From 74dbbf3f28108e6d770697657cd3737e1697b995 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 29 Jun 2017 15:54:31 -0700 Subject: [PATCH 1/8] mcee device promo content --- .../windows/get-minecraft-device-promotion.md | 62 ++++++++++++++++++ education/windows/images/get-mcee-promo.png | Bin 0 -> 245550 bytes education/windows/images/mcee-benefits.png | Bin 0 -> 61363 bytes .../windows/images/proof-of-purchase.png | Bin 0 -> 16506 bytes 4 files changed, 62 insertions(+) create mode 100644 education/windows/get-minecraft-device-promotion.md create mode 100644 education/windows/images/get-mcee-promo.png create mode 100644 education/windows/images/mcee-benefits.png create mode 100644 education/windows/images/proof-of-purchase.png diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md new file mode 100644 index 0000000000..45297b24cc --- /dev/null +++ b/education/windows/get-minecraft-device-promotion.md @@ -0,0 +1,62 @@ +--- +title: Get Minecraft: Education Edition with your Windows 10 device promotion +description: Windows 10 device promotion for Minecraft: Education Edition licenses. +keywords: school, Minecraft, education edition +ms.prod: W10 +ms.mktglfcycl: plan +ms.sitesec: library +localizationpriority: high +author: trudyha +ms.author: trudyha +date: 06/29/2017 +--- + +# Get Minecraft: Education Edition with your Windows 10 device promotion + +**Applies to:** + +- Windows 10 + +For qualifying customers, receive a one-year, single-user subscription for Minecraft: Education Edition for each Windows 10 device you purchase for your K-12 school. You’ll need your invoice or receipt, so be sure to keep track of that. For more information including terms of use, see [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). + +## Requirements +- Qualified Educational Users in K-12 education institutions +- Windows 10 device purchased after May 2, 2017 +- Redeem Minecraft: Education Edition licenses starting July 1, 2017 +- Microsoft Store for Education admin must submit request for Minecraft: Education Edition licenses +- Proof of device purchase is required + +Full details available at [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). + +## Redeem Minecraft: Education Edition licenses +Redeeming your licenses takes just a few steps: +- Visit the device promotion page +- Submit a device purchase statement +- Provide proof of your device purchase + +After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to **Apps & software** in **Microsoft Store for Education**. + +**To redeem Minecraft: Education Edition licenses** +1. Visit [Minecraft: Education Edition and Windows 10 device promotion](https://educationstore.microsoft.com/store/mee-device-promo?setflight=wsfb_devicepromo) in **Microsoft Store for Education**. + + ![Minecraft: Education Edition page in Microsoft Store for Education. ](images/get-mcee-promo.png) + +2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up. +3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. + + ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased. ](images/mcee-benefits.png) + +4. Provide info for **Proof of Purchase**. Be sure to include a .pdf or .jpg of your invoice, and then click **Next**. + + ![Proof of purchase page with Invoice area highlighted.](images/proof-of-purchase.png) + +5. Accept the **Promotion Terms of use**, and then click **Submit**. + + On **Minecraft Windows 10 device special offer** you can manage Minecraft: Education Edition +after your device quantity is added to this page. + + +[Learn how teachers can get and distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) + +[Learn how IT administrators can get and distribute **Minecraft: Education Edition**](school-get-minecraft.md), and how to manage permissions for Minecraft. + diff --git a/education/windows/images/get-mcee-promo.png b/education/windows/images/get-mcee-promo.png new file mode 100644 index 0000000000000000000000000000000000000000..823631367d449ef18f5c1d680ff6a348c149bc76 GIT binary patch literal 245550 zcmYhhcR&-%7xzt(A_%Cch*SZoQl$5Q(rln0AW}t;PUtlWO+iG8AiW9#B29Wtkls5O zLJJ*23lI_@q`chwyU+VPe{6Plc6Mg6bM~Ci_smAW(AQ;RxWhm}LBaG`Ps@;kf^y?x zyFpKNQQ}!j_4#5)>20X{kfLIQ6LoQN$wBkECIv-RJR{*P&Bgg;4?Qz)3X1DK|7?_t z?|A|!D9DA6wKQJ^SnU%18+}cEHyCrWPpmvQYyXZYp}`Yug$7CvU%jOep%3c+2$&1r zX1(-@^Af!o)d%_>n|EIxA-*xqywG3wTG)942k)p`eh2y@A$U~qIm-z;`&^H{-=^gY zgKO?t85-nLDFwIi9zKin|Dv>!rUJM0Ux@8RDRLFB`ec#r{>VNI*yZ`>IBpWKH-$d& zZkivDZ+o}Wv+mW@(9m#Be5z{(xWD&eEc@R&p7`SI4k^{ybM%v#?v60oR`1kpU-b6$$y}3FF>$FZZqid(ACPbyPg$LNIC}!dbpjRfRW(U_ zxr8HASoHyv4R)jkz<&^nizBHSN~w_>U|1}i(3ix}l)p2ptILxDQ?SczA&KOk?QW`j zq8%17zj)$xSd*PmZPb*#o5<60AOYu{1DYI1qcgl3pqsE3bo1&X9{d<%Ma%Bi%*aUe zp!?~%Bxq%;7b&VeIQ>KvCNn>O%*X>WJ=$8j7+o)lE(Jzs$71SWjopT~?%o^ac|{KT zg@(xVZ>%wQX%}Z#*FVBjexc3Jc13axU&`J6dfcnucIa*}k~U z<&KiiTFwHEPqsGYwc9ZF3d~!-a1z^|e|0=|9Q`pvWK+YV8bbCvB^}V^JcJp>oWq}6 z{`1Fs$7;MP3#z9{ZKpM*EIOK{4LM)JS>a@SCDKTb^CoJUhZmQ94^gBifd4j!#&3z` z1|OR%Ky)ATjnhH=VfdC1k99=&PILOywTYu|P{sPnl08&JVUqw#H5u?>nTB*UF zfEO?TuDcK0c?S$$@Me}&1f!w3wtNZcjXi1ZgXHT+0q}f=AC;!bT2c-c&23& zHoEA2l5LvXHk0MQ2R(rt!3;vStJrv4(ay0Fr?G%D(-2&68?j4_trSzyd}5T_jHxhy zorqU{Lhq`cuQx#UVWZHUO-PZ?vB+E--lZ*&Bv?bN?YB6nS5YTbsh|n#*2FpkBzB}{ zWht(qmGT>QV^jU0T_GH{xp2&%OPVU)hixXY#lJ~a+fVmjJX;P{Co!