySIpAV>=aG<_uG2c($E&*?G56|9K+^1Ro)ACHYl6Dbv94cxi1+Au
zO7xa;@*+ku;2L>W12U=d(_T-mcQJenPDHBgrV?wtWcE9w&P9v0Xp6JorXn^7a0etaB%1F%t*Qu#w|o_X+82o
zhDf@eA76iFE27V4PpWzC*@B92s76>PaedzR1ZxoQP=em!WPmo3&!Qi`rBs%9Y4O(USJ&~}mc_OFf
zJ0{7^VJj|=dsu*4u}o>{mC=?E^MTTOn^O#kkc_Jqi@#7E(~QBV}_(=esW+Unx;l
z=F$Za(~!)$O{CjMd?m}FA5})G+KA>iS0iZqhW)VHNrBNjdc!F3_IU`8sOQ&LM52z#
zN4$Q
zjAS6pr#t(O4&{h*UVozGjBxv2LB{3oLDm1A%Ogpb9gp{SMCA=#aI1<8)3)0=@gIXC
z{>j>6wBYiyyRlpRkQK^@x0M)=coKms-*|W1t@Z^M?I}vH)3%Q;QjY)&mLv2>(5kBgTb5p20
zz-0vAiH<0{oSTWhj
zQd_JikJWw0s;clXpf{QC=;QUUeQ8>3^YzQgMioYUt>68M+S_5Kx>?gjV<)G+Zs{y}
z*477DE;yD3rZzew%AppPU1q!Oq+_IngPMX3+qU>B=H|s;s8QbGcgs^Y-oPX&6
zF=oMlZe_Cxmmz7JgzT?R3>;580hU_;#P45Q*0Q#%P=N_EMhwK6Jr*Hvr5`U#XNE7>
zLRTX;BZ{M*S{gOX
z?=}UL-$Md@;=HwFTs~aOg9y{BNOpjYR5QNj1R45lqB`>$k^?zr1e-aSL{rq1L3g4>
z0_dMt7t)Q$i(2?xuNJ*hpF73uywa!pR%NenGem8JX*ubgOe%2rwh&1gh)y+2nI7Kb
zDk}A&b)LY@=vD4vg10jHKCR@1UY?!G@{Qj@D}LWlYtuPaYTEoi3I7<28kj~|A$>VC
z#2qXX_uhDwFJ*H)#MENLNwPWU6>Jpu7wu3JgpN)bUR2$gx_9DK>~FF~0OU-A{?I0e
zdj;jH%|dEYDn^Bu3hgYzs@!e#9JJzH6%N>f9?Iww{_*CJjh&mp+pJINI2?^jrj~@A
zQHYfd9;CLKBo^(Nt$!HedenWQq|moH`F
zF6pl1oA0@QHkj%t)&lAC
zT!uK>azViacmdncY96%rkoDTei4o<6%iDGCy1s|VEu@b~l@>YyM!{KwNE$S+=^{^5
zZfW=n1$q66!M2Nk#CE7mWOiDZ;A
zRnlI8moQIAT!F6!@ZN8Fx%{jU!x^}?szaJDu}w<2=$C`<(1MEUCvLp7e*heGaF^NV
zIJg6z8-pV0@oOuIr-IZJ?GJlSKP$RFT=Zc6dq~Sx3sT-|j`@Y7L$e_K1C18&Qw6n`
zlHyF#ir&>1jK9Hb7=B`1TP^MNw-Z5Y_Y<-12($~P(5_7*3cUY*s>>D>crtfbUE37R
z0O#aCpE_#Y4kFXm9qel{Jjnd#=+}{9h0k{$L34F5IFCDd`}pH!+Y)gRJO6&>sY2bd
z>t~qlQ_{7@P5rRH2B_!~SVI^ip=^zRNGWOuy)>owwV)mE9jpk47|loF$4JY!@X{=s
z6Wma4Q)zfP(mALETQGn&ca^=ZKEvicetuIUFe$jnra3tV!xM6_qu_Mb_)uHM3t;`(SP=H*}
z=`JKV0vH$P0i
zik`N%o3Fs+mTN3<8%z_K77|zTd%yO{TgCvEu@;upyrlkN!UUBND1ybcso@Pd)D{fnZUM50fIGrz)Q#nvAi
z)19QS(w0bX1c)dO#sq9aduSeVWfuWmwse9$K122l#>e*rQ>cfp+Wa*ReR9WI-vSV*
zr%*bLD2bl}!>r)vesB)G+hNG5Yc1fvZhgY3;+8o0on;Z1gW!#FgY1Cn5ZLTXHIE#>k<5*n
zf5x9~TqeY(QP3v-uw3Jg=A#?=I5o1UAu0Y{Iw8(B9&^Ey3!8!KtQ~XiM1%I%f`1Ox
z7jEMCEQGqHIt=W39%{sj$Uc5U@~spXIDq!{*5-mgIKDz_M=je-4YM)N^N#n6GaOEfFXNBoFRYT0AbPgp-3N|3lw*-0$!g{Jd(E}Zs7IHC>mv&X3pfP9g-MCp
zElz*yQ%wC+q;!{)U<6%O;ZTI$e%aP*r}*DwazDeC&3Zxxmx8-){~BNpYS$CZUh~+TW}Xa
zTHp3k%#5{>x0mN=>|hkq-?qFz=vR`3bLa0bsCy=gKd+4UsKA0qZtcUoRMqfgFFuBH
z*}c^^#O^;Zc{MX@LT6`mM{wtxEX$o|f3Nm{yl%Z^ojkH$uyeBxSjaJ=`)!fiCcTGP
zV#|8g+<-B6AZ%e;il0o99e`v@*~}0`vtw&IgN~2<=bN9TNn4zrw%%u2JqUbp><8_a
zhPMG(lidEkb~!ViZ`Q|E$jJxd)bOK-J%zP-@qAH_KwL=j#$S9Gi~F4L|I5JAQ!6=7IT9xvCT+hE`=>B@Qoa|
zY(e)CK(4dg7PS>x{bHOk&{Np~?&kVCYjod+HD8ICgfIuAIUt;CUoyQCeYq;LAZ-hETDivOWwqTQ6R{1?tf
zSd)n8?Ul6~?9Cs7BpT?d8;50{d<@9q$v>G3*~PpbkVS%?sfHf3aajk+Bv?oWT2yPB
zP`*t7CzC2_$!Lj$9?2Pw$G9cFzYYT`{mB$qBJtDf24|l)cM>tl5Ou{u3w%ftqxQ(!