_QH^&FIj}nT> zxLg3ZH*>V@bV8wZzqoIE9&6BoHab~6J2XJzez7HV##sBEXY)XIbVHU`Pg=?1fjcT5 zgnwT7W4#|}T7&@z6-?dSC0%CErt-94D{|%^tTCuft`J8 zT{qis)0JTCV6IhN&AL%M9*QJ>vA55`&a!~k_vaYR(DSQSgt|(QtqgRdjj%}up^7q@ zHmu2PAwJXX9-jS^WCBY_@xE}B_2IL`(C*-~8+!+*rFVM|a=)dKhOQ-_`9IooO zq4p&q*d(-Y0FL<6?EDBw-jM|1`2FWSdz&HRdiN4hSU=#S=-IDwGOLp;W-%|+?%!Icz)_p6^u1~2rglc!sdX+E7u!UlTxPO3S*8ckw9LS*F%*BAY zOeChhAp{p=9k{>|g7eNjTjSz^Z4OsLocOQgV6$>VRylygu445=(h2x9hXooe#{sZ; zs5F3IMg?o&b^vE$lFfmKKg<_#Ik_QNA$3d>6tcc(O~S@(BU0N?^~C_68 z@LY@a(U1%q((9zfs%z9Ayqn_yK+W!zL>0FUAFNKg2cDzJ+t~}43VbZGF*DbnI8mv- zk)N!u)jA3~d}^R_Qfp0`kUT1F3*5CPty{OQmp8QSEbtIk8~{`Ix35nWAdeRt)G!-e z8v{sEVQ{@}1$ZJ8a9Us7x(wzC?8dUW$ERHyB$YFsWZOxz$7-n`Bv-0?marQYL=37E zqgkGfT9WEU!CAR~H$F>(NW@XlqRc*V%zVgFMdiV{F)#?NyNDTSSiq(u2}7fMirtbS zLAh(YCR7zdT!AZnN;C&gxTD0+$C|399p{a1ff|Vc$l7QS@_dnmYiM&quc0I%N33j>sXGh&W9t7+tGPOP)as`CvHb{qrUR*nT(Qq{;w>p8lAHbe*mU+Q2}_HB>DNE;(n# zZDf_spb~lYvvVY&r+eppRYEzInKax+%&mlxB9Uja4fXfW8OggG2F(F}%UIy)E?0vG zJQz(RxP%<(8uquz435a2D**64d5PB6$6o;FJ*jMLmM7&Qha6^Nn0a`}!JvN|bqcth z6|$QPUgkd^%!Hs%ATrH0Np5?P)p*iYb?3{H>&L-J`2hebn}@jcG>7}p+?t#OfFgeH z#)qI>Mxm%KH-GR3lR?1m`zXQ)fJ_|JKTCfmnEZq^#AQu5Rtj6#TFJfpGt zgtJ^wjj6aLd8L8S0w5f(Ore0pWd#G~%t9|Pd2N-v&_*oa-BdmM8&Bv5wg&f#g7!v9 zr>>(MoL2Y?n5msI1MkF>ZmZ{%%C;R(S1y1S(@!AB@LcjGaH{{}`BOA#gtdND{U63t z^FjqbtS1(o%m)v$R;c2!zmKo>SygU0j4lvhCrD4Yt~wz<6?U9lN$zKBJ??I3Tg6$Q zW08TK99G2nO=91=!aMAL38-AinK;0Au*7?Fk+`9d(`M#IQcobx!`p}m z1-F^NvzM$wjx z)zR!l9L=xFwVucZ+qE}n%*l=@ z%{@kpf;L84)DQo{`-%t?aM+m{TkfpYJ3|ugBxHZpKjbt{Wk297CMU7n58#KCTnOCc z;%Qxl0)vQy%M$?HtUn0P>feSg;Az7^0mIX9^}WKj({uwQ7_KY%M%?;%b`AhJ=~V}f z79-E_n-59WK07VyXH_Rz(9=W(*mAN(;NkEnY1aWjtTF(tI6!tw2%zqAG>l|>c)|wV zz)H5_Z2kVl?RZDLRe~E^+hH!LjZ9d~Rl}eCKK4j~HZ+86AEQ{K&hNNp4FLnDY8DSR z<{*bK1B>9p5`=A2OH0e5D-L(!@2@b|#k51mUj6t&c&LI|`bcv>+DP}>Cf^BgpEHj} zp$XW%W90IK>gQk2)gIJ~+ydC{AT8f}ZMWR$_z@N0t}39N?>Rx84iG4fYV1`#{qsm) zJD){-@#OyhJkPafNXF`d=w5XUje=#+%GPG*gf$%^_@V8ibkkC7cdFHSZLu2m*V9q) zTQPfPFV0EiWNx1|VJ>^(!STt5T{0yK_-^oD+vX~6Gr;FWer>x;tVfI@|Fji99fAx-3GYM|^FaF4s}9T9|uDhJ!I9D?Iu{RRKs_s z9mjxmZ}!}Q(%D~njpDen&x4DxL2BGA%GvuivUnGYU}(mu1Lo{vo{@ZCmtCcE^fzz( zH%dXZOF6uL-uOLa_=hn69|b&u(KohnZQtR5@cBb@VhRS~T1VbxYh6pO1a(jHgiQLV zg7RJir22B6Iluw?>s+)+>w&P<>M#4U}hyv^SrjjN;WFj7bjaK;5WAv*Cxr3wo zb$?MmL#oq;M+d4|dMKCVHyk`LC>Cxs9Q+>^-`(`MpsdN-&? zuK6qHtvSp9SnP^?CRUymk}(L&7B}UwBz!7f4`>ZQjKa?TnnKr_cYvg(3);{&XbV(S zU6}>k?#nUg$*f5w!pTT$@bdl%sgE^>G|ocCkyk^`Q-Q&g9PY4{`DKI{l9Y1-L-{sj zsVaI8idm8C=N1o(;LsHh)9FAT3^FTaVgI-secF}j9=IInAQ^PDn(Mj8WZJg%v4Jq; zVimaF6v4VFL5?=J^1N_T z*NT~;Oftw)_5Iz@f>5C-8*ST4+^KBYnCfSBS!kM3Qzib?1#Gw0Y%X}LGC3IJ&dymT zb(Tyz7;x@#NW(136&yx#lvF*BHgo~_-Dq&N8k&G%!O0(Qy4AM?(>aW03Dy)GsU}_) zR&LyV*#JFs=-tahx&ZYp{mZhlsFdUG)2{?~-032c)LP(Ni zESl7VCXwJF*wr??Ig-#}i6#yMNr#(&BgT+39x~u$;c!0$dm(G)tZ`+2#UcO9$R$K& z$Yi!Z^t@bQ{@{Z-5WG1E1g{tGgU~UMBe@G5z5~IP1JB1D)DN@$K}R1)gYI(%dgBRf zq%{|HvRE!;emZIzzr+M2t+`baqs<}s`dm^po275(D!}Um3?!zTLUvdE)edJFLv~|< zA?r_h$UXj$C2;_FkYkZlksCbe0>CZDw{8-70xwDk?JN*HBEH2|K9h&~AD4vez2FEK zsVGwty0mMj+H^1>25dd-(Om$oUIZC7>!9^v1*?!{?NoK#1BGm5-;E3NZQNa99I*tU z-f?3bH3{}?&xMkpNe;OOT|!wQxK>>N&hsKswud#f4kXdAAp<&N-0WB=xOyfPR+gjJaLm>iC8-kxAYZRlzTbzMJb zRQ2u8gpinuQzC+(e*H|N0q2>J_wr}$59Jy9BvuaR4Um4D))$$NvrO^@&yPsLu!WW2 z$y_qZ^n$_2*4EfHmqlW~HMszZj|Gq?Loh2s^9L7X*|tFRZm4~;P>@O95a@$Uy7{*e zrzO>VH;!_l*zC%HJu&2kBq%q9x2{9|p%{L&>H`<#Q8P>HF^$15nsNu&+H?bSeK?mu zfEonv_B(@*Wh$Yoj}>xSHXcag4|LU!d*E%$mgu(C2;kY7KY5-*-zO8`wUcReuv=<< zCIbYm1V+UN4wRxvyHNj-ElY#o?Ia)!mEN#`3zHElwC7SI{~HO2dMuGb?{cgxL1)u& z3*YJCc*sz4suc)jpK2MfOv7gBg(%=5Zk1Lv9#zMT0>JwdrIG-+Q-gt}$KkZ8MeDqZ z@2an<`1{HA#br6TMO_P`Z8_2<%tGV*K|FYOI@LM|v2L2BUd6(YtK>iK3%B&fPxXsc zHm@vop)%bY>yhr(pzdjfMUPH;=`4U;E~&a+#B-J!a!4lBgdCoe2@0?P>{-+*3JEJpiD)OR1F%KK z7QUKw56%u#2}2mGBSLOaj}bFVC9$7}-0z@HE<}fn21Axdf^&{$Tsm|%MI;F&7qiI4 zLl|oTHV3tFU$G|E@SIHvse4^G0K$}z+P+)E#dUPh=IG+lL@oqnki*SX5k$aTXtlY; z({1>C0DfvUhcK}TTRH<^W)<2Fu>kODw?gYhWSGi$)ur$~;fW=KHBNko|Ibs%hUL1hNX!9+KiexE4t0;tI8?&t5Yin9ZE zh7hbta|R1O#x--<&m363odVOJL0EQ$(}~@7%4&+LcR_^|rO7&?%*^%&ZzO`Dh|&-| zbQCoEe6rtFma|em_&k`y`}=kEoG{`3QFhoIO= zXOvWIXt5Gc*};rhdf<-xvF}e>F(Uxq6_3%f0F~TP7X7T|rTM_~AJB#AAa9S~Z67J( z9_1@B#IN&0Z;O*#Wr`aTz$;Vf-kaI>{ugn(Bq?fVc#(#UYD_Tdyk>p;yd_ioj_O0F z=n7cy5f&H>zsOcSZ-D1MFJ4;SRe@SSY!aSRq3T2RW=RcPf8?SzOR>vLaHLNV5R-77 zES^*yY}5N=5BAIc{FOH@EO+-18MtZP1<%bCx^vm-gR_PiEae??>X zzaZFm{ij+scX~N__PF!E#ek3rR4%U_Irje`GT_JM0O^$I)#JVYA4_{`KNhnJ=^vaZ zy0O-2D*wOa8S!{$^*9^#(+cLG9J%}7dInw6f7p7l9Mb+Hn_uUj928*LXNu!uw^+-C zJl9R|!(ALV`_vLPS*&LXzl-?SNZ+67CSW=<;zHM=RGgTH0Y86~Xdv%h@G_v@=R+I- zgresP5uUuJOnOno??||){ps{kZd~XAkG^vFW}CzwC-*MTE*f(Z7MqJ~5_$6paeVO- z?Q%H>+vv{Wo-jKH^BNFUmCyf_6c7t)PJkPYO4z-f_&Cl5+x=!Tdc1_rZH|9~7anq+ zK?h{v1o2{kz~J{X=eiDPvQvEl74W1XId8aig9zYh_4XO`=LXqCwK3!z{As7NEE&#{ zc4#=uyrZa`zc*LReS8chs?{%?H_*kUMQnJUkU=w~@zDZ~wz>M@1K~N~=E0u1&vw|J zCY<+K<{yX(C+=fIQI`N&Jg%Yd#SQ>l-LtomBh4?6dEP&LeTn}n~jq$IawRFX8?m+u(%Z)JiQlD>>_It@#x$4AV1L_9j>enln z7ehd@aQU31IXsE6Hg-d-zCW==k@V-i#1ejeLpW)VndM%{Lfv2S_qrj&;z`roEYJ{{ zhB91HsoFwEta5cJze_zhZdCq!H*?U>*tMpUW^HK1)mut|L&598y-hUe#HM;?s4-P6 zumq8~TI1%nRXzO8_8_k2UUC8d(>NpGY`WKA;+?!m1&g-fu)+6P>zlSR)@VtQL}tUe z%xgDYM)Ws+fqrG1`4?4$ zMT7iBj9`BZ{j~i01MIsvVS{M_$)C2Bx^~?KSRZ@E+oOswXkzgftSQ|vD|XC{eI|fw z?~B7Ph3af^+SL-P`Q4rSre0n1_T1kI!}2_7ZJj8hZroAGQe|KzDtxf729WieNk>!w zz#}|lBfH$)0N;^@WN=l;hA64L9NA^*A=u_eB(f zAsD{7;urd)Bk%WkZ3AsCZ_^O1s^o}$X*OV`UGRaY^ppX2uTg#B1oASvTCKv($LH@Z zGQ?SGqNv)l%T7^N*XKZ!UEPD|G5?O^%c%=aSC_6K{fnTo%f52Z2NBVas`#eiu~*f& z29=_Y=fi1<@eZt$Yu`o#24GeM5~E_ktMt{9zyt)GE(3>u9biiS_IBa3 z!+N%3+STj;So(cmTPyJmcs_!6+oYgd%6La{nb#OKgAL=*-|gwzxxd>ZYrLb2(Y(*| z8v9l>P3zaHBRFx}J%5?+mc+`kD&mb`MvR_Ys}YxuSf^eI+o12t`rGQJ+UAz@k)Yyv zgUA{?sps-3<3}FFQ?VxJ(RcwvZmmX`>KD36pQmQp+ercM^hy0ApI!Y2I`!N-+V#M9 zE<4PIJGEBDH7M-rX2#rxPZjs$BpQU?3Fvot+cAu7O_ClNQYj3jtDov~*2}j~A!V?z=eE=`_IzPwBMA z8zu4svPCBEw(B+y4OO1Vnc&@Ba>}sp)~y87x?-~Jz&A>dSCXxoXP!nCblAX|dZN9e z@Uh4fRAag~_Np1(}79y+9}iT}bB2vg{`c zW_vm@&$;bP>0|{;)j!?hsIo{Kk`p$ro_~^To-R$Z^)pL<`qwdZL)Ox%*Bkp9_O;@8 zve0Bo+^}A&iuGj2B1O2qz+K!nmETHa!F6qh)$xq z?#dZ$rtwa9%mpDnOI1;E|5!Fr=-xUr@Zk|O;5+*uP4vUg3Z|^kC*0alynfN`s;8}r z_WEm?aZYQOtzxU~BLXB|(WJb2AkjywU!J<$U2_*HX0%s)6ng`4%ls9;X%EBOtWmAl zCF1b;`4jF@xu14%z0fyP65gIg^N-geKAA_qcX?UK>Ho^~L2;JHfTwe) zZ82v23&OA|K$*jPu=S0A8$+h=M6Fj{Vrm03?Q-?Mx2ymE0=u4j6& zdMd|LQ~vh1S#Q8?Lx6joOX?g7v^7R@%3b%HuN>ztv*kw_FLz{O+e|l}5ZSX*1f=@+x;sSC`Uz zrGvsrPa?WH&05tTE2M;@K*7aRPpeq0Oexo2mR0FBz|E)hYfWr?61m(T%;~#biR;ab z(Fz`3UD;a*Kqs{P*?Q%`%J@FZKB}#1;Ke#>&mrjia6^@U-nuIT6Y%a%3De$wPiEF< z8Y6%DJoI@%(*A*zf?765j?b)jal>YvGkBZS~g*;SoKw5jxNigQ+t8+ z(BI)Nf5}t8!rs^ka4qhLw{Bc<^rINV_x)lj;C)z;Q!>ts=VdOwTG+JznXxZHIw01` z^SAjHF#Js92R+|kG%yrW$~W|R?U4F~ z-$PUTz-FqPNkhjbd-juZp`IYi?gT3@+&7ZB+jbOUu$^=*AU;WwL`zS zW=jlMa(+*yw)63g>z%6Wu&bhBz@!$r(D9Q5uid1lz(1>FD|n^NtMZ|si?Q6NVn2s7X1`2{o^Iz{7M(-G=L%cMejsFn9mZsa`guG^xxQ+SbGi=hYZJ z+oXo{fGv3j`SzTbfSjlGG-FlIQjRcup2dCUy=4~nS2Ou7UVO1Zp@Fnv%4s-5>oenq0l8md`Ez>!9lxwdx$X?+=8E%MQ z*SoV#XZDc4it#Z7Prt+$x^FUD;(Bl0RQ$pB?Ko4O2`7})v09rP%{3dH!-qETb8f&6 z^}(A2CXs?-W2}tkJLi$N-)xZjg}ItN^`^g90~GB6CQ(80e4%x4J&hjon%7_o5A-P$ zz3-D7uV3fV7ppYkQX-4zGVP?|jp=M$s_XRYO%DI^Ei62*Qy9nJH)PipEwJhtmVMw5&t)`e^G)ebhRHhv0p~9^?{dTE7#D* zKZtMIlChGGt{a8w*eyc>jw7Q?9A3W3y2;l7??#vvE5)>Dc06uYqAvTs*~(A15SON% z|Ci2Vay{qk+q}g;3_WN2%Emn7rP{z9@Rri;=eow$<>O;Q8sF!#X2V`uXBZu@p+2op zJ=+{grl(+Q?(Nli0;ii^c894AzfzX6{UbY<&abO^?~}OJgwq$|ezm&F%WTdK<*R$K zbGN;3H8cI7s_d`6By=|RvFmW>QR#e57%9m5^9?HMxcRKZV}Ve{$zs;Ocu0i1QvW3n z2TiFf4>oS0UP;-$eZt)gA4#D0DH(eqIZUHc8=R&>m=$Y(Fxkz#bt{55)Si=Wq1yQL zUGr3`-XOfa?q~AHBP~WQy!V8Nu8kTb8KONJw#@+E%6hnY-A;7-1|@UfZ2c;w&IB_G z1If14T5jcqlw^y_8Lj8A#sx5Lvx50@+<2v4UCCiKzE6Sl%)&p*IUatA(bZX+BlOhi#x+Ov z`FU|8QloMG%Z^{*CwzaMgyqu@cqL+5>U?h9sG#;BT&jEdVui*ROaCe+Cl^@gHGD&h z!(%fDM#Xtcwl?OfGwenko4-bw^9`?T4@$uqTLDVDxp6z?#9CIAMTaQW)x%nr>R#!q zGYlOpZlR*n*X(3Clqmt4547}(C_0L~n0{rL`e{bmT#^ZmeR$c;_f{j-71jJR+5uw}!mVEqKdIei`*^AQQpr-VxG{bH zpDNy&(8lbT8vE)4pKB9eMy-#c?G>4+45vTwSUc{2OFUElG%A!g{qh|}t-B{fXn>&U zX4B6b6Hmvk3rlIFmok2P%Jf?186ux?%~?araG=De-KYN9<-N~-)3oj0!w-fd#JD6X z4wh|@ZZ>y%n4I}@h#m)$!BG~Wveiv_Gu5SgjY;vm_n#-ly}6;Dxdhc}E`0?| znXT}XIa9tdSNc?G?ry;|#Mr$@I$5-;+Oe12`j{inMkXRRQ_f8kKi^dducG<(VO3GQ zWGec*e`>I2UcIv2(~mW`L02JM&uo(^iBili%uK5laVs~|HT`}?XmQ}Lbnmyf7ZgGS z;C(&{(X;m>Yqwk{vau;HLUW<3cfLfn37J3jkbgoNwzo)t4ji8tl_z&aFiYgCzI>nV z`;ap$#^JzGV(ESYlZL}=Oh7PAmypWNtHuwyoh{}271MK1FBz3Kh)_&st36r4`7=%$ zo%LS^{@(Oakh1^raoVad!@Dbf!LmB{ijanP>lkgdCY_HlbxXm~@wYiEJ5g#qiG*RZ zp9;~sq3GLm<=n(!p~fx*H87oDLbkt!wis zR1U=Xayb;PlT--iaHehU&nu2$TGRY2^0;bm>_v%2^Hsc)F`BAJvntTKWX*Y5F5wQv z3M#bhr*PwA=IU1(moueX8^fK9uVoJ(xQE_uPuINuRH`=r6N9GE^?YjXXmG@cq5bv? z9v_+wi4Brs+=H~wrm!Y@U@p8kD>(0_3)(vpKkMO0v|&es$#hG zco2p%uI#@v!<&rrp8t~lN%x7LmUjtpXIA!h7goBB_w2g9DyrL_*mtP#)n`@Wb&U-?5$3w8o^B`7SH<_E4)C`k3chQoAZGmRbbX4(ir%zc`HZ3w#OwK1{l#5c zV=Zb8!mDO_79T-7j~na>r7drH)~HyMY$U#!O?+g##&wI8F2r8yS|n9j^_2tVhYlZ} z_DIBF}~u6-7!%F`{p z8Sc~c7T!D+SWOY{UOX-W^=h8-*amkcD_wtc6LvpYl6^GJXs4rn?}>R)qE}K)UK3D) zwsFBQlQ9AL!ZqjisL5Av4W$(Z#MP%QAg-3%g4KGA{J}rO)@iHCaGjrim8}c$6e|%#a7+- z$sC992Xa|u{Q*?G3>K#e?ZUK%)F*iq9u}zcx(5!~9`tQE&25h>XTBV)KSbcY48yiS zn&%rj_$%zyotFK!neoQEl^|w5QH{^|yfJh8uW>#?Qt&*E`xhcQjEZ@{=%(jH7{>%f zU+=@1S!ws=OLlZmGVW9@Iee7hDzZCe4wJe=dmjBTTYm3P&DQ7Z0Pt^)2h^_P!*;`= z_rf$2Xu{po_Upc}-z+2l)9 znZg?EH!8v;Dby4>zJK85m)04&bEu<`(yjA|s+uOOhOb^!p5ENO%0PGhiJ~IWh%YKv zy1eg-sCm7q_Ax``ks|`C_3|e3^HtkB8nWhLJ&8)|2zNai_o+<0$0Jd?3ZXZtCBF9G zSCZ{t?1xc((|w=+jQggpZ)WnX(Smm+pf{0uv_Di*M%p!Ay6}l8Fk6`i!fcuald}8N zuAAgh^$d~-W@$TsYehk>Lt^6{qZug33?Wq?l z=ccs!z1-J5)|A%Tf8W9iwBCp1STqQzs3-Fx-mw{3-PrJ}#BpgIRatyt6+(_~Gn9y-yo+NmANzD?IW+!lf;ZyGFkUpGcZ)hc8@i zyfSwA`$mMPYFbCp+mimC`B1DdBJG|zMvKCay3spNW)h*b^Ddi7sNaLOwdV;qz`eR= zzz0rRtJM*ia{+>`2Yj^c4NsS9;2)Ix#2JwjHEHLaPQN+s!R>+;oXfl&?^1qu{O=O) zq?ypw+t_qD#kC$qfF`a-b=sn_lhwrK-3iXNyhLthRNuhCp?Kj?1n9HH%v?UA+9{Xq z+x(!a#pB@lFQ#%Ufv`6pE@`zW8T<`IHqBY7WY=lu)V*z;FzAfQlrg*BtzhmByjUE) zsunuxGW3Ti`>j>!xk-@8^ZaYi!uTh<+O?EL`|=+^RjZpfry^mR4qG>g*7skldVX^m zo}r*>WaIU8XJsV(I4q>z_kO*-Z;pjf!CtuXiT1G{hY2;u zeudCdf2NGX+(-`+bGwAOHQ+DXH~)!J;akmo+y?dSW*U{0{yO$Y+S)J0>j{53@2TYo zVI+t$;mrCCT6G`9@y3TPZ(j&A({qH+f2W$XTy9nRo;ifDiL#_P)b<)a$YXzG)OL^6 z`DV$Z$9&S}1^1sC=>)Pxtw;-mS#N6d#YJKh9HJkJQD3XT=x`}$NF85|)ey(?rDMXD zMCiqTM}o~>Reyib);D$~_GWGWz}-m3t2I1wINM{|bgcodF)8B&-(VN+w=tST2D_L~ z+Q{u9F*UnlV;;BYnrl7aU(8#nH`73(3u&Fq9XjPS**#3Oywx8CKMxh`+P{u?gnALi~9yW-dN@vBCYlmD>F*!O}vl&5KG$#L3VnCyN_G*Z1vbpS#^|Mit*o$4blF5WcmZ;ZRrQVW`rT6ey4 z&P@E2rN5l)S-N2RZnuCn_3ArniG!D42i;yPz0Mu^`?KGoJW4M?oWs`2)sEr2DT?a2 z^`W%OwwB3PRUY@!z{Wz8j9bF|h9Ypzrk?xz)3m>Lt!~}O!