z>#(r$IIKndvuVc7RTw-IKO3^a=v~=eCk)>6Z_v2ablyFI8OAmN;6Ha2i~MJ(|Ba@z
z4v4DzzP@yK2@H*NcXxM5cXvv6NymtEhe(HX4WV>*m!u$_!w~QIe1Gr%L!3MJp1b#1
zYk!u-71e%ohQ5ms7CSTz}@Z$rLx->f=YKI%f}@V&G`y6URwR&6iSx`
zW}TQU!HfiN>)?WJ>i{gT?r#Hj-rUW#0Q+QhU7&nKP}5Za&oSW;elDtWII=$MqWZ2>
z6jrX2y8l#1MTjrbYyV|S8sRc5R>`OoC+nI5C!WB22UB**vZ*Ht!Vn|Kq|=A5F)k13
z=R=nQ=@*Xw%19DuciAr>tfJz=GJOBch5jH%ge;7Wk;K3g>0M=_Y4L<@g;!7Sc+GmN
zT8W>Y$~=PcXiD9KkPgv_4nD6ZeB+RJYezh-_i9mp>MbR(GnMi|Cm9(=4Y}hXaj`+W
z&3~$973
zJzpTAyITO)0a33+ah3?E=+4TuZ98NA6K&nLOTH4FCYn|K8w7xld(v`Tie(R1B-73#Z9KgNWr;f)=TuB#r6-qE4K9~3#
zN!d<1-DqaBUnv?fj&wf`bdcchIh|1yo&y)|In
zP?5=b)!G*%%DsJ)!F)YsAWy0O!bOpy0=2p-T`@KX&$?e}H(P!ZolA5{+H!y~)O_;R
zQ6Gd|P0on&dT(IXcErr8UK8{W)v$ou4bl^Cb;+wZ10B3SPr^*~pvp(Ed;HMG467_l
z^iZ;*@gKfgQU$p7^gj
z`qqa5sM+^bgB}dlLtQwP-6YX;R|AgVc!zL#Wl(g5iYvkCX)7Qd_Y46&bkP;sjt#+>
zZddF0?8&%1{A@tcC5(-Rx{|*TgJ3s@ysptmcVZkK(WdazfnOaK3Oe6x%0{c1GgASA
z3W=B5(6@6loS(pg<{-eG@&!`ZNr`8~1aSNUXTa=U^9
z6WZCx=jEEnTSzLn0hjyM6W?{0IW{YO9q$LgRVJsIAG^Og!@3}bklfgSI_ZPHRnK<|
zcCc9DpgB|DERwOl{ad6E)qxt_x8bIwQ;J3eqDTp|j-|sIq`uHg(8d97ckToUVq8i+E0z-tXIt@l%s!h(D>lZ>FdsuQ5>#!7c<>Lc
z=;?=bGzgst-?R}N{u$Dz+{40~f9^lA$WIc}a;ib^dz$NhR6$h9!YQGjHn9%-GB4y~
zxhTCUCvLUVEvGZ+JqtCrkt2-$s&|6`?Tr-M10vnjCB$VwWkwNP_Un{X^6~-VYc6(W
z*L#d#Z{)i-F_A3P0rXm8I>Wx$RP4`7n+$&Y#5&~&U>eVp`-D8Vwg)gL^+SmFBi6#<
zlw62U=EqAF@x+X!#U~*`$5~^g@d&Z!y$}N#&9{k+(eJqWC3+LfQ#s`+%${UrJt75j
zYXfeYATpDPiPnd&ibVfyLV+R^aW{x74s(xSQ-ef>_qN6>0S2GP*!i;iL=O#?g<nw$fHr1
zjCg?cr8?5B=+U^V#1~7uqtusig#(Sb!kL+{y0N1zqS@<`e|P0$X|ysJ&EoV&?M{$5
zR~nm)%R%-2$scR{=+~4!;Thqxehpe|6bIl0oeWibz7Se$8BnTnoZ
zoBWOk;lqM~vkdCP3yB*s(c|0;`|C%___TXL+R*2F3=Hg|0BdfIZPZCQo@DczElqiW
zv6ZN-4FP1~h5(LB0LBQq7AF5*@6)j@6B=*hd$2fI
z^wgMkB2*2OGB2caub#E-lDIKSro*nM;h(xps^Gs2s+V=94
zlMrhKI8(SZ!nYjg0^bM6I*U)1M>&(^&^cjWm|?|E8K@i|`v~kziatv%r~f&E^dM(F
z*A$YFjtxL^@Ke6ajoa6?NN(}5fF7(Q%v9oZx`|T}zBJ
zA>CB84c1Sm1oKQh^SPj7vrL+Iu7o7?jv5#IPKHBX?i6V4Y*Ew!)9&zditmqSz)D-Z
zx#9YFJk9a;I})^rqml}@OsZvS4jYN>dbEg@0_ZhJ!%V>@CQkN|_He&Q%wv{r+IKL-ZQWzvedB5_E^~|9$Y!x*>GeCei>32sS%RBH4Co6&|EUU0lbM26W
z?mgMbH&g8NjbaKBBPDmSM^&3LKWu9;9goy4L>gb6Ky7uCg-2~E5afr(;t%g5fZDpD
zeDQ@u=e4+Di+c_EihMEr^yC#~o^lnb?G+wzO*Yl`FS<5SY(oU{NKfxla65-Tm9v+?
z#G33{r40Kox?|!~v+(b1%N>i;{Sx%eYB9N>`heB59%=*E&&4!$lCmqE&IN2=GAEBA
z)?a4s5Ltq;zrf9iVA!6+sy0#azUy)F^ygQ_?Ksg#9jAy?K_%}-)&;#|CQnua35Nw`yoN%5oUc~Nzm9wXgGXAyD^Zmn$
zgVvWLdHDo_J_<9AVWgoJd}s^t-prbNW`#~_uk&(k(|tahj(xXyg=ts>1%PrF??`*G*f&tTIgz7xvYm=;
z5Sv|!kA8JooFxR*?HwCT8^Z+_ps$mo%(s37lY>b`f*Qx7N}n7Hirs*!rx0uI%cZp2
zo-c6JOh6%r%#o7~^UMN*%E%!_CiUUdxe{5@A~!OYKxCoJIQ+%7fy8|C>!9GDXUVv`
zNx#e|ZyFvQzg?JCKGZsWCN@ei-n>y>{0U>GYnt6$ko$MJ?Gs>eFRHTP{zH1P!w-<+
zN-Ge3fwxk$Ona`xmYas!0ux(Z7&=J-<@}_L2|+;`K6zQc%c5VLH6!;?<-*PTE1oP7
z7?S^tV4W5w26GHUYw|>TV?B84CEBF4+-R{q3cTdLh3E!r9FY*loxVBQp=mopYc4LJ
z&77cAG@NyDo$T5d+00n<{71B`#z@4zzz~#&H}a=6YUhjR4-?yFv`$6J1`E)WGiL|4
zf=B+_ny4Oegi|v@!N6BUeMrt+IWDz_hgF@@ZDpeL7B8Ah6R)}Wm77Cg2}UP9el+X-
z*H*^dISFwm{wyB#GFp6H6V)};j18VfK0WO%jAf>za$yJzt6^^3rlG|Qoa++L{!@gnl
zpFUK8=%>be+IZI&+ZgNDr*t=a?yPYdRA2*^l}KCuT4c4c|9!>`hCJ!|T~52N3y#s?
zegqZAQjOq!q{uF7)@I*C!I-R?UhV4V*89o5Tp2>L_H_$)RYl2riwlpu1Afg+dtLdq
zf1&nHZN3c;7|+*d^%e$sMNT{H6Au0Gn}3E4m%wGF&G>;tB@6lHK3t|(VT(hxm~AE-
z{c07V2O#X53S~!ev8iy4<)!of_WBr$12H#nz8nlFNh0bjg|dv`WvV^9vB0AnANQZO
z?6X6$JTEbkq2kfc$h-cv{1ep*E3D=8CF=nmi~tiid-D{&SY-X*jn+6D*EIS!LOcuO
zJcN}u^c*4XQZtP*@FzR<{lBYsu0qG@zk?7uGk*SJ-DRctQf_yK7FG)5_Z@F%&}g^g
z%|W8DCpT92VQix>|1Tb+z%g^fT`@`4_X+-k=@Fd_#n?QR9C|K~JG~-144Kmvb8;^L
z@~~&`o+!!X_LY}|9c~Xb5&JgEa*%AK-wnES^2E!k^Hg4@8j1EX{+X%h)e^H`UT@RN^Y;^X?hn%+
zr}VYKZe*wlspYs;r668vA8)+)?bE0Q(9_ZZ;Bp=XI2|lT4b#e|3r!Z$N@bF
z`uP*0(Xbjkvn1OR=`2^CXLmVdI6?rzm0rSVtuPtf{
zIYj)`lFbfEQxwejIN5)UoK!UFekhGioKbV)a7s}V%p!hkglof_+sOr_E{&roY71uI4%UWq8&530*!#dx%<+jmh7rwTd-_j@Q$eKsTb*wfM~h!D{vDE6
z8JRNuZ5=7WX92o^k8Q>7Q*mO}JXUcbi{ldCo3nvWV{tsm$l83hkk6&}$kBIyKN-K8
z!R0fVm8snc&J>SI2$VlJ5vOx6A;-Ze-1cF*Wp105=&kjxc2&FVYN3c4a=$-R7QT01
z_$$EdID@YbUn<}5u7s)r%MKi8peZ1DIaq~{vvbB!K5aBQh>{OyK#%M#ol?@^u7jU6Qp)IJmy%gVU6TQ})ioX$LH
zL{snKi8I#&yanf-S0PeQuW)B`E8q60e-9V1&MkK6oYgBBjV+sc1IGktn{pAmEO~Ts
z0)R&ei{y`%AH#X(j7_+=5Ky4vP;%yIia)Pd!`jy&MXuEa)vym(1LCT;}p)W9q+WM~ILibcoX
znS|}K(V+WwN%(@|_Yxv-i$3UbYLtL?L8Tmft`qyycGw}##$dL0^wHF%uL6(7&A4Wr
z{=@$k;JoE-0-okk(`5+vW*-MUo&{{=I0s?W+GgK5K0u$H&~~t+&ATJ(1eiT%qm1-Vb!2#xSwX1>CtkiwZ?35QW}%
zgJD|(o|c6!JYrFhk%E!Xu^3
z(tnz~A6`G3nOh#ib@N{f{UD6)fXoP{waI9Dl}Usv=#i0x;xEg)8soNtb=OWHneSG%
z21AsvDHW4k7$=Q>>dl}Kl)z^fA&SaRB|z8bemMvW&k*lycokfNv1WL<+iUN&{YmPu
z|8r}Q6hUhBI~b;jQ`>AIZzim*Q1KY@EBy6~cDPf1N!Fz-+?s)Q{b?kRMn_Ut-S9V(
zHBV04r)B1`Te_u&n_VUWONP7zCNj!Ch15y=deB{cUx~N_fzAcV*)*Yxh8Zd{biV$l
zTuoi_-RY7Cq?W(w=Df?rb02kRWOOsZ8ZoCNJ|W$Q3R{pA#fR8gIv2%prKn!FWgszBmE+}X9{Rf3H-|OeaJSVxU*WCr7Ux+Ml(l%Sf
znpwkjd!b9>U+en)|I^`JU8L
zn;k=i4=$37F6kj(^<}B8FNf&saw6HM&~ExS((h?ICIdet(S&CI8tB0Tg^mNH-wH*{
z)(RKQz0d4KQhE0sH^={Vdv0VZ{JVs(m4r}V0ySY8;ptMY+Zt_f<4~S?I6d3aUx5VZ
zQ{EU&W=yXVy*?dH|3)*JPS(z)h!M69Ko#!6E59g$;ZKXo4TVoJEeW2X_V%3XIg&c#
z5%(AC{?x^HiteAI+KqO2h7?#(WA{)qg>he3O`wC}LK2JD)8T2&&1CfhtDuwQum^)q
zB^-2zus=8}vB^VxV))gUp~U16N$B>?SqUy6I6=YCQzFuv0X?lXg2*j=ed=?+ss2NA
z2@=Kg$E?tIH6etiATmSSeq9K2eK;m~Hf+jnp4uLc>@p**sM0jb9j=%&c}g{{j0|ub
z)vwlMmz%4M=d{oky9D(;oN-Z96`|R3j|ppGVZBj^+^gH0!AzT>K|;w}MU}RB((nb*
zWvx2{?#LH=@o=*Xx+O@@#6lQ9vBhj|BME~{*0uGyPHd^xkX^iXXM2CTh->a&<*S9U
zK75Wds&M_ALC?x9`zdhw7_!uMOm^`mS`)0cJ%Kfg2>kj9uyswf^2C9&`RbF;Ol#=M
z*VdyF`h9J3h|Y?1WRdxDds^~M$UYY@$_V=YO*9W~B=5WsBc$-4g+947r^~hL))UeH
zBbTl{H@mS=;G;-N(~cXYv>^oIClj!AIOd@G=AmJ|Amn^Mxad2N;=z7sbHd&{XKB#r?U1
z+MY~Vwu)W_Cp_S{IBGnx)65GTS!d{P!Y8`b#Os0{=BQKi;XR%2*=4aWCA|_nT6q#{
z7=fECzaZx0J@|wEOKjBhqSc#Tv2cz8{5T_oJ$n~
zqM&M|&Ej%yH?dXp+q$JUB63(Xtj`^8>56|kPInta;~M_HC<4RFD-EYY28oKj7**D!
z;GPGhcaA9>cT8Vu?wyQYYLFM_kc#&(V&%MSyX>vhpdes9{{c;hl4Nnc{XaSNj;U@r
zd8Fvl77j*;LS7`9pQK3Q>}e)eP;AdDf+*hFcvM}y?p}MG%7x(m2O{7zG`eof(pDfL4EIzzrTkUbD?~wI_FQHh
zrhD0%^0V#&E^&z`ZO#|EiF45*dEVhCp9F0OgmSm$^4={{H`!Q9fH3NqwF(sDYkXOw
zt9wcQeT95nT9x=${V<@1y{1)L$eDv#ucCb;A9+7)ED7sU3WXc5VND;Alg`ef@uoky
z$m7x6z9WnIOA(@w^;|9}lE=(sT=ogKhlHg~9MSdyQ~gDcuB26v8in$$d`XaGWx0no
zlmbA>{MMjvbtO6J@rgAp18jdCwl^xl@6E6{LK_NUCWR}x)SuZcB6Gh9%a
zX-*P~b~@jd)kLNya*Veb-G?&;=mV;^ZMZldzc|JqLH3m(#+Q>A`9w-@3
z&H8P16-NVutP}R=Q46ua?;TH-6A`4j#$c)~nn~%2QkYR&nSd`ZBz1OFE|bBIE}v@M#&uhAO_<1{&3}(6q3GBy_KZ12x^I^+^X#+rB9iZ>!Xs6
ze_FRWtZ^bo6qNeY#29=7>~n1H)N@S8{v1dBTQyCzT)3Lo1VIhHRSe%pOtUO#mVzq(
zi^DufnhpgnxM6yDx4|uL1j{E5nQuCEdsjL%e2QOZdG|f3%C0W=u`T5swu~hfws~Hv
z+PC+K!{8~b&|f~n=L&&m5X<~t&Abg(zQ39RqWx#gTH)+V3cE*MAJO(vc{EnJ)=Kwc
z^*KKtea1%A3lSs@!8{@}euHu!YNQ45*_}9Hc5Hd|=k=e6??s0qjKgE&HxvD&S3hfB
zBy)Ru9t8WW1DYH?vK_e9&U0LpYn#5g1RSXO9bo2HJB1IyYMo`d<6*rNPEp*eg1@x%
zBJv06(ambehXsnfXecugFZsChgr`j}TbDCP}TWX@s;M9KwXiUn$
zVnmC~zt1r`Bd6F$iteTjO}a=o?RIj1g*OndiSybS9k(vnJlHg}fc&lHut^@VkSKuq
zcMbgZEXhJ{XPvt??|CUUgG-U}uZ9NK{I$L$`!P`JFH);}d7J+G2l|Tlbtb>m96A_U
z_zx28B*|MmJ*x^|Izz2IIF{btw-0w7>y!LAadI9~EoA)A!HUd@zNpx7C_k*MNzI(P
zh7c$OPD#v^4ut*ywezQ^az;<*dN+(%Xz7}Zz2Tg}IA4CX6a3Kh_~&~TkH4oX5;+;s
zKlkpMgXfofKY{tE@$Tw8{Pu(a)a%(@#W+nyFT3;88=
zLPGo3!KJ~KdCEZ5&d9DmI1M`q;osd2ZAYB>Mr@l@vW3!-E}+#Y5qq5j>ry)o6lSGA
zkNX!N+P$WHUV278gZ3@|tfIDI`oW^X!ND6o^QtmVD@0Dl%IVNWRg7Ce7X|yj{t@~)
z31WS-8rg^KVQzJClP1F&j}Q8!L5<}fR-n!N|BqbI3G38P1et;@2TNviZU;$xdkneY
zROJ#DGd&f$a?2nNq#T>ii%D*p|NUjCi20qRrgcA?T?kDa!#G~q)_(-{4<6h!sCa_5OXRH6nnl!zH7%7ky)17GP2l+Nl7w9i<_wfT&JVH&)tA2#R@)-$vcN;bA*wTZ
zzD!7!@hRAgHpI>@isYl^@y3Jy4@#EH3Wa-ZmWiTD^Og)&5l1YNj9**&MlA=>G!Oo0
z!Nofb*jN9E^MlQr*=lMVMoer&%7ykBp?&P83$s0(pI%UeeB~eS3ek_EBbrD!Nt+lt
zL^J8Lcl$hv!~d?A^g;?9&P>wAjqD=Aj|0k~yE_zs^W&f4Pyz>BIp~Bo4N+d?e7+kD
zn0d5Rt-)c{oy4xOA31>HETJ?=cbC*@H`thT<^6Y5!^KvVgH?3`J&_Ir#qp*)^?lDc
z86NGA{0)GWdYPOQIQoDP`7o<6-z1a9s-fX#s&ExE)5=|X+>JMVYOuGoHYxC<~r^ixxI
z2gb52Jug@fpE_jgD6H#3N1s91?SRLHV*(F2Oqn}9Wq9w>{wK>#pK;b-mYfJ{0J{bF
z{`e^4H9RWQzwvYLJ)9&1d65LZ>qMlMzThq2e(?8~#cCq4H1-^G&AZtm(_c@k_=J=z
zo+4#XJ*d+BZ+ZsxQp*o;7j7AK7sa(KZeJ&E5n_h=Ow?W-|3f$4`%qu8H)tNZ
zI8nd19+56T4^`*}Ky5t?fI8ag*R5FoBydp~;;oClH5f;*aByVV4l}BD-;5vx-Ousi3r_uPVYTaY=qJua6^!e^z$aTK`u2wDt{B&h^lm-(?ZI!V
z9!`vB?102=MRL!u(1{36Q^)MU9H|oxn~@ZAD3D||u^H`6(s1uxOG?tL?G((G99UK!