@%i4qHm~&yNgQcsBhcT zUWebV`QAPra*@ftJo}gSr5)Su9q6B{gXShnP z3ALU%pAPT4g=5`SXa^?n<=M(}=Gd+6|T$@{~*j8AljWqxP-+k3yiKm1AAW5{tV zq_C`CCxoH-+&a|dc4$Wb>h2|y52f<0;;qeXjBj)PQZmH-JDX{KPvmW1M#6{7pN|GD zUPm_@W_2@h&7}0mk7u`={N|98Pdq~PPhCEu)w#@-6xqV{Tw3R?RNrkYG1~RQslg83 z?7XLw>k{ew&eXEk!xVw3jNQlm&-oLW7>0VUD;3uIiI~ZPlsG;|m&Q=|f1w;Yz`~tZbdYy~T7OUNSg(GI4R@wwq8#(NyU{fT(244y{QBU*`kb`Ep7Cq+iNdjkukNbcxn_d>MGNA?=_r1R% z=)R?zn{4t`BlOU!^S z1YNm8by5_&6@UKH)MlC5FyARWg*^sXI-iz5xGLy!UEq&IAB)y?wFbGwP|wT4O*8)L zOn!HVe6D&WBr&Hl4jsIw9FAO7m9V^ej9Iz-5}TD=NjdBXrOPeM`hE3}g3%QbH$k3R z3NfWM=P^6F;kx;w?P{0K?0YF*zBUR*j*ZEF@>_EsBbl0X96p+)n(NoC<_W{k>A9sc zh|gdnG#Y`Tbm0-F!_Vrsjf2KQ=wVix+x+$w=4T1RI+KM%?#W_JgQBwD?NXe3`(tCv z{z_-QSS%t>8&APBn@c-9rJ7UxPhUn!kH8xg;|6aZ zk?7;iU1@N^y|v1EQJ5#8`l2Z)aBJ!*9AlrFEuLGt}boG3H9 zBvS(A;f5$JOo6R`Q9Xf4M|X!6p*-V6v4#2YApQsHrW&Gsa?dzl1OO;)aPgOyw(G3p zsCgBfeo3uYXujVmByi-qH;)i6HUeDQ@Q_1~dcRz|8LFr7{&4#$O$SYN3x_{w33meh zdw=20pK7%~&<4-`a;@G7MwdPbQLK@9wYnbFJ~VmGtS`@uBdDClW>2>FPQrcMPs2ue zqLOH_Y*WaX)3V5cjl!5cNSyk*Y*y@}Qz<}x}~wBIwe z{XNYbYJ6`|+hhH6CxMo?LCLY@3$2Z(T28TjLGqxmKs!Z7f#%#%HI?@}R9WLA6Se07 zZa4Xl6+VOw1^!$NE)uu4Y`DRubzWZHMXY0dnCB-|o6u3S3w0IN6m2fF#?U@yQ zWwtQ+BGo2kifpACPq2I_zfq!Wv-lm2s^?t!#(lqyKHN}941D)j>O8@SLXU=)fl(^? zJMs;0#ZOMr+*!R2pYWHL>VgKZVn0zl^B;S6XEjaoSDFU>-B)(BnzS12&1NM}j;b_O zBE1i9cAPyP2))(O@@PP|BmRX*f78b}9hn40t(4#W+Y^+ev8b`;v0MrtGpP67+{^W1 zM%27xmbm!q8qGP^=aKK) z!J~}|jYb$-zUd zwbP4f_AQ)1+7@<+uKXn+u1ntWZ>?Wc17@MR(Kbu*h;p?S5j;|B|^t4_{8?MsLJ z(Lqeu8^5S(pYul$@09%wlg2E3{C%);E7axgbij+k>`Rp|MgF){T+2`p|G{XOQZE#% zrIYL`RV%ywBFxdDlQJ=MpH?Ai*PC-98z-8Kd#3bC*@GbPCOn(2Oie1o_6A4aT>(0K z4FNlj&L{qhS-X2$SHE|g!0LwlQr@@fMarm0d~-Z*Q67-XlWB1J=rcRZd-IE-l;WS} zd4oI)xXvNNALYmLyz#-PztZgbVXmc3p`}#c@^a?pVk3>tf?w&X6k4^a*98UJG{=T4@aG!V8*smTJ;FT;+C7l1b%0~E|XI=4=$RR%00XHX^JS8~`SH7XG zEDyU+O``0-%pdWxlbb-SOcaUqmtusDKDjQ8^Zus2`%|G(Zdk(>^!3G|E|XG!VZNbZSJczk8mv!#DOFB9Rljb-RgXfChsQff zok%nMSfVU*t|6b6JX70-f>5=jL)f5g)`q5xRF6A_SVn)*51?jP;nRMhOM#Wa_VCDb zFM+r6v1Jc&cL%SZIg2i-b0nn7{`IIZHS&zPe1;v=d||8cD8?&6H#k)1Vuf8Kxm>wh zXX1)u=SQN=AGvBdcGh}hC&u3OEciE6dQWGuPg5x^M*B-)yHN(ycJ^(58}^9k`y8!} z=7{DD0gP|)yyuf_khef8%RBAmCa1Qw-Cjv;Q)(xuPxK6E<$%u5qnUE|}#+D<=z*fJ95Yl9Y(@xyy=-^@1JRd}+F(7pq-=6Gz;OTH@GS{O(`ME2gNGn~A6?R<14-$nZW; zGvw|Wcyz|*^$vX9pbS=v86xiZmH{4z?$Ck zF&qSDYIqegfqtE!>Lr)Y%U@GDgO!b!ebeQTQ&+4mk&} z7_FYa=NBJwd|15_eq-Nc&-(#=Vt%Ha!Pym><#zr*07XE$zaU+b zWn=3~3>Twg%LrR+7P>2sJe$+LYS#BG2cNh3>$Mja~&L&{`h$z)?mcPHrp+>ogqD^Fnn3-H&7%$|lEQPNAA z*P}`^=q!{$ZwOF{TD+`CH#$KvlnP>8&^Qt=H>fLKT(g1l^$2}Q9&GY)6i&&lTVRI} zjrakAv)EbKHF-lztny{SJ~_{{v&~tlw`bQzThF|-W(LV&SvepSH40Zl&WY@sv0Mtd zGBam%t{)+)?ua2~n z#|wB$wyvhv;w;p0}ZX{nIN%fJtM!tR0`{&X;3vnxG27evy2 z8p2NF$;n{i0S@S(#y7@{)07Y!b{@Vjqjt8|F9oA|XIbeicWBl$arEdyZwh^$a+U8p!5itG^fFGFWqc?DY2q$KjSlvm+Y_keX<% zV9N5d4i_0w?|B^dy`708Gq)KCtxdpm<$wkt;=D|EHvZs*Jv{J+hnd#O8K2C~&LR@x z0C8sp9H(K{0Fb6QPK>XJd|e>jnQ-c~mk#+<`x!a>Ei%oitQ_)ml)nUh^+@9`_YiCj zGOV|o0p03DdZS!WS~E8o`>lClxa+p(#{bNWjFr36D{1}trtro1B+x@ZYW1=Dh@GwX z7~R|9AQ}(7u{n{;d@zJ$Wm|J}=QJM+A|{V3c;c|oUz;JgZfUriYb^i;$pF!xhJZ=L znMZe^&v5x@K}Hw>2kKaB7NsFpT5=kpy;ggaf&L6XrEL_to9gs*CKyl#3I=1{nr_BN9}CH%vBSW*4zzWWXc#cHPR^8R2KzVZeegbzp|6^ zrTl6PiEQhy=PK^(^twh7JQI zz!`iQR0U5hl(2%>y#!?5Oj87=3$l}f}7XP3LAELXHKK|^4d z=+e@Jn|_bUuiH1?paMk`6ZM1^fG;zL1`JdVr;Ty>n8{+P7T&`#CU*^8{Zmy z*RThe?v|j&vUoU!q*Y9$xS)`rMIi=k8PJk`DG5bYdC>VF>1YE+RAjOo7rbh#QvRfY z+DyLTR=OVF4rX2JfVqIR4Aa6*d2R@H^V;9qL(=4CX5Vn7@ZDHZxEPJWtI3=#8jgU^ z1)M_l#)Ae)>ym2Zq($OJX!S2;*siOzdvG4YDd78>JHYl`sL zfqKvzL6BTaP~tY_bp&lm$gx4Q?2?s!ygrnF2vQo|xztJ4hN9d2t&gLiIgs7k^}CyB zxfiMQ6X6^L1e6nXO&3g>;YaWn{tHZ}o2z7F0ZhZnBZUsg9*5g%I=gPq$QH2xc6VwZ z@7(V1$uI&#*A$p}%$P?a;li1m6?rG;a2{`Ij!d$>=7O#HCE1!ss)I-{vC$j2-aG(Zq!7?5;{kH3|j}axi}LJGZ1P} zyQ;qD^EiVhurT%fYB!z@p-!@d7>|9}hkQ0<^lUhdvDbm24`uf(wK+)F<#xEROaTq( z|H$vozz$TULTB!`XQK8w`Oodx<>Fvn=q?lGZg#Niq5AN-(Y(5wYM+=%KNpA8X zp&8_=@nT3z0O-@z&fwtEtuZ|n3}RxhUF4R=POBa1!t_kP2<||XNl`9iupB>rv16c$h(jm?UT?UXXdj(kB}x5p2j*L187r`zzNk$=YDBIh^$3*H$Yz}~PLSF_G&;7n{!XTV{D5xLYk=&0XQ^t3r zUd=8ep7;FrTw~yHJ-NYzQmrb+QtwjpP1)k1!w>>Bm=>A9Sb;zAJ)LiRHBAnJhQmB4 zVa%x|Jo0IS&Y*U_zor_w*O;@(yh@SORtw5R79`qyPR`v?L@9(9b|1GKiTt7Azlds0 zNtf5QnYjvp0_aG0l&1tVIgMa;qbWDejR@%@Z|htX>g{MQOu~mL=aY6Jg+3}Ygvb|? z9t2;nu(es63HM&o&IUPXOXma1oTQPYb4gW*tRl3f47E{4hJ_k4taLza z5SCU7s=C#V)KIXSt|$9Oh`_VVkfXybG-j{N<^k5wsiM$42fBd5 zK3rV?nr@EQX6wcnyzq<-#16)(DinAl5^el&AhT{`qKT0;nOuPY zqqmC6$?*$99hhNB^mGmAYaV0F(?|o~i%g*HkSR2Dz}?7QQA(s3?*Go%Ie|rGB!E^;GO}^%N^Lg+eF4_ zinhkA=!#&dThhcxxoU~#0P$vAq#^pFB!NKc3)O(pXUgT2tzgnhKdBw-C9MpoY>rAe-r; zytWapbSLUT-Xp+nbpQtv(>DZMGF9F$nxqEXO+mU1H|Ob8xMVFHxivFjDz{E27{cpq zfVS9+qQ3`2XQ+PEf zGfhRt8Kj-YgyGFCv09JXhFB=XLLjH(dR53|Dngk8i zDp{qrO$+e@IQ0(S6e%0`z))mN3K9b%(|SR3yDSX}F$}Yo6N~ZgFg#sqlhLIpk|uBi z*>G^NW$kv>4?HhWo3+P!uaIxWOs=8+4Sb5pC z?LufHP>~9VF|X=r@@Jdtq2X|R4bJN`$#Dhf*Ru)@rx5z|qhcdl>t^}l*_vBu0O-a< z4o|O9HmlSE^eG-PARi3M-8n=XGL90kBaI29@B_m;d*-^>72d+-e1&3*K8*GX?*^D4 zO@e@YQ?5unMPpwz5W#CsWT`L|8$ba&fNXX^ZHOUV7nbdYqRAp|AbX|fwWdxmpeJXW z(_nf62-|T=iYcLi`zpYMu3$un)Ok(TpzDI&avZ9`voc^ud+OBs+zy;kwun=R<*Fji zDNiGi2By_Nv!d8wA60}@i00(^up^g`oUuQuH)^`0^yoZ&+n7yD@bQS~WGQMJa!rO? z&Se!ug!xOiopOcHYsdb!Ga<)^?~Cxo-oD z#x8Hn6kI7FF3a#D091tY*QA6L!?+U4nT$;nBa4zK2Dp1!nigWf_EUp}h=dr{v#a%sUzb$X2Nnk2VHRw`2f8Lozl! z;HD0tj?;>yrPYB^II_%Bnh;-(1IjRB5S)DhaTx)Sq){cI*br)&Q&Naw-X-bAl5RZh zr@f+#ykgmfgwfBURt_B8a&rU^`+%=Hjs}x~V>KI52e;%_I@xdliPm%;AXuhh%>oBQ zZTWa`ye5Yb`RBFWN;@BpG9@__av4>`5xd%!&j$H4hSWAYR@qoQcvBhED;AAJb7z_^ zt*+K{H5x2m%uEiZ9D>opYn4z|b;v%#24bFrM(|T$-7KOmTLmjygM+&?r>vX{HAi1F zZaRLYTMEbUakzZ0(#;3MotPic;x!7yUlgulOM?