zi^ktW1$Zi-v&UkNR#toc8{VsX6Hw0?Y88HU?zEQ--JnjF>-UyO-K^Kod@1o!lbA=V
zP%w0n-Q7p6ok}EXb&5>QI$gt3&iFHB#YIx|><0mTf2ykeVA`$fiCUaOzfe4dB&0-Fq+lG`SM~R_kT_Kz6BVL?op
z=BqF||CombDQmhquZt~5hk8fG@q|YC@Y>me2k8WZM4G-NajT`5f01cN6
z^>8+@b3vZrva!GP@yk(d?}f*t$}u9;AgVnWW5J{V@nlS&F(#kN3G#Yz{4(b97g1{q
zbM4GDXg5V@k=5nJ6t|uV5W8WX7mh$b!yz-m-%>SN6Yy+vJVRIZx8v}0g#*r^q!GKo
zH?18n*|A6Mw9v8r8{a}63dzP5=a71uVO@6ecLiK;;`3z??(0#d>>p}3`&Y@-2gI0a
zNJ1(gvJr=ltPV^0eY8wYhXVL}SXXIp(^xDR_UvYd1y{PqvKvbrE*Q9=p^Yv~j37d8
z;9*mWalSE%^G7!aE{CNG>$AzAJGKIzLWwilXqBd3%YCgz
zm`66$0O!*S&9cS2-|*TX8shlgET`5fGV>4aVxErntgZKYy<@-GDXnhb;dUcFzai0(@BU^ypc%%Cwrcl+;Qd%T
zV=f8^$~C53RHqF0W5Ml?p_0syjNC&RS@mz};7>#()gaTCB$RFH@2Z$6+_9id?Tta4
z_=vDv3wN>|mI4&dO{CuCXxk}ZFYb3CzC@tS+lo;*c`F8SBl)p&ad*RX%el79u+RD^
zJ>=R&JpT%bLF9AFK+k>Hpb#L%i0CTrbfWwY^CWs{khXN_i+d@rJ~|RYC0$)tdSZIwHry(%BQsH$%+IsBi
zk7)eo2yX0R$Ol8RHkwQ0xQD!CMDP*zpEw$f7dO?A-Ve*6pm@-Qooc7N@_yiV!H{2H
z2M2JgAe!Pr?K@)1zg<}w_5jx?$LO9e6-X`l4hpWKVX-rY>Q7xjX$Zv(ttIKcNTEf=
z+Zy@)(_?l;k4wV-{gnc98@%7IJYm#P$ApL6>w>V8rQc1*5K)Zgq6=|^mQ&1y!Uqe$
zPA8ihgABudVwbot^ws^jLD@T_g;QE~{4UqhqQG=jdMJA2mTrwiUMIavld<2k3A-{<
zLA3oNI6@BRssjy(FcT722&aaiR!zqp*+v;2%m@xq$t+r3t_LX&~Zvbv$wU;&Rf(%dkVaSsXV<|!6fA36!mSTolQ0v
zG*ovsWtumR*KCqfH>dWxfduaG)Oz&A*)8F_hO@N2945H)BF!^jH~h7^C1TTrrK
z!1(jmj!-F}FJn}?I)y}&Ir}*ky}P>H_Jx8d_;lP_g!kv*tGD=Vlv~-HA
z^R_LCm%TjN($ZE6^GbBs=E7YlYsgWr3ud$~d3v8iiH?+jJ$u8Z(Se|f3{tA=)sINK
z9R2x4>msWK(cw2pHDujIa^K3=b82&$((_LDTJZ&8Uy4fKY{v9jPe9yxYxi`Yjwob=
za-e6$>l{}`EhKqAb(4Du_gFlAWV&Q}A56GFU(0yzUgm+&vkltsy@`W5Hm~+=Z0dcr
z%wJkfC4P+kmgP}=V#yH*Uz-nCVDk@Vd5ZvjH#tBf*>>Zf&XWRlygt}#`K2>9-Ju0y
zeOaeW`n`4d7JW_xf#J`6c#IznCF~e=`EYHck~(P}CsWG9!}CRvC^ygru#gznAct*H
zQ8`BRr$*UG`m17+rj*8?s(#A~5m&`B%%>&E3&&WUmYh|ejrxEo(G;O8yXw)A$cyaK
zLW*U#)V}9du!~)|DeqI}jKqt28Ojg86u|&HD5OZQQ#2aU->s`vtwz_x1SP4BSz%j`
zEB%rQEW;5QtC0}|&Fn)`51hng3VF5CO)X5|@efJ<^PONHNsw#5O^QkBP7JrJRB{D!
zWYPk*;z@lj-T|q3+8RM7Ohz%rqF)V&D8tWqcMXo720n&8(A3Izw01=c5bc7N0K`HtF7u+o(XydjE#^Ig?k_2uE&w^7YP-V$@pEX!@q|
z@EcIxtL)l{I%jh|t31i(CN!8!vrs72*sO($0u&A^Hlb~95?s4*Hkc@u-f{-aEH3to
zK`8pzx_YC}>*_pMl_eUkXXU^)T~^^^-oA}=!0NktDU)wMU^I>DV7&?C>@#J4X5_+P}pm7La?bN
zY&Cf$&qnDE&CuW}x$w~giu|4P$j#&>-8@etEMvUFjPla#dg1RN&|fafez3MSB*t_W
zMD3+OIPzuj+#JAMs0SN2m1oqVO%V+lqXB8sGl6dfdReDF?zu@kOrsIv^?WN>Mnxe$
zXgRUXrLEfbYW0L6bUMPE4R9^#tZ$c!r_sFWpj|IkHJiPU=-CYQav{azIJ5djyDx+8
zErNzg_rjC2j#h;dw3nNQZFg?f)`LYZ(#+6t2?HD6RqlzmdiF0VFBz@%WX{PCM2c>Z
zB9}eg)8-h#0?TWW>F3roD`A*c+6(>>76?|_k%w$SnK$@
zec5x>_eKeu?S5}6Ky*0f2yJCV=A=|UT~v@-0dFXK5wXaA+83qSUo)${L`%NIsA~y0
z#PP+eCh*=`!l%uVTRNYo;+6YzOwT0@@v7CtQE|RH>NZ>M~>P3{@HJ+L$TG%=2g3zHiQ+8TQ>>ERu$pe2T|<9$8UG(SUELbSlu*Ax*`S51z4Pps*?*5e6>)f
zoqr8O{^Qx~w-0083W&?!MJSUMTY3&*KY?QwbvUQ|zS#(0o%3#JP`7mLq4jPhP8=1I
z^U^waGAT5;&gVK>^x@ZV>ik5HTCz?-SZpSS?|jn4_ao>DqxVRS(H|+GrmT|@DHglo
zFK9b1qkQ@}WL!&3Q9~jrF0DuGf{u@B92%wa7Ia4#iIN-%~_%KONVPF690_!I~v
zF3H2bwfrC*?A5(8g+C)yWfrYMBTspw5|I~X82R@}S6e&IaT9A>`l5rC3+rC1qY{Uw
zkN$m?H^XPCj9jUvGp(GI+7Y6Oq5v?$^)#4$?R^j?HFq@gB&z1InRZ?GA|}r_Dd&||
z;oga!`)u6`A|vrlrPp_J@oV;#59|n#VAQzWyTELzsnK<`u7N7REE_@lG+Uluqe3=|
zRylxOJ4Cq@rYbi`MYg;Y2{^Q>To58H#@Pnfxh+hv&Q<=N_6+K6EA7G^tAk5-o~TYHt@sS+3<>VP3#D9b#i}~h8wJ;;M`Y?}c-EY83=bd(65boF
zJ!j;1^X2Z-tAq9luHPoK}Fg
zGjradQ^IOaybTO}ZGsy%IeeTgR$L`(`RQHYwM<#Nd@uHgIXrlIK;e3+*~<|KsoC@G
zpzQN`cXtZsV|mjXaT8K?bgB_p{WVGlRrxkl?sdl{xV{^YO?l4uX4FnxDQ#4%0nHCJ
zI8lytiO0;oRpfKA4g05>diXcKVJL_wKH_v~{~nJPGL|hxg1)_!+fu9Zr
zq7at?cJC4(NQSYOUJHEWoJZ{3!xXuDy;t%iwa#Ls25MuhxWwM=b;<&Oa!|3w22IB@
zdcTt0aH!(9e(Al-3CmYrF!C_vEK((mJCm;1`Det61m&{EQZJSNqSX-&SkA