%Erlar?#?h5dULQiPz1AX8?L|xN zc%|obmuV0!m?S~x>Hu_$S5WpRiJCmM6UO}`4rsSU^~}=j@KLg*8Ry`20(=+67L;$Jj<7GQcWoT0jiOx8TBcg-bZ0l(SR}feRBu=Q ze7!w)a@ramIHQxPfnq|X+UrdJz#E;|npu)&5CVa<9Kf>Eon>x% z#+5Nz>IGs+b76q>+Q=R5rC`e8RB@mhv)u4N?j`a7>G|!Y+gT={LLhj31VTAYL3y$$ z9}fwoCl=ccvfeyxsO+JQe3$xI~t)LH5z;vu|Sm-SkiU4>*yuRvou}rD zZ8^iL1JG9skRbB(_cNKXh_B=GMrpTZWl$ ziaIhYtCr;J)&Tm2%i^#?Qb>29x3bXB+;XPW@xw8?OA6IQ!+T4~beAls6c zy(WKV>t=GG?9PSusx(;J;XsuMYE#v+Y{=xD0@^b2jF!-aSlF7{12m@qeO_67xd`;Y zD3b_Rx1!IT$-w|*8!;AMy(3~$wl5RA&dMj{G?E9hBMDoeOl8tGG#?%8u0UpGAptI( zVn(t&uSUXIu2G~8+KDl0r*opKFb}F4{nEgC25Bmv?m{|S-C}OWucb6xS>2LfkTG2} zvx>m+Y!!|y3yEgU&;=SM2vlp!g&oK{ZQiYDhD$JTsvY3f74CO(jiETZtR{>q0n88E12FKZ8^#wKa1`Bb=cO>y=JE9JiXx2w z$G}+{7F-!bG@n~YtszA2)f9F?9`~k!;1HNzTb)(hSRsVS#_k*s7wPUg-dvrxnI;deZOj+O0)tddh}k2NQ%!njXt5 zAO>2CbU0B zJJcxxmC(SHreFaR^jI1Y5W~SZ3M>?WE`h!#yGJ+b)yxp(5Lv6fEe1`V8c)+hH7loq zl9WX9SG%&nG)8s{bzzjODkKQNs!mw$)FvmZrA02<&n zEL-Lj^jS@lkz*G9YCBm5fClK}epSag%aNp}DMt%(yi;?{X?BUMNv^bha8rU%W@3e2 z(A;jBo{=$%xDr#{O2WwqBM)xP*OyqT$ZaDbACj#hyQxvQ9Aq<8FhY8V#)^@?ZMQZA zRgn|23HWue)ra${LK-5Wwf>G*m)`{hQ_Nio6UBh`W-1+y3*rTQfm`e6TeDnSlUm*S zfQ?cihQV&Zs}U+drW~u%>|2p!mTri=1YT#Ua!=n8Nh6~?pCE8*gVJDA8}Gxl z6Mm3%t5i{@*erFHsvMMqQd`rS+)^|R)M|!HGD~3wPDLt0+^?{&;Z1}z0;Z_h*f4iq z-=fW^1?nd)L<5)>KqI`<+!;+rY9^q`#(z=9uABxZ<(y|+5~Zk_v1pA?ph6*TGn)JY zV}&(CnMJ@|L#X9y4MyiR#oT~+EaiglFnadmY``>XR?0gvgP1v!T%%d|G@-P|--K6A z^Dba(F(4CRq9O%qG*TYWzT%2NsKHhZB!buV^lsUblb zNopgG1Lzs??pd@xPPP{DCKP*`sL8Sc!%b*j`y$=nP4_k#Aksj#d_@$F6-gl8o$hYz z!HHCV-|BDN;feD4qTJ+kroHxuhq>`7dwi0+O0)Az)3g5QP=G!@U2;3@!g zywr(T2X1$nfhYxXV~^&HRiV_5_`wbYnJ!vtp<>&blq8b~*g^l7dkKngsRLtz>tz)8 zqbH@zOjD)Mz|APeHzZB9_<;ox*~0GF?<9%W){B(eboK&gV8$YCRsmrl@_?AS#K15E-f zr7G>X{Br|(UDPdcuM8tuiTsGn)|zsHx@JrP)mWh(Q5ZH5vl~Gf7xGpVOOq#7I>KVK zX0H-)i<%chkJS)=0HLM_%JbU94+7JpW}=;3Awg~We8Lgu%2fplWqII5+;Y0E$laPf zQ0W`R5y2Lws{&bxB{{h_D5OYYr4`p)$F|t3rliVSCTT`oleMmfj-j{pzD7;G03epN z&^Y;7H7L2}cKfxVMLmoDSB$TP;;A81~E-+WnUy!%BBnO`xVs3g9x-;S= z>dUV#3lKwqMDsPVUbgsLh=R*kmYfi^S09A`g4(729ẖr|IvYvjZVhV1R;EXyu!8 zo~QyB5g`-A5=d=AP|3gB-cHU!SMZPr@+y(h12&Ct0*giY^+k~V@MY*K@(BT^&m^lz zK~B>dW3UEc;n68M*T-#N)@PB;Vw@u>7pg7?JC~mzaxujxqwyHG5D+<@baa;iXgQhi zxQrJ|I&kfn1>N=(ztk=`rO*Ph-J+G=x zsFm9`tQ^(E7_~jabCDvTwpVUxED^mE{8ff<=T?S3o2zp#Fm2~TW7;lhztr@|s?c!F z^u-jPRa5XaXEGNKu9Gn6-mWz~kr|wD`nxdb!snE5{axO#9 zKmys#Ws-ySQL@rcm_h$ceFV5Wow;T_8`FX8{;1MDC?-b{S%(#O zLW(fzF#SYkU)YLFpW@(}QX$B$Nbgptnuf8E_IQdF3=LW-ESzS7C~gT%uq7Zv$Q!E# zf>v{6pz7706DqPD4~37*&;covxj?!Y`RQcx}>|v6M7|1T>zU<_Ca%v zB}zf|kvihAbTg>B@dp6<(JfFNfEamw$x1E+mj^|*2Bm-|o5?|Z3(ZmFO%a)tmU@=y zz^jO2=gl;hyabF!O|$YeM}w3gY>Xt0^au?SQdHg!CQgq)U?9WfC5aXSm-kU1gsLbX zn$8EoHxAUuUEZCVtPS@ycf4dgps56&tH*`Bqk?p6BC=ffT=+^+k(;OrHomFfoI>Hz z5BRb$19H${2Hy@WD9B5x`Bla?4YA z5QVIQLG$&2?07osAmk{OEZUAZxCEq$(YhVUNNLkVsz)MiqS=(e3pI0ZJ@NkDeZ z(=om!ZpnCMGyqTwLY=LM8kd@WFaVk}*_u3{HNB-O$B%rS_u57RK}+B@5gzPs@mG*t zYWrnFmW8ANWZcTtsYyt&Uupp2`C#Zlm^=+{0<}m8$aS$fcB?!~BpT4q)_d@7S=Bi! z9}?(SfL_882>=*6DB)Gi+(^y9OnOChg><&M12+U&e8qtp(qz?L?R)~dRBXx>p)roj zJko}IK|r`NR#N2th;j9^nhTKHq8W`&#vtIvRSwFmrDvK8XK)}pb!`CZIfGrcNOcf3 zmg{tTX?NE#@Nuv!YeRb(tqL?_;VcQP@^ME4F<2TEHUWucb9sfNZcE2;c&GmmTynRZZ@YdQO$r zluv26TNtdtM8E~~v}kZr&+Bxv`t)S3HH*_EV2c&r&PZ|4#F$^BuxXmRfgWJgEF%(7 zj1>J7l^OMr7o>!x4j3vF6UD1&h!T}9pb6oW27?~3P}k%W_=_ZqVRXqa@WNxR7P z0_aRB;npLrLci0pc}*U@lg>u0Jo_{(L?d1o%<-umhDj2D$nKFQ* znUSQaPubSg@b|hE^kJG(Pz2452y(R6gS47>NsvTiB?tZ#b}rByNOFTb%CDxQiTF+l zvdrhxY<~G`L*DtRV4GY<&+;2Hc&^G>XmUIJdMlv;V$pMI&x|TpN4urL#&6BhZxEt@ zrYD!79_$!UF7}o{Hk*OtQK`Ke>|dH~%*+_W#6d-Hsr-;rh1T5V-ufWh;p|AR(7slO zaLuFTdoEM8yiI&mWOTAx4;gI9sZl0-T4TD{p#oi)fwVfPKr;&Vf{3IG@truw!RvH31~CV_Gd}Hyv%1kK%C#A8ZrlNd zwlb+#)A@Qzc4`rASuJwL*sX!nic{2pBu`9dYbt>8@Pn9pG=^#iu$H5$!S^ihUQ&EM zpxg$^Ia29x&?VbkJzpF6^&b3PU@e!Ao?q|g>U}f1SchLb^6airwp^{_V?)uVy#8LauGPilJpw`Q>}5wMz0qNDdd3|d zK+N6oX?JuoJ2+Hm5q?fi*~0^n8c>#RxcpCM@urN|^5^UCv6-;i3$gpg)Rt-G0OpSN z;8A!pM46qO$aIz&tza-s2NQ~6LB<-c&G{+vtGUG}=1{+FNcFA|(2#LH zna1%A6he_acEQV*6%)e% zx;ijLmF=4jY~)SEF70G;AcZ2jL5>t~PL37C3do{I8xa^aYLJWuGIpUw)#2b&ku+4JprFMn46k9z5*W}O zjYfiNJx3pXDD!%`3z%{j7Zf|oV0x-J*c3X8Vt0wW3%0gB1?#ZzR5$p;CqYL(g&TC@}61LtrH-%(o8 z(J-T3?v(m#M1pX9%RD%xW>XWN$cKCvbPnjD=rh6_EJl8FnVBym3%kdaU9oIFD6Iv6 z_W81P`3uRTypnAWlYTjxh7p&dPF~~EkZ5?fcKlSnCNWbCL2Ymx`3=fzYL%5sYK&1A zC+vI*KHzHqpwH#-A68v_rkaDfoEkP3^h7-^xQ+w){it<5V!&`h>)4gE$1d zvvNACoP01get%ya7Csw}6ZCmAzdTwUrdo3uKp@lxH`A?^rnZOk!t6{Qv=wBpBe2?r ztlqX_TkpvcC7dSY|EJherPaCY{H!-TQC^(QjZXNJGw$dVIPUg#(=cVAe|*v&o{ZM@ z&@}WM7T;QBS}TR>4yPGJMGLX9CRQ7r2nZsGY(OgM%)pIC zr9!R62N#C@ZSAvLzKJ}LQ$(>ve^#&42$JF}83L=&akK%5q#X>C)vf}@(%OPSt~G-H zYV{mGT&WfD1F+i$$6=;4h5~H5qzJ1*=NiOH!474{t%#~qysbFNvd@(jSa8CJUza%| z2X^4wS5y$=T%o12P;8_0Lpk$luA}@eXpotLZkMAplBpiErDDglewZ1>l9x**?(+(Y zt%@wv9CTHSKu0VX@mA@?jI{(JDU(YfL}#Zq;NS>0v?9cq3_bucuo(2wQ4*C_s;CGm zJXhgl&E%#XN|+0xRw0cb)LbepW+>5uQboadHNXzY7PCfJYV9;m$%E6Z9F`47#qI($ zgbPasYj|I7bE&*y@UjmeBBv3$@NqM*jZZnxb(Z<|!V5=PEkiMebOZ6#!6q2)TaY9q zeRYs)FR6AIG5npzL*{^Nb#$mvU)qvB0l;dO$kB+X{C9<(c8z{KM& zkW@D`LIzTF^Wnk8MO5VaNG{>UmQM@MNiX5ia<7zOIw#XX35Bu%v4!EK5Kd+&mG-?Q>;SE?P9T`S6a!77|T^Sk*p9_bT z&RqFqd1%!t1a65N>mc&cpe3}}EoE{Qcsh{14U-L_mKi5oEj5Nnlr)l+FGAlp0WZ-T zcEknL;Et?^Ni8{HLJ^rb3^LW_>JTL@aR99F8BpzM3iRRnI9VS%-8Bp}p`k@tJOEz> zkA_FrC#lBV9qc)sbzyX}FgfK6_L3b@Y-qTqKAK6D$<`bI1v&v}FkSu|%{e?