zbwYBU`yB(VF-_E`np=dWt)5p1vX@fEF;%9&)bFmKAgGzBPN|nb!9LLdpH?G9^w!!L
z36n=VRcOf2TT0$g6**9hlzwSE6>AxhU>IE1+_>mR$a=ZVT%ga95ILHe<>NbTwe-%
zbyvvbxY8Q8(X@#Kh=HYsThsjuyhLO5Yh^%))iW%9#3VrvmiFl1#zo#9goMP8!J!|L
ziz%B>(eKh4%TAO&56v1XyvB2l>+~=SE|-L_4-Ff*z7|j(9Xnjy%rn(WNGNyIg74=x@vT-Yiv_p+)zN@U>Y_2q$P>A`Y2Av>{01
z(WXnEnwtWW_$}qzw@ppq&~Rh(@ibN9zf6+{<zArRtgO?!-DW+FndoX|n
ziu+EO)6&~6oF_=>HD%{?L@Z$9=h3zgCI&L@sJrw{Ed4AC&Yw~1BG(q(Gz**W9)$uj
zdvgQ34>x>^+Z}slwtWRpAm6DlmcAiO-!i>N-Q;n8j2l1@xsXioUIM0Bpw0Yh#Krql
zL5+{P3q6<5;mX#q4`NhPeKZ%uR7tdPq8edPNM)frs?jH`OdS78mn6$=c&cDmWf}J^
zRvl9fSu3)kY$YPKq#btBQmNJvZn9mSlAq>{2OMb$iy@?pdTx{m4{hAb4vMl(ErwhC
zR`#0~j@FPEdZ=r$-(=y`cTwv;D!kh~@|r#x39ZM}F8Gc*x0w=k9Wx4cGnSt!tlr#s
z5O{4zLwR^e<1XCnn=v@+O$`g;$L*|6&2E~p`>iX3E-vBfJ#+VX!T#(44&(rCO|h~
zbXZ?Ylf8bzqRye9hgwNddz^S5g}`{Z7uiAEk+EZin&LtE#TWi~Bs1!gGM7}hrbyJ>
z6^niyhk_v_@xv1>11lkXbX)S+oF;L|b$8)i*bYn2hzIprrjhs9IqySAfVW7qZ5u?Y
z@I7g%N2&KG+Q(hnDmIU(RSA|;r@fLFHoT9~?EoB{`iUp8x%Y%ZrAFD1fPOH0NkAZb
z&d8SK^=1;l;`Vn>#dgqpuo&nw=#S9zm8o`t6c~&r^P`Sg;7#>*Gg&GmXu8P5#aKrn
zxF>ibM>vxvS?F{4t0PNaDc1k^2(o@>%$a^Q(5n8ATGZp}JZp`5lzn_+7s;uNrzE@b
z0D{odm%JYr#+a)POzOR}Kc`&-(&Lh5m0Bl>B}h^WJW=|?4;?Q1D0cc2ioEY*Bi#^?
zHLMzTMcC-Y*$i3tY|Bj0xq~RaL8XR7SgB%cHx{F@7_lc0v8Pe>AC{|Jc~|q6`DS<|
zH8P0hyw+KZSr-1GQRNCBamI#W^=QmuEg=#vVQ?yLwR>(@Y)8w!Y{i^}8HCJ6IAFoZ
z_z{BGF+mP5`dB_GKAKvnzs`+3&muWpX1R_x3i+Quc`qKcWokQB@Uu9E0(yG&(7=a8
zuDb9G`K%KYny6B{uJwyst=2jFCj444>eG;orPbGtG}5d&K=oJSP4y}9Dz0C`7Gp~s
z4&=1MdUwQ>eH^=#^e5~zc#h}}9@EkZbamf58%Xw&a#D+-`pY?TwA3eWAI}-87%tx}
zk$|o)57>wgx3toKIR!^+%6Wn-bIkSYskAKyD@qoWHJUG>`Z|BRee@AKkh?u8+6VC(
zLn!1qo{yzD$@iZy^Da2JXQDtjQ#wT;qM+{liU-5B?=iEli2a}e3QT~r`vuM1c9Ko-
z#^?|bD~8tTbPR>`T0a?E67n_iG@PTKtO)Vv#`&L!0$bB+MiM
z)R{4rj0tsGU>{Bvs=H0gnROp0H?uN!sax^^=+BiO}1VmyYdTB7wNK-_6_f#!HS2f
zBknU3Idhib8AazZD20rfUx4(PMVIe}IdMG?Y^k)6iWQ3fPsqy^h29?d`T2lP#}>|l
zZp;CWeNf7LIdVp%!V)xudBVAd*o-B?2Y=Xx9-r~q1{xbnRWSC$IXEvpABD>xGgZtL
zcTfq8e=S%^Yj5FU&Ak>l<4rXSSM0uO^#6rF?x&}KY^$L9&Mv2)(BJK&6hWo07{ltM
zonUjtvX&l_t1z?rSf5pS~p%>g7YUCyEntOez`=iTR#6R+TY}Hmp47r}^KOSt+2q
zQRr|q-%;yzkJbDytQq0O5{V6jbe9@Jo->%l3)i8&L}>C)3}CDqd}BjiL$!eapL2Az
zrKyAi3vkA6_4Lb!M;hW9_-?OqA&!>0$n3z4?jo3H*be4mW
zgQCNoHGdr9OpRHj6o?LPEbW%tSpg+d^#Y
z==f#*JfbZ>VnA|@Ceu&jjeC69Rkq?esr6z?zTIe#eE=Ym%#vFd5=V9qqxl#mSgxxk
z($kfyenBfOe#qH-=f*Z60|kS#X1W6|$(l`+cYWv=OOPH#TuN~XsD><@0Y33mYEgwDm&Sdb@xESTq0)~sby3!&sh4WaCCee^}zpd;f
z@G|#L4Ds~v77cm=fYk&hiW#l+e%l4w9T!er?w6Q&1|7E80I+54nUecsopw8TA>VJg
zK-=FNn#BtD=S0zx4{lQX?yXuqQt#rkqEXT}F9?>#<#6Ln<5DSx9TvsE742;^Bv_#}
zzip@?9OXysm*ceyWCz86K
zKKvp7e*j5Aw!V~XEcx6_8h64}DXOmi3cPyHXlkzN$ycYx%(+hUdy@I>7s8{S{9WL^
z2o>BDLHn~s$OU8UHTT!~q$`ADu6YG$n4y~v7b{OCXrXwhl49qh3j9$%PaeTw;)ZWh??{n6e`HJe=Bne+m=J+vZI=QUrilsG`OxyG#VumiIC0Kq5`u<
z2^L6W)RPKv*z7n{q6t=XXXqZ>_^ZNQ^WVJ{i%#E#PaHgx^_>Yi2GWFm
zR8x_#!-|eLUA-wjeb{Vn`qECE_wKED`_2=Y-4Mxhc?4~
z)uj2jxqlrwVY(cdCJXTnbL|+xseqo*&
zCa39p4eet8lqpLJ_%;4B>pjpGNpX|*35NP`ooSxk3Y?8*r*YsVDvNUd3aWR|mNbLF
z^X9iT5w1d7l_lnSC-9{r`F+sjIfzV4R|3;3CXl+9-~u(!F^4qR*g|2uPi5&8HQ`d))TKk&nX>l1+$z*m6-QGMBZ`KU>=5AZa(
zZ~TkWuf75QM&HvbYiFVuVD^2|z)vd3YdLVE&-o9bJ~oKj%D;dG=2|5ho*8I^?Uc#m
zb>Mv!+~;Wf@pI$ktQpIper3NXIk0zAnzwEBdL6`g7Zm@bs
zik5u=8t}G6;Ui|E0sn(&aM=?LyaR|ZfCj{$B1hdHnRDj@|3&2BesgXj8hC$g^1B%c
zzl(rN&G8O%Orb%g#oRO7r_8P9TC?Ze6y!Migt_+&Q`XO-0dEWQ9+lz|B>3Lqc@I!@
z@#%;lJmxw71vEe>&HI9)k$(d1p?3~iG4@5|l>C0ry$1t#BEobss)O@@dr`eVYSP(y
ze9%1W%ZQNt842=T(Li4eHk8OuP`zJEZr1=yBritVgP#IjChf0~z`fX$*Z0sjzYY0-
zOf~7=3T#JdU#=rj8+aVG2hi%<-OW39p+Wo<^PUzBh%hWhb#*i%6%TpxIRlZ^2N3~!
z3mO#vM6Ql4Zb6R57n(fY0(>8t744uILEr0Zh^SnI2Jj1jzX3a01A2YAw&w#Lg8(;BIm
zFDp3jq7_YtnBSj50wjTi%(Fh}e~tz*i)rMd-_f+i!d(5{_G-nIOQvNHbE82t^-5
z7ZIe;U~WJ3_mPI>A#$@$(5(JNM3xJk*9$SzEr+)W{W;C#xYYa}Nl
zD#6ZZaQB*_KY<4KcO#+#IpSL=mp%{t7WMQ0Gw1$=+QrVO?OE)J2v0BSk6k6owH%Sj
z2J%VgO7#63(D#{#+SMDLG}a~HW^y4H>dwXnrq5g!dMcpT!(hC;vzJNySD(d~lGK
z)>h8=&UcwSWeNiWHMM@{{F*fpg1C+2z?$9^o!tpmcO^IeUuS~V-AR&Z$-R+qZ0{W|#f&GCai*NR~&63!p-ocknt-*eFn)oOi?Gsi2;(GG;SFw`VvXM6V+cAFH4o8x5gQhZ6e$p;kqsn2X@G9z=~TY?7h
zZ=u2J9Hd&W#&=-`65{(IA}|N3yr1x-v2E#I#txQX70&!2r#4^cbFCCEMP#8Fk*yCP
zGt&={usIS9rYE6+qmVon3Vp~ek+%cpuI6|FIkSPq?&dh3eBU%bQrpS!9nB#pfL|_>
zH{=G3EzI#M@&{>`%6u_Ci`v4ANJIH+G$2}}kT&C87^fYpW-)jnPGG#365B6Kwa@%ioeUWFasGvN1
znB!>--B8?;i|xtv?U{&R?oCeK#mEnbU?*I6Rq*^5ea_js7z`fS0LK@
zxQ?N+#!l{H)JUig*L8_RB80->n)Jb{J<7M4!*yNy`Um*pm%q$DZ`+HG&QV!``)y>B
z=|W3;I~Xcxis5L~VZVnoP!A*Gv4))11#*LTKb6DYjr{?%BbF>cSKlh}0*yM95(i%L5h*mkG*?7BG)UoZd
ziJ|SX3)Rt+RhH@3h;$r--u0j4d^f!ldKdqGZ_91#yv-bYhbGNSUkdg;TNwJDZ=mh4#EQLz?+i0S2TrZ_ai4~L~YJN{+XkA@J<%>Hu3c}%V
zpuq}I9R?E#W=x;P`~?em@`)#CZEYKkZ2xQi_CW*PpO9AIPIKLFNpTZ$FkXrV055s^
zF*zaQh2J1$&lM9U#Rj&*dorGDg~HkT96V2TxW^oiCO25!Y>syz6G=1bD}VR7zmi^U
zHCp>oxj)NDq(!;^XvREJNh#RAjczqj78)IO>d|LJInJr>{{Qcix{fjpUzON
z3zQ~Ug+0JNYhRyxY&K=X
zHMex<)WVMG|3dy!%~Y?&x*5rEzx@e6W{#ys9Xq)y6*9ov
zX6h(yay-}^&nq~8k~t=*9@cF4ai44T$iJ#wzIMX&gEHx?>H81l*IOH!Os?^qyVM*%
zM{$f6F)z2ebTnYgdZqb)B_UzP9RmXc%$Ylv$y2A2NDQZWjV%I#RbvQ+LO7ui|NQ&k
z=^f}N5*>-l4In4u_mZ!zv<|GddCpm_fhAv!2mD~W~ZKElqxwx79LFJRk=jTdtPRaWs)28>C#c&Z?eRw2V?PPI{r#!bY
z{4HkgMqwDfPX21i2BgI(T-`ZRSih9Qtz)W*0Ddm2@4LyL&2E9}$j?dJB8CX-)}C|Q
znR^Qt1Xy$6El6A8)e_dBw(E5+-Vu@eJ3Z&DQ?fUvQ3$mQke1SG&OR6s8?RIR#=;@w
z`#UwD)pg+S8&?XyLj&(E$al@+tK{Osl_HTVkx$s6h-7&Q!RN>~)&2zea5hpLHq^+E
zJm=nx{LNr^Bq4<+I13PQvt`@@$svdGTEFK}U;ZHZ@$y2*!T&7t+d86uhMeEwTyk;c
zyafJow9@i?@+S?`$*uAoEkC6Wa(-k`-l=~$u=V;IB-gJ+i+n6*qRG&^sUg(5iLmxc
z6o8BiU7ejoozQ4RsGW+OXj4ez)PV%ndE{1dfrM!f@_AW{GzHyg=C}nCF00WJ>_tde
z9^$!wk~#Vb;C>{;b~68eg`8^t%g9muZ-~$>G0*(Hxjxa8&m^Qt`XgFZwAz&MBIFJM@~z33;D3j*Uxm}R~LsNe~ydM?07XAu)a^u+yJ>%MShxs
z8C13%%u+;Djzy+2JMh`T)=#Tf=(xTf4ZQtmMc-=kw-jk4N;wy&k+$F^&wbCEaukLW
zSc&|QCLyxzC4nh4u)pfb=NZ)gyx;ms^!-0-%6*49e>)<_2cSA$ZJu{0YKu00lC2lN
zcx(&EEw1pQaMfoq6xQp}XoApf%F~G)$&V+uVzLyxWOF?^vi1bI?{g}-0FvJ4+qUH`
z^CyuXqK(UB%Vf!$bs6|P((HDXDBHi$!2DGtOO~Pq3s$2w%ae8?{<6aMtC^m2-$(8F
z3{M%KN8wQJK;NRAHu6N|?(hrp-}7hWOr@QOTrEJ8snux0W}W=Kgag#B?n3R>_UYB+
z%%irRCo&ZF{VJJ3pK9`Qk&LukU=_A4+ph~i28Vd#^|D^ak?V
ztz=QbMuFovWV2ZYYb!KE9s(b%8iVV)L>+kB-g|S)?Y9vMjhJLDLaT+|ja1#e$hr5G
zf^;t!2^{gql_9;|<|0p=W4$X$2
zVkoXb1E_a}VGmlBbOah?W2mnFMZPBRPl$*Vt^@*U5-W9bKN)?K{mI2VddQUdQJ?hR
zLIT@6>%I>WpOetCc?W&_YbotKokbePcaU4Db~D9Sg58Jwr2enqd=_aUPb9Yp;RgJp
znIC7$xhEoow$uCy`5vB(e4LVq2zXaC_Mm$4^WXb4{=SC)LaWOBRh<
zM;npsC>HJC!bRWw?I=iZ91-L`L~QTzq&)?HP0U*Ko{J04pN#s(@uoaiA#!yHYFCxS
zaXc3Fhj$>t@*4V%-ah{)Br`u~%4eVR5JMFbz2^A`pf(yq^=l_-FPV3_jiLCZ$+waq
zssBI|&l6BPu`;KyZ9QV1cW3_X44Ct;G8CtyiG{a6KaM7IA3#34A@uF8rnFDrMum$=
z*1QD^YEpXzH6Ca*n^mCEz4v+>lO|27NgJy{MS(^uMN4xt?HwH)cEAC2c687-abis_
zK^+HNhX&FZr91j$H1qll5|{yM8_yx_M%y@-BY;0XjwWSOsZ7fjAi$WyaU8n3x|lV4
zHfR3iY(n8M@xf~1;cgVvcA(MC72Q2O%$+@plRy4()^~T+uqB$@1mr3}&7i-xmqU*@lBv_CG0?X(
z*=jzW9itKp>&<{lSA9K%oIuLz2~Yw*V5sk0fB@qH$8qTD