*qk_=b z)=GZa@*x4K6=1~7tWg}ONT6kcbF;JlM6(d28YHHqKz*Ms?MCdJaY18ht$*LfO#xPayMRQe@p?rT=@uVssxMryUA{m&P918o8 zVt5~YgZpTLjIkys5bOmpN)fM+b&2UD<4LoH=BhEvPPAjU0BcgynRlh3unAHyZ1 zCc47w$k>r;?Gd>Pcc*xT3V%=HZKW>6i)Ml+cW1bWOMqJw?&1 z@=ZRUxOPQ>2jJ95UrW9pdk|`X8>Ft!PUU->LVKR2SvIDX_Bw0kI)cUd<}BZu@ezS+ z03GQCOxK3{kbMpRQg20LjHXDa0tg;p6ivk|^V6bQ$~}!kT7{$|CN3)+7fajLKw@it zy16`q$j=62-Ux{2ubj$^Y~b5T&Em#v7_-Z1(Filn3`M1SH56ey{lPV^cgj#{?b9&e zJ2@c0k z`9~{_vBT|f{EQFFmS1*;mTb^DrIE%m;I83KPws=Vi39zGMp0HNc!t~xA=Gv;fKx-~ zJy`bE+~JidIi<3IZ$WmMgBlAh1ioBEnhru8a7KDL1-);!wj-0@wwq-kcknVaDfyoQ z+3*?}ur%`CPnii?R!tGKBiTj_-iM0aS$e}g1^uXv*kGm*XB+z2mcun5Xblu@DK|V( zTVDWyt!yrkY1oAN1MXwh0hFA5sBTK0AqviC_jjHCzO8k_6hKvG4YRakROEV*Y;Q8X zy;NrvhlUIea?>-}(FtdKvb4Iew7ekM-LUUWPPx-liLUJ6iQc{zqiJi}BzI{g_3ob4 zR}Pw)S)Zgk8%K_PyBW~Dy;6A9?#d?5-kwci+Dnv)YAzB?o5oV1kM^Gs=6p6Oc zS~|RJb0V95IJFxy1&V?@SNgWRxyLcMn5@IH0EjBq2Ro_qPR!eJf}Q+ur!d|rPIvs_ zPP(=eFYdTOs@hT{cm*43Xoj>bA#w%Dgo7O#R<)-Hyrrhwnm7$~Z4><&{4IB~-9@gy zN^0F1ZGcOrJ^)QLL8Gp52!%5)wIn1!ZP-w$?RDm|T7Yr1IeLtmZw(b5%5Ynme5^mdH!%^sSse2A7(%jXby*B-*k9m+=%Dv!eSH=S)vdpS|va> zlOkWico`bAezGKKq>)~utN_jQ7aj+2L*b>WqA9^-aup7FK9wS%L0r&D{{q~IB zS{iIB!$V4ic-8{^T63pr72DT8H7b4kfjAo zM|$}%<(i$ZI|T`b?WR(J*KPq2N0RZEXX#2K51eA?nh>la+Vrvv(kPb}Td%>g(ZQvv z=#$j@V1Y*b%Nj8kd!q3{&G=x3cZ(!K<$`ghZLHX}q1BovVca#%Tu+9RL~{!K8TXG> zc5vW!H^s?Ga4k31dNKawq&GSMvc<|xd?<)^OkRNU5{ZQh(Fe}50oj?Z)+k5;y9&WN zi#1KaRkH?y-QDvBhc?^r5Wr3M_x#z}%KAbclpP+zk)7d5ICZAEO7#!qHK=71G_8^R zt=?X`zZ-ALjLtPqcb5%PZ|2U-{n=^FYagAo8Z)Q6$@llz@rMTK=F)0vVtTR!pB*Nuy)9BFYa^isRFn!4~P9HrP$q5+mL&dZ6J=F{Yx#iCK%Ff-Vfu zXt2nzW0`1kTvJU{Q3d2t2kvZ#JpnIzvdp`hqg*m(R+)F8hoG3+54a3dHs(uXQ*I{A zQinA9R6)u+Tv)VJtlxNX_%*B6Q($rVm{KH_M%(Any1RQ}b#zc3?B&~woGA9J*jxLpsaG4;6lhnW zfr6WNYjmr4rCej0sr0FBD;q>&Hjtgj z6cWZHEziHKRxd;IW&__5cq$cDfqo`sqUE(T+QEx&D^rt8QP;|fp-6oqE#yO@&?53- z=ed+b0>dgs&^Qrtz9yYZ_tGYPE1d^t6-xwy47?^hGt8KhKc6(Plq;smT~3r@+NX(sj%fxHI-NZ)89>*Ab$X&%?8MZQ@6hX z!M(nMF@ciXIgnA{jLS5UeVk}4wrhjQ=eo1I^}J4Y*7@n_bbGCECE?ia?{Ps~vvTIC z&MtWE4mJDS9i7*Z=9hwgpyLK!Mf| z@2-mhQ8Qc#lcF_?Ov(4Qxsxdm`-}hEm+$$1|NfW$-G_ht>(2{*=XssqdQR^*pVR-f z=L~=M`I8r&>g=Qf0FfRp_<$SM`kIDL>o?jZP`d+qf~xsI@tf$|g;sfb&|RNj8|`cP zG4&0Z6v28(cYShL?e7-4%T!%{hxGHbM!*K}HKansE(slqAdbAyVti}3p}}+oW6RZy z^;~P_(t)F1Nh5*k$+c)YpUhWdo{&>tNXc zI?PMn9W@!6w@QYzjh?2hH^#`1BT{Uj#L<%fiXS4yg1R*@B=M6Ca#Bi$vWWxwQX@37 znpP|kEtR5yR&)a69LX(^P=3-)G}r*5$#!pwXFQSFM;=h06p3ps9Z zmes+YUmwY593Z2US9>M6NNuoVP^(|5|Iz>{xOM9q|eC04nX9EpU!Y$lNinn$u zW~i+um0Yy9f&fTJfFV}l*BV7n`cf&7YGQbjc0JlBf=Y1#QJvv`d>t+zH{gX+5b8{x zY&DIA=0q!X6-O-Lnh@9~<~8(IQw>WEEio=*NPcVINC3)~Ib!PwSZ`cG$|)$S=&G^c znefw4*LczafBkwVovU&qcR_>|^usS}W=&18`Vb6Op`NXFgr~@OxvnDssz?Yj%m{P0 zwqq?`lVpQ3gR`REfHEkr5lHZq8)bc#oTwX=Z>G04ZaIoHJoFgad8Ol5JK0Jb$o5cK zWa|idmXkvaR487`DUzo{;Sr5anY&8i5HXNdz^R6j1a-I2$RX(w=T2#-GC7&7%19^E zdr7W5K(_e+nx2yqCnT*+sb-RlCsPcttcnQ9xN%TnGS^zNY}$PH_jlRsPfpjRt5& zWZWpANziO|P=Phwu^!3QA|{ZCh6lYmaE~OgH3>kPho(Lv1`Jb14w-eZ6n4%E6hc-e zV_(iEatlL{Py_TL5Vq1b#H|>Smsr`%lPsC3Gy_X^51ASebyS@Vv^6Fc>SH*TOag`q z4Zuzl(={Sz!a^0AloLclT2ODa^DS$U6miNjwHKQT8_Pa=65T|mVZ}(2?1Um|NO_>p zF=o|G4I$D^v>Hx}%D3gl*F;Ew`^iFxNXzgE%tNUk3d4i^`Vd%`_9NXzYy0vwWdYZ4 z=rB`iXTworcA_>qu+iRvk=LALTT?SE2|o7oZ7nwD1jFiRk1uN`2ekl4#0+%4Hr$iF z2r;QRuAv~9Z{byqtLW5kOk4$_)JPzii2Ujr@Y<{?D9EnuSVhpE&l&}Dy^>t=f$v-p zaTElUnE<{vDB2ORb#;D?UqtgDQL$K)wEZNru;PTh=j|b7nZDC=+=91@VHe-qDCZ5xNRpd zJ4U4qWOG+4U(eRN*=jrKmjTuSx`={@1hQPCQ_8zTOrQOXj_9GXGQ$;&Aw|#itD@w_ zQ_zM40K0b1%0ag^*;2Ohtk54u&o#NK2zU;>Hon*e5L}eJ0n;acS>aI>ymGeOk`GBP z0Ghb~bOy409c&>a;MZ;;G?-pWd*z)x!g+E?|B>D&1}7zv4PGGK8OSafYh59b-xvT? z?Zt|1r=t}SwaP)MYpf!$*Iid*kBcPQE?68+c8Z-uZJZw+dV@X90*3|nchjwLZ=4HUf*Y(!a(tpNIc+?z_tLFZM&8-; z?C8K7?q`RGPJb`eobg7e2pT@+vi2egdIpnZeVC{X%o1V?tp`XSgT;52$x7D=7YUeM zO*WH^R?g*0Ejs{6Md$$4K79;&8=-6V7k_%+hyKl%KJ|@vyy#2M=zr>ogO6O__|P?t z_g>q%>-xdd_If*6gnCd-9RvwIvoRke9<`nQDW4FO6eu77WJer)`!{sk% zJTBy~9idx7TQrm+JFGC>s{p>qs$e3PHo@D-3dX@t-q9{ditt_nSuu1eI&fGBJ7Pn2 zi4LSs_7LMM9d)&eE4L#Fwk%t@8E*|B8x;q^5Y5SVUaL|_Es)!vOcwIa)}S27D=owz z6d9_gh|~`h<3(6(=DRDjfQU92TJEnP@0#tx!K{MtL0Y9lXcDYGx7OYk0dJ9;kt>P@ z1(VIl?f^)eXy2z@l{(qxB-fnEb6j&NMz$POYWct=-pZWT?b(DEB&XuTn$OkfrQNx_#GvyRUN`t+y zbwM*N1nw*qM0X+H&@DU#0cT&a9#M2m`&1>%6RD{QpJo`AFK$AlnmD@2EZK^A_*x3x zSf6-eHSNJ+L&$a7D*{q+OCyZ}&0G~`owN(kXZS1_YVfgUmz!{BjV^KoxsEz$oV!KL z-8?wUmGS^_4PTZ|_cq%+xG7_?nOu`L&KpqXZJa4`hEt2eOIjcdH0Fs2p#WeyjC;$q zO|~V#*DHkyS8j!f0TF5>P_D`~qTYqT&ec5e?$7{n+buQhJW{9X6+NnvLrdc7Xt7K%2ipDl8N_4vjS;qS1)BWh!0uUY6o1JZel*0FYda zHJvX~?pVPzKio^16#(qkGEoA!`?<+UxN5q!h=y9TCK*m(-;t8SClzNWf$Y-kwAI^a z0}Vq3W=e5yI7zo;q>eQf(CQ?7wzCnk!uR!>IrSZfB9C&F2j);T>>7@tnHR`JFhrk{j;_jWBH zJDjDuD{FL+8=WA3$apH8WE%5KQ7=b6SB0cLBJ zdenTyhlAE>6bn&TY(VtprrF*~r_8I zb^B$_4_(=Q%DT1VYu1t-j$pyGc!4zx1?GbOo^ND=L98U7xvfbA4j#)I<-I^Z2dw}# z1-lSm)6ky`uQI=ysc7ihDo?)YG$*M-2tgM4(vY17jwBMKzzTyRbR=-OpcoNgx1#N6 z@mwtkBDtO^K(`}#1iVlSKTQsW>Xi(J9Iv}h?Tsx3Ao(2QW z!pcUj0Ek);vfPwEiK`XV#BZb$^$-%WfTJPFw2eO62E-Lmus(zuixN@2c`ZqWOac?7 z1k@y2WPzao5*TupSB4OIlvlSJlg(EVOW^Dvz8j3Y>vKYF2v8R>Fwb=sRK8aq7Fshh zp=|5~!+jp4r`P(iOwq1(i~SV}9$VmL(3~mS68u^d#JEiEjK;o%L@c(FzI-Pl z30p17(ki{OrSJ&=BQ3=u#~}bWp3b^RFRgmv2zFCmQobKGSS^@n0r85OUCk8gPNik@ zaWy}%3+xJ@ZGg2HPq}i?hRzG)j!Y{us({yaK9Y1b4JYLTg0{d~{vMfZS#hR#M6T{v zAi^Q6d}}8$;9K9?Nw!f?s0w2@mxG5vZC#eDb|`k5PnoTYG6UZ^Gw=vr7sI^foy)z? zm{4k&T-7f%%HhDthX8aI(Jn7|S;IkmuMpaFeBK2u1li!1<*7nvaZ5<79d#smCTRGP zFF^xBmywrJ8Ki*djWih=7SNg*9VgJF$JWAb!7GQc3J^Aq6}$23Al=kDG8s)jS;ebE zufNBBDo}(!z};#uv%>?e;H3#H``OV+$g-KkGMBSmZ#U6d356lWon3!)7;7$~BI6T| z#KT1_&=NBMvD4eFY%b1C&w!