z>}26K+pzyZ2hqNMea)H(YqM0FIUL8KqrHQx#@-*
zx$5dGnKt^-+yev%5FkK+O$HmZSKCN?Rm;9t7PVcv%@nb^I^u~0fB4<+$Yx!lBah}D
zpgg9dm^SmvB^)D!kYoPBaeDs7#ys@CwcfaAp>mcBC>kI@fH8y%^!N2~*ilE-yziAo
zV0)@TOloW8y6djz)|+o;i#c;fBbxhs6bx?=MRhNSMzr0-0B{94r}6KiD8Hwmz;|yJ
zoIx(y^vx(BVYQXMA0kJ7ed-b5=`#1%p&*6#qhN>|8{47?`PTs#Y=q~XkG9j*V4R)sb^5{~+4dV@uvV1nW3NuKtL&3zt+|p2x8EVRL3JU1
zOK$(iau}~j$y=l7>mfD{!KySO{dmJ}-4jIm4G>@)(P!dbZ3@0u76HMkQ8Y9(5Q{`d
zgIqy=l>V;+?<_9#Hm*l|trgqqXtZJ9v(|}=C4#kH&Hw@4l<>yAI-thmUKJuBSepmz#=)zQ>2C_f
zqcVR2X>ryubTif!)X-+1ql97u=RU|UtB@=egZ0t5d6?zMlut6|sAOa8%?*_Xw+#>=
zz!+dd+^eG$_iFhYZv+G@Kuy86#-AhKmv11yBR~8UZFc%P+JM)KgMh8j2C0RysKQ7y
zwzau-722#BMk5J_I4zwxo1VnnyGuDPBQM6(9y$s#_)ejTVCb&;9bOY;yk#;MK2;?JFjy;eW
z7IWXtl=p9&fZlB;GSOa6aX&3@{`aExP?-OgXd~z_a0}WDx)@GEK8wrHM(4Hc9~L0M
zn;Le{!G+sy%K@8^@0CSBur?1^@^KY%QvWIFv?Py_i{Sk&;B51Md;f*zzVCXT69)c^h*2-{mHHv@
z1>kp{bl*dS$(!G=O!bORuOO}6Yrxx(_AU&3&0K$-(ge%;ZB;_9{)#rx
z&7g$@KSYChFGGpz+kk7(?)JT?j!#2=bRR&(>nczB(-Dbwk!kpcz-`EJzm)lLJ|e&u
zqPhTWzI+4vcD+bT_hYne%5`PlafT_^-liNb`VK!u-@BOR(3T%^-|pwYxxhCI(*6gL
z`d;(OGg8>4J6Z$-R4sI&GR~DO2
zNdt@q`VnCW0U!3c{&O@4KY?cbg|HeRFEM*B(rDdo?rA~Vm5-A1UwI9YiOYb$AWfJZ
zEWe4!)gO=+rN#XH7CDZ43D%zxxjM$AX-3*G?+U#inZI9o@@fPAgb3E@Cf#M`nl(UbRa=AEu6Q-15n-)@c$B2oJQdzrjqz{e=B)rlZ2(cXvvHkDyJ{{K0k%cSo`tL~mK<*{0(k0L^Glcx-q
z0r#2z&qUg*|Dml|tY)Jd_zW^jo{!9U7RCBNwS8laIj%>V67Szu=GvBs1pNc}ndja+
z$%STU@SOhvA}c$PGux$sFENxbO+duzVdSuH3BmsmK{+0nUB&x^Oqm`rd0JcyJXz-6
zpP+Z$i+t_cZREaP;eL{>X!YW~sEu@*^ZiIG^&leLwq1S<)vZ^P_Fr-YZU!>%UWGJf
z7MB25qB^oZhJQ52UC1p+=t1r65udVdLU6#%LN)`=CiEJPDR*)JT$fGy69gC*9M@%_
zzn{a8s{K6&iy)D@(43XbJqiP8U%3Dy2xNsj2*@}0*}SQ69b
zIrmZIU-g<#dP^*<8TSx#{2Qv97SEscIjUw;+qN!7gxc0cGdVN0CB8?ZclDFtH=5(dk(EvevT5j94T)a;9(G<1
zB>P~X69&5=-UF!t=vxcjE1`P@q!SPtrXRoKKxz;&sgad4FVB$j>sh5T*Ed7FTVyLB
zS(^}Pj6{r-unq#@8{dR@j%7XLT
zm}4<#_NC@H*Bn2G{BFL3G#h^;Un{e%IeMMhy;x$7GfNkDSeRsv$028N`}b~SdICAA
zhzwYD6Q|cL2XeZRZ@yYc?mNvfoqX
zvus-^W`4Bi=a}P{fq$Z~BfZG1=rwEG{iXhce86m7^pI=+ULVwAvEeq}s2&Q#KnJAb
zu>1R=Z3}3By?|&r`Wx)>Ct#tlNK@xB=vWHT1~}ro@Qw?haWX_2V4EX!?$EF6p1$?f
zkt`*R>K
zMFM@JmyjtDir4e#JGh6!A}E7h5DLizmPtZ92{X5b!@dRc4}i|4u=px?_B!ZY4J|Vv
z(FgtOML<%6u=+WO)Pb9Ux@M8C#!0Z-d!cQv@|n5~gron@-g$>fQDtrXSJioP28J92
z6cx;Xpe`zg6>~&gcNGC$T{o}a=3O_ruC5ymm=orl(;6`cOeD!LGcY-IPp7Kyk5hNL
zx~F?GFhIS}12tWB>(mqqxfBNT4d^S&4O3>r49E*%q?c_t{=4^v6MTk}xs`ccaLcM+rY$wRYN|+^yxB1P0Eo1~sA({4KOsE6960<3F!^+N@hbTARVXVF
z0ygOch_u2R{}gp!b}>}16e2bI*RbdDLbk#!A{{bKC>$ZzP#pwoBrOwW3#obUHt^?3
zdZHmAUNv8fL@7`Jm=J1&U>HX34afct$|p-2CY=c5W=Z%jo`BlbkULo7s$L0$Ckff|
z_+j!HLJHqq1hth=SO&-b9`=|esz5Z6;I%baq%00ug(7h)8!u#Y%W@%pzHD&$aER8f
z1x?cuey>VPcPhVEsc;C^?u!kG-N~=5-*b8q$Fqnd&g+pa{;89Yht8!%FImt3X1$;K
z?k|yva#@DBK0@qflzQnoD-G8Hi&Mh-5lP3V!0JxYq@dHYgNRjM>P(jX7-Go%2V_T`
z9qK3}`>w#-5Em53knF&;goLzFmHBH3vH2%r$eoJO2>I&nY~-Wk5kbm8y|V+c4P;}&
z?|}2^diSNm{}4iXHL~N=F40r&IKD7__$_?dCYd
zb%$NbHwoDV*?-Uw8>oZ7BPzO3*TPY-Wm&?gUDM^eZA~c&F`;%1j66gnMy4TgMT4TAY}pEL-vFy$
z6ZPWgnIcu1a+Z*$x^?o7?iTViYMR7VzX7s~L`qk^5(e!lk}KT>-W(WvI24V5ckhNn
z=gE6pzDloN)Lmjj=FNhs7sG^O;j5=$#f#9qMF?J2kt5OCMUb$)+ByARrNSXty9bmf
z_tg6SIU@C`M2r(z)FPhT!g3|SCQDYm#T(oL)1?%k#Hfg
z8gW*7Ekd4@Ls2(E=)Ob@$+5nXg{TTa2*HU~UK*|RtVN_f*CD$UkMBl4vA!_{AwzE?
z>axxpR4Ov^03C_oSIEYKwFsH~F+y&yMrMVdlOO?h`>-n!!}#Zsop2u^lA0@!a+pMd
z1V*i}Ph0u?2|}obBW^3cAoE#?kdWjkd$|Hc67~X#U7E^eMpv5}es6v2E<|PbfOY@J
z2od}HKg8uh_t1#NSVb+Y^rc0M*d%uAW|0~c5s(lzk`T7jN6gL#4ix3
z;dm>3&j8=D!p=vG^1njb;OB_M>>@<6JCXhvD>YqIeS`LbY4e3R#I2^%Xfs39-O2AX
zRtTAz^JgIxTbEnpNfQF1>7s5d9wUUOxvHB+=bH4$P?KeYWr_sMQzYans|b#~681kw
z?iY>}qSIO@cTOq9BBHt+eW*yjV%C8Op+-sjxLGiECd6VAS7+%}c4f6|
zL~=E4KJ0z6*nPcr9en*JxLqP81KNpJPMHutV;~%o;Gnw@zgI`^lzy*L;Sj6=iq_Uv
zLa`_=my3A3&jUoz`j;w^Sb|I}ccgizhK{?c>aBZrN!4qJitwL^Jq*ZX{~EB#`dw$e
zmu`vqGBTO{jl@o|7(x^-C1J20LTqWSu>OG%hzm%T*gS(w>dGIKO3&j~e5nTJwQ2GR
zG6|1ECT0-(p3Vr?Mk}6l=R7VW;TGd3RvNCd(%OcQg%gp<-0oiJ
zx(4fe_Qw4>lHb3PXiIT~U|vGP(7g>ItCx}3;kX{L!?H_4@36jcHHkLTLW1NeY(iAA
zH*V=!X#*SAin=|Ya$g0TO&qK>QI&^;ogyM&-LY)ZtXV8jziQxd8k@8~nd
zKB_%F3#~O`YgI5@NK~-alDKJ^jp9v1@(D6Zw4`)5B~@#!2Hhj-$?m$3P-Pft5s6so
zc=+a@;L`^z5^Amgbho5q`3pi~1BLP(2Lm1r4GoMPKb{#!9I;c|UMXmcAAI;)Wbke2
zD)9D(VHlXE$<#v*rl_cha5$A83>cIklhLb)QE;D7Sdh=BpDyLpIdd>gldP4;}onDBB0qwNZjJhNB{Id
zIutt#S%>iA-l@4*zm%nnB+83m&udd2VxmD;4Muxc4A)RZC
zbVx0??&V*1C45bdnE@qxh%J*sTay@t?>|@6Z>F(xIsP1o&|L}DWD-n~cI|VDkld%Q
z1T;sIHGrXPuS9zF4eDxZcXo0GI4Z&c3DY!*nsC1Fg`D@KWwoa
z>|B_I90l|QiSrg`AvSBzlQ@Wa$3b^NxK*~;>uw0-i$S!xo2b8Zml&vLm%z!_i;IQE
z3L#vXY@r--wH=^H)>_!x+93Vpk44&*S8lb>-K34~1ZZezVBC1|+P*8;UMcJvx!46^
znkJE0jEgV1gdruRG&eVQ{gQ)S4gW)2VC+f4xZi^qb9c5QaQi?xopgJ}Ipl}~#m7^_
zW=l%5iw`fch)79tO5yYyV935uvqlWkclEsQ6tGFMCLROl+%E1VwyuFty;VmJ+1=65
zG>u?O3r8Mv45ej*2y9Y2KJgbfpg9~kL&u!7R$lTg&O3b;~#Vy
zO4DT2$ntyYu^;t0{*`CAYFMxL*j(8
zoj|5h2X!}`J$$594q+}FDQ5+an+3Up#NSih`raR!>|h&1llG^)*}H__t5i4yYXBqJ7VBL8{?F?jTPz0&=q~Z4R6GWb
z`h^f3(}2p)p|w_sNX;tv>``cLfYNa=;t)Bmq->(7O`iH0tXcwD0rAou3kzuo
zho$?TCSK%yIk5T-c=u+=87ytaAz9lT%Jyo;5r^+mwpR)c!5ZLDwpjBnS;+m1@1wc7
zxj+13IoR2u$W`G;QF|1RmBWEeL&%fcCxm0z0dh1+OFiTkL;g@Pz^?pEj$k?VcQD~i
zIi96r6%3sK`%v51h#ydhBW8BCf3
zQ|Cd&QdsjAZ2C~tm%2-y*KCBWEK%+4caD&&wQmX0YHJkrs_vHjuYVsxK^Su|9Ciha
zo-Pu@y7g8uXpYhP&W3h}rLEE?M;s*mWyHZ!_y7ARWakQ@cZ}h;8RX2t7LJ;IEM;Yb
z*|c%jl3s!1Xtcl3uZ~7LK+_mpTEY*%{{#O1kLw*3^D>c+HCA*j1+uGfVzzvk))6l*Z{p~gP`!}E>|!BTMjTu&`1*BN`Lamn_B>ul
zsyAEC&TDIu_ccujmZrgbx68MtUM$kAh7E~hY8>o3Fb&HgX)%1V7(TvF775Bpsms0l
z?2O&U&~=@*wl+3aRxo@>Ie-7}4Y)m?UCOxK!Zi-T>K|-Vf@PW}Wo4zTSh12LXU+uE
zBs(Y55qb`GSt!C2tQX1D>|colD-*fuHcU~W={gvO<&3eP34}UdFCLZeWS1sXbxOL_
z?YLZN(q~#b7hRHm`()T2x8-co;}^o$TAPqUrN*mvL1q_A+FNVo9Y+p~q|oj+9U
z0zZEY*1snU0n-!`?i?!JYuJfZZXk;@&ODQEU3d{qt*z8nR};v}!rZk;tmDajXF!rI
z*16|${Xec}e15)Ti?usJ(?pUIYJ>yM6}4F;)DPqe+IL#Tjl}Q%hB8W5#_laPC-yx}
ze`mWA%{0dEN$2a?9J;5f_EO_D4N+SvIOJ;AhB~;qe!XR*wEzw{PYmJTz5%u@Pe`)-
zd5~4;I4$i4?8GX^=jYtB&*9>Q3po7n!vXke`3h=lYG`X~!|(U+QY6bESUU+!(F*xoj*ym)K_#KIg0|)(&R2!}FM?vWXSo0=e%C6JT9)ZnE
zpYQ`9c)>yrKm0I2h*c~WN7pqpU8kw3
znW5$7OrJK5CGYH7B+DUKI}wy$ta%F;viRP6X>Mv72)0l$DZ@H#s$!P40Av+kb2bHGUJ_szf@U{MNDw_xge+QoXrKk!Wh{P%!W<$khasvU*JMVnv&!5lC
znKp@4JdUPm=z6kxzPY)XVZ+LqK7A@nmb|;mkgQ#6PvkBRvBjzt@9uNwQdL`n%e6yQ
zL{9*}2daPKqWGPU)as}+YpJ$j?o9WJP@pdWzT}kmuf#W
z1z3>g-=F$11!|J3>Lg5??eD%w`8HbDiax}#BTx?f7&+c(AS_=0g^;Tcfa$=sz*j&s
z@b(T&S68r|l05*WY`RN!lkPDK$|pn1mfiYjBwg2uL?WzOyN0^DI?g+1E>Au89CzP+
z7c*zhU~5e+6zpFdM(RXYQM!&O;s%Ik7w+i6Vplq?kyZcckv`*u9bx#~Fw;?Bh<-+YuhW*nE8UD9qkF)46F^r+M>0
zM2)xtk=mV&s7jXrU)aJ;0KS2csFlD=Y2w;!Jzs#3(&tD>ob0eK>C1qV5!LF4bX2Q)
ztTg2V&m(ow9ZUfZMF`m^Buix`BWkeCz%xi&TLrw462~MfjtbyuMBP0ESehoCrAWKa
zL)4#71Il^N$-wc}-*MnFq<)ullK$g?(bnIulUx@^BlTe*YSQJlXGbCno40{4fs2tc
zc-qQG8PYzLyZdtyo3Z~PMq+~W7G
zha^i$X|`_Jf?=4r+%7`FAmu}c;_-L}oSki28>{&XIQ$6N6}YvgmRLNFu4%oJKs7Zr
zGjwP<)2B~k$=f?O$#MwRP6%a-b@9T5JpJU8JHi(0a>QUZ(p5mj2B;Y^j;=w7&H~_9
z$i&wQ{1BNWjz%Vw%Mn6lCs@Y;KSCynX;!?CA(L~X72jFNM3D|U9i>#KSl?>^z6sm_
zyk@2I6yUqaihnB!sfx<;-H0kw5v=Qx$@y_03pmXB=9P%?x57xoe(T^gX&h?hGaZ&;
z8gG+RBHPBRS3uzi@gbFrlStS;RRZe}Tbl)lWMC^W&K7