^MoO*be>g__kozY2uawgSTT7v^;cmlY028T{>Pu_v; z1^Fa`nN0zDd$9XxFiEwSE^K`$LrtPF2kUdQ^GfrxUU!3x(W*L)sixqIFDp8BGMG5% z2lZhD5~s*Yh%t#PC!7M-@My4GL;tkSVv9bnfgmtfHK{cs>~MmH9xb+d{plZn;(h=6 zS3dRix4-y{Pi^1(_~FMMHGbdK-PJ%@u{`!)L3{23C&j3>jWjnF)LqBl<048UM=?pvKy!4T9V@+ z1>6(fUDkAYnLA+I8bFhCo;>hS0KscnjZ5*YT+=kjfl90KbWM|qx+3Z1gA5RYOOVKU zLjYRo+7-E$dkUVVCC_;~WB1TBYq_lC0!v{Cd*rj-=)GorSkZI1p4`Q>eoev9e3_Lq zThA7R3LOb}MM#)IKMmNLxOy~fzzzsT_*vnI+B4;mtrYld@kH>h+))TX$ZQt5QV_xdi`ryofC9s*WuTDTbrzhJ z;g~0u+D@tI78I;wi_SoNEbVFh@noa zaV;b2jr^2VM2;f;(om}cYH4BEWqlYA#?ev_um;*96-CER%WZiQDR#|r2h(JA=yul$ zO@^GO8w>w6CcEo+TXV`& z&2?1M&3C=Y8Gn4jAD{Ba(DvQJ;(U92(i$8>x6@iBea{-~*@MH}?5sCF%#KfG`v;Nw zC`Kl&b)vVM86KqCD+PN}gsCZX+wC2=eT87HY%Z+L&&v)Ez24etPMz-B?eELTQ|U*` z-Ap)f4Iek|eI}YmMe97Is;Ig>usc&9MYCb5(uX%`Vuf_`k>8r_`1PGkuwzws(!q`$ z?qvI=#^PI_`skm3<@3M)?w|P5)5Fg^v2)i=gFCJryyuF}N3ZNX{a_HOPVzk@!H9hH zAV8S{uv1p3xnv0_(HayHvrJ;lDMaC<=>A)MTwcI!xl4mzIZZH&TDeH3Ah?IDX)#7$ zn5!6gHI3|-MG^rEA-iVr)Z*o4BoE{T=`!fwayv7+Ry3{nLGs_oqabV2nldrCscu}5 z!-<9s{R+KZrWm-G>70tf4C59>mHlD60j5qc&Nk!8{!pZ|xq%U3X`klE|?nhI(h@;iWA~LDVE|jEBfDg?)lz$7z8_Ppx1s3VLMsXq6 zd=60Cc&4L*Xp~Pz5`*su7zq_4KLkK1G^m@|nucmCJ-&sUZMJh$=??M;6jJj=4BeJQ z0g~LtxX_+~T-3H>W|?P$aeZ=>bQW>})Y`QrB!}OgQw*vx-&ttDBNy1xa^z4% z4kiTa03ioPJAu{}O2}uf=LaLVCgASvU05CNd*P%q+~nGGARDQWYfP+aH=<>Iie7DG zK@>C?-i_NDJrlypFfA&r;oOuD4hp`hz_gjMLYqnFqjp{fYZ^1448&`yUOfd_wo6pC z867oKC4n%Y+(Wo(F-(*XdCnkjpx!zgWQuLYpYp2cbGhcE(4O;Z5iN<^a)N#`humr_ zq=CqL&Z6-kH8n`9b&9D6S|GAH&Gm(Vf{Dfo+Tfl68)%zw3uzN0TOJ^VI%m1&XsFQP z6jWW4*FjZa4vH$gHggCCyH3F`%LWa7j+>~h;I$d3%;`!*g`I~%^B~W_C;&|+NDg*D zQkbudGqQ9S!Fp)2S89R66wk@ka@(L$`G!{#e0xylN;_L_$#R{o0NDUB9Nd9%XEiI* zD~DcL2id$*1ALds#jAqyrJ(1cSbLE4CP(CZ$V*_`cA%L*;BOw_g30Z?mo*15sH+u5W{NY&i<&>QW0 z!+qGa)7vQI>F}U9IR)lwU=XYiry6X8-Wme#%J<{6)7i~*HfG%!F4(f{O-6B6w~?=R zt?q7deip0;)6--nuC00JR{uZ?@(%VA?X@PRx3%PB638AMCbiNz3L=zMIx^GgA#bqBz%wDHHlx%X(>mq0g6+mg>lkytMmpU(34f%2;idvjdtPtWu zV}R|7$;!eYINmNSKtHDp+d+RYh~BP2ORZYXap5?$-6+e51VfqSQwZf`vlL~tN0S3< z^1YSYm=p)Qx&8*A+_F~?O(pjgWLesDwUelHcI+a|x4AwKj00_DS(f!&PQ=FjPBbl9 zY@?R|#6WgZBQEF-plSz1)4WjGIs~=U5=|Xk0BgWCW5^CNX01p$EX$d)2VYSIYP`20 zJ4vlC-we$^R7^ykMLx&_%8A^PwE+RZtC{d#(9Er^oT>vxbG0GZU7ef&^o{R!-Dn;i ziX=HyYGqqf*$v>EXcEYYvZjgW%nWto3#jQo@(+`01mp!v6gY-$YJ4%4spRRA;Ii=^?;Q=x|W22z|4 zA)NqCi!YuHV(DxKf#Fm%@x9baAx)`IK#KM$mn4nEAls5=3{be~3qZBBqo=VrdGZOP z&GZ)D)L5}0zwsly)(meTK9jFGvRYIWtIsQ1dBuu?bf4xXEyPF6~0S6)f9= z2$$P3S>)@WZN_kXWnyq2zHD-++OQMZrfUvdI4j?3How%8q1?zA@D~k$i|u?3>TS4l z)h{+6`>xC;0f3JDKv6JPid;J-E#rH%QKd%iQVgEHBSNj|0~#oo6wRVMYQlQDY-VK8 z2f(1pAYL8IpSr1uh*8CxUTEH+CM(X^Qo%GG&bEsv##=DrMMf)cZDRFtrn9uVE33PP zP|HZ&k!uG#+3|@~bM6hyGK^X%eVtGMzrAE@sTCcAnKw8@7;t^OHjP$CnitcUrn+mz z66tJwm^Cs3GTzioce}T5mMqw0=V#MAtG}PV2@7O%571aowb{*Y<~};oealLdzJx_e(aWSy(sv`3kSdRy#8-Kr~gY&X?^8s zo!4H_IMog==+(~kD;Eue%ct#YmYsF8vEw$PThyrbwaQm8b~@_dl<1{d>XOZ`^gyUop#_q{DBUJn#Y)k~ibu1n-R2mO0;9L{KIqKA3fQEHe+n=?_q%fm zvs#}w6{Ckda-%`3tqtL*qAFeLkT>0uXr9Z903z(iWdP~&$&g;+D83dN_nK3&7J7*B z2n2#v36*ZLCi9?O8VLU$$qA8IKVQZP+6fs)r1O)!?#JSHF&K~>a*%)T2AoT@zM+-g79oNldT0J>8j z6uQg$_@s$LvMzSlxyBT5r|JMo*lxm?6LdBhGXu_B&%bR*UPUi) zBtOItApU+S0h*&+YRpgs8M>MQK;2@>aAXsN#D_rxtfJ2j3?na0EI0gW$0;BTG*u_% zmAK15wl>-KlTO_7Ga7HKA{FESuDRnCw-n~VUy;)uI{Z&exU(syTt&0jWA#X-|a%(R>W7W0Ey(V zX~W1T%Ip+&WDhB{6dZ%5Ocj^=+ZfP}+=<30m|AZs82g>I6;9)zIS5`An$vB(_9h27 z)<-@w-<1>qdX_cAI zI?-4}YU5Zi^@g%wfbZMoedUf#CT6On)7$e0hbiOmCmVNrWsgsg3E5^Rry%A)zgDH` ztYhIc-P?;cBu=z0K~FOw*#YH!;9E;OuD$Uo;6Bsc)OIiOhll>)AUE9OS-iDqHBYRM zBZa2joB|W58ky!SqdCfe%Pdg^(EAQL2Ti%u<(9O@X*=;^H|($f^u7=NufOrxZ@ufq zzw*@jFFv_*-(#EiKBo1FN4Gxr`1VhqUq8PeTsjIb83mV5npds**R2OjAlt4=zfqjL zvF0hjM!QQZ9LAu@W~3oud|<_?QIFtan#$4k!>J!kfeBa77K+kMl zvpjr_MuMdBRVeoo=(bkT1kPp);vgMR2vU^Lv>F=g1F4~A@GLrTMysSp-GYV+$%4kjCaplR0YRrZfkW-YZL+cz zXuqjAP}%KxRE?5ICe^yx<`||~=q+;{14qy1uk&8dv$9QAl;%tfiyq#ipM z#{4jq4`ezhD2@lO;D_UUW0FK!uJjPDGO~*}%h%fvhsE}yvp7>5?&e$bN^hfxugDei z^~Kh`O1jX_g%f!bDmq6N=tM|>uo+3;oGj+Z-E>w$(bducY6b$tB3GtS&N4ZzNMPlY zz6PABMk)sxOkt3$V4|Q?;ErtT$X;JZf`aBUjNI=W5|EWEdyZx&P?N|)L=F|=0U+>k zp6j5fY1J-SZ!AHxtnFSUs>zLlY|V$vQ-_L&9WCA{_H7m}05s!Ho*mctz(KmV zlo=qtpFVR|GvHHB9=wLpyTuUD6wA(nq>5^t=Ap<2E0?g1pGn#mXy&U{wt^TCF3X3n zCN~dXK7Vjwpfj4$0H#bFniv^C!_DNz8l-z0&kwTfqA41yG*6T-id!TTzofaBW~Y&_ zwz-%G!MHsN#)Hra{IYR7Awxi4UMo;V`wavS( zYrpDL{o+w@?Yw>Mtaa_QdBduI)2hGfv?8!kS~G-&8ZI{N#sn0O(E-Zsh%t;ve}|iB zzZ>(-V2->F>Kc=AE25V5K|;}f(bKoVhUCKs!Y2Hhu~eW-K{n;-LE*KNE~55EoeDIK zE79lyIJ%a?GXct3EnE;U1gK`{ry4`^OHsNp!8wH7S}L*4+jPIH_eZPId=Y;wJ=b={_w=?SeA9)ja$0*G-0v};sfh02I^0U9yeHzgyu< zfo4t8fk#tvHyG8&2ldfD{5KnpZF0^x#D9@VWeq=ydh^yAUTOo%mHw`B5FwS{EdrQ& zF#bXfL<=$|+nyKNGp;Nl43t9?Db5qAK&PTGfv_=&6T7IzP+-JJ6#2R+-d-f>g4&2f z*|=#QU^iHq_BCecm7+;kVQ-PgR#8)7VcEIRmYuyLQEDcgr-}`Dv|Fco6;vH*6sP`+ zdLx-oJfK#~@$fDp*P?@JkTi*m=F7B9ppS}i1Fyh>H6B_j$_9kwg~##!PzDl$jjFR;z`%MaVDMEq9J=6^Z~Gu=sq`i2{s>tESDY8I3w_ z4JJi7;ictPYYhZhS`a^5k3dDCsyb!@q;kk9ObR8Jgb;1lU)XxK+?6l)qiutSDyUrY6ktF|o!>u7SZ6#tpb53^)q}r@Cuzcv68!40%ts<#v*2 zuC}0`X={4AH`t?`$(B~VLD(d<4ub?teREN;xhOw6kqV~@If96)^pg$EV1}Kgf)Tn1 zkew`d(J-9ON=|I0mWNhR8BjCPLdOp0x%L9OvEw&u-PIr5^FBfLyMOG9Pp*CHv8|6@ z7k=of#(S>_@3^Y_s#DF2N8xqz&h_)|b(7}x^Y)|H{dK3gLkrdfKiYkh{t5oZxA;Q4 zuWLO?^c&%z$fKf7p@XM{I4!wPX(@oRTkU3`pS1guE~9&hS);sb8IUP)MVr6i6nOm$)bFgW9giFdrlGY)pa?QE$bT8WFrR9RUw8lN+{5vhTSAf&;vMF z)?gaYKzBt6h)4}@n#nJDj>}M9?f|=PI1=decm2-1&|MY#8*YzK@_fS%rAiB}Al>iWl06@S^rES%ml`Lv08I|b6eWjzD6uEqq5=x1CDa=hG$?Ckv2TN)pk2vz zTH&bVQ0U4GVhAJD?A7w2s8uJuv!bYThUAww=B&A*!8L!Go)Y%x0tK6*$ji${PL~ML_k~=G{dP4 zH3ovkqh;$TwX)@wxOT3NBybB2S+qfIp}AbMUD>;htDmlssf2@)AD;ZajWda)0y`Dd z%7WI=;aMJ94t+4?#WVg69U!H-0QBSmw9BfGD!kL&Lbk&6bh0r`wX||$y0ro;A;O~Dt%cLy zO_^2IlMSuRo9XXc-3`FXJ}|B6?BNuA2bb;c9%3L-85lU$O1lY=U89Ry+t(8AFO$&r z*;)48{sDyALzJ(+} zI4Q1w$7;^Z7+@8GAsT;YOurSR^04d~O#ZQCpnlHys8ER?Aat>>80YD&E5WB2lWZ0QT_QIH_sJ?JC z`oByTv`bwHg$bqLbG<7gHJYhLtDI8A)>^tUk7RtsX_D8S9747})S6VH*@@*i`l;+K zil?mZQEKhbLln=t3_-IR3V{^yN+|w77@&XDrE6LlmYy$-AsYbS*_PsQQ-QME1Vgzk zdlgVjL#Dhnui)1W7nXH?I}gPM99uKR3YJx;XLsiEl&JRd-KE!>X)LbZmz`QPP{V^# z&t(^;651Mjl>BSRtF_Qf87fLXBF@=Bwh_dPCh{m2IbXqVP5@$lA~{s;d)CmL)!{BVKj~vrbs%AyW^X_Y)C%7enP7}d6TJCEJvHEzY)JrvHnKlG`2?T4cUK9K}*<56R)X_l!*gSN@`QV|3})gxQVIu>XhG8i|Y9}Oq=@W2}EJHvzRq6cK< z4E8)!(a9Nad`ixU&AHZ)Y^_oaB*DTT9%kY4%|*JQsNW7d&ABt&1G1gg!Xsx{LV8*> zo%brWBdDl_E}DnLTVoOdNqcKL!wxOJ+)dQ_z-}w0Z{=-*3^9S$w$uB-N zy!UafJFX4he`WKXmp0yaY4euD+Qoy)m6Ph#W{XhTo{HbnPU&{w!ya|B&b zJW_gltxd(ktu$PzHIBQv?%Zu~m&WeWmA==SYhqzVGZ?jwaJ5?=?iPA$Dk|HWxy>n@ z9o+QM0!<`w08~^O0Z>7MQIQ1MMcLfVxTRv(QNs~AZx|?%R#A>Pm11Y%$~ST5X~I++ zksvu|G$EL{Z0>v!O(CuVsc1-uE9x^@)>~-NcSM5m*XDXiC?vYKdqJVKNM-9@tqZy4 zLsNi!W7?dZst)(4CCDk*2gEqlo)-=&sxfrPGyz|x^2>vDp|>jbR@vsX(pxFKlzcYi zyePv3#1<8V2BY$&C%6^;%*U< zqlr1TLQu&yg{CMiuo_DvJb0*Pv?pAlGl(3~;`*gXCQD&77;X%7kO}#aAU|NZ5+}%V zd8$zVR?RrAY8t2fQ!@&;Yl7JLqU2IO5G1*J7N`Z^U5b?7x^lyF4TF}!TD~Z*JT#!v z*!|Y7A5wd0_YU<s+VvgZ*s@WU75Y-HV^n*(rXfwpj!@h9mc^twnlP2V#^~gh z2guSNfW=DJOmooEv_L<|uF*)Cmj*zzUk- zquPa`lznHk1KWj@xqJ;{v)L$FtpqmP$eI)(Xf# zxuPryj!SLuy4>G)nq$j2fw*nO{qRtm+A~ldQlF(&1Y@}{iWkdFycL0f3-F|xL9T=Y zYAi*ks)LoXobviS#S4b=&Q?H=kqbZ2$`2;;cv({xQznXt4B3b!Sfrp_E3g2^PB2EU zlc#)3>>{Gk4M+9SVZJ$22y&E$T%C6z6Mj~QyW!+SzBSjk&~zRtA|Ns71WWn+4>&{;S^pRWL3Z|z7KbO@t+$%R8hqYCDwh>WOKTDi@{kP%|mWC^kIatwvo znxW~K)=JJAY^6QO$&cnF5*-Yw2Y4~!io*D2;X0VL9Bc{=ii9W<{m(aSK1ZpoweIBV zs@XbGJC7ug1p^Z8mJ+;(BGrJ}#e@aPEy9S?rG^Hy0dy-T3xJ)Ad$4}v$u7-6gOeIc zMIrFu>}3!?g;1pZi^9vnl$|v2O|>f|h>pnGBYjRwT&AgE+0!LLXmwPAv3Hk}9$;Mr zNr7yz*qFHiRyj&5V3S+P!k1+R(Qsm}(h}9(&cX4^-qxn!%R+5sYrX@(iIon&Zw{#iGiC{xXj1DSlHUVm*X#N8y< zU1u88M0Eg;Ly9x)Wvo8Uba&&yBwiaP=&`{>a}GggsB3=@o|_*Y`n}zxc=XU8odC7d z?G3mLXad|aT$s6$+~W230ai0$IJd~ttfdfzus6Y9tudy7&8B!dAfB6?%Fj-xTWe$n z7rXtFnPB3QLvIg0?hOybvV$3TO`gh4f??@(_c9GVy0SPg+gZlpGQp%WKU?2i=yg}g z`Z!VTgT)y+gqT?ah$T%D2{Wy!-&qeP*--|`n<_{8tL z`6VB|H2eOG>+ig<{`L!MZ#}>M?sN6$&PrL^4_&|O=K8t(uuvG4i}jk~KFhfRF@QLw zvF1V`8)%4mwTN4RK+zAuSy73+JnAS0)Fv*IXiazr3ezp+9|Dgy=4nk>*IYr_zSR|r z>f1F1kZ~Im3ar)Hi!wlq`+&AJdBve}%28ML5VPL7){DtUxCRAZ7MoC*>(?_{)U_Y+ z%1$^We{uuA;$F?@;06H=-v?(EA*9&Yfx^S)(6wbQXc~0zH5yigmcsfqZYgU?eE{On z@puc7IIaX1i-z0s%IN#;8GHgbOV_$QRBtDfQ6D_b_g8i}^4n9ZG0X)0Onsn9F5R^j zU$6DDoq3_Zu?4#=%7Y?8e-?tsYG1YJ+aj=9jzGk@r1|TBEZ`38>Mn&ytw6W!`UpvY zXtCjv@^z!k@-3ml^)51lX!rrq8*?hgf4S>5CrB4S6K*I6aM)R;-P@cic6Y7X0EhN>#NZ`=t3IGHxROj7HRWYNMmSeqtEx+};Bg6kap?-0bPkKu zvK1x{xcsRVF@{==W^!6R0C|jFr2^=)Mj#7;Q>gi+!1h7vz{%ABXeV2N;KSl$ znJl23@#HSz$|?e6SNuXFuP{Cyl?D^Fc)6AlFf4cmd}lyp z<5#Bzy=s#zwAw&6EZ7@pHaVaPOeY&!OV<(^U#HCijBalaXifpmV#m|u1L3oqazu$k zwA-tAOEE*d@yXomj5j!hwr3P{dshOcyWwK;akLZ}B4^>UKh$Er+fhyQ05Ce!T2^ z@3`jqKRWu;>%M&Cw+DBgGr9Kk(bcDot~_;o{psWPZ;mQ(DRA=b6b>~U7c5N<1p`JL z$7{O~WgbLRYmkCL5DOG;c(83|6M`4*0p~VkU;$48{8_?1z;nU~3FC&NipnTtwL7k8 zF0h4Xo?TLLuXLHXNosdJuz(IbW8WT7UNam3k;9dELL|;qg6A0zd6`LICN(3}I{a=t zaxz;@K?}3hC!QSa1tJWRaP z>)nYq78a31cA_;E#1~_@B54dqh%*3f4)+{vWfnFAM|cfzVAtAYs(QH=%v67dGu9Ek z7T_D1(X!oVJvvS)N5GhT!r&|i33$dh2q}J%4HD_mqUo~ikfDiDhVzND0h0jp))D$z zoU~XTq?%W#!PQm0zDJ&L#2-e57Xj+^y1{xnM1N&$cA=xHHH`*94 zPB3uWJ@^(8BXy#e2+k*dFIlO%O%6OV<%59^YGL-vZnEsV z-&&6`LP0k*(f5O-=0G>@G=|PN1211lEU2kTCNs5PwJSVwh;BHDa0_T`802vo;$vw$ zY`=@&t_)&Ex?v-6xs9QWb4XW}GF*WHb|M+}5B`C{CaAzJ^)<&NEeK(}ZfZEru855= zU7A$2hFW(7oeSU!So1HxqS_6~1hOSl6j(~s>>V9n8DJeYl5J@~JO~cxE5N;w(kiF0 z={6+;(z~UYk`BrbDCb2RDZ-t#LeS%%(wzEN$_Zc zGXf7qruGDgUo`_(wAb0_b)&cfJ$AEUg2yKTgIc1n0q<4xI{tFRn+*ao@C{EKQj;@u_<5zSAh*(#RFM^liLGxIWY?UGDDdaWf2r;xdQP;P4|=8&+1jRB$XN48RKtd`3JN-o@ihT?uygLM9-wkc74D zkVq_m#^Z;bLNpm801I9M_(^qx+v{o`nf;DrL-pVb<J3Jh_;jl=sKb;N6S?5ja;Q%755v}D1$2;G49wHhb8fTdZ-YM6Uo!TUP9qhLqu zqr@^Cj#ajB=Sb`a0&4*e63CV~U0EbKoX@t?XCR&nTm)D?Xl>J#L0hG(S;HofZS)o0 z(R-Xaom16-)VP0GP(CDcfm9YK4t0ABf@@voXamhq#E{rf$_;i3?1J5D*HbuqMnuak|m2W$c_%1F|wRU@A)_wY@q~c z!$B=uR6M$D-cOZn`3k3lVp|-^o3_~}eqQZDfCsf+Sf$i{V0PyAFFYAM>Ed~#plSKv0O2lYkyraZB9nsIP6>dNjOTiYy z&0=nZPP7S0&bpgmS!Hk>$ew|@ooK7>FKgahX0pdtBi!z!d#vd}P@A>&FeKPouw~9p zU^6KZt(GRM7L;|cfh{-3(|SLFsBex6PRKCM*!U^jU{U)p!|vMN0(zXi`o>c&T-Big zVcVduVR-DYjHg0O$tn{5Ai+5AZB-wY6sMy&Ke_#?=YD+nXV-t}d+!-PbgqB%Ipb^3 z^bVcwU4Q1}Lpy#+n^f>!I00@7EnE}TYq*=44h#xF?RMc%gT-)!eRfTvW@LN=E5r4X zCsUSLGeKpH8xc6DD^ArMh>{kU1IX+2J~*m?={RHH73;9Do0Z&<8+hg+dmD;d@3Gll z1t9D6>IyWM@J~4&#f9OKj?n}e`FK+$(aXlo4L6fSw##ju(F2HRPMK%}xNu0>Xd90r z1UTe26o3-}A9dZSsPtzE2t3Ig$LB=p4P(r(4?qBc#=~aMAg~gMhoHl$0ON2fAU2tN z&Db|>PetuBZL!ZO;pw5f(83Izt6rh`Kv)6$2V`R}jXsQAWQO=C$8j>cB8KUJTKex; zhf$pvO12v%QI6jzxdF%v?&D5y;!SEP5su)mbC@Xv z?t{^~S3v0l!N8?9F7S1TT*lC`4kz#p+24wBl0gNAL3da~C>mr75#8_D6J8qPk3)9g z9aJh|Cr%43C5Nedb>Ona?!H(DM~*9kD-K7e-SePQ86`JGQ4B6CR5RBBvSG*_k#_B~ z4Iv~v3*R{*90<+=OE_oPm(tT9@34Ny5PhatV9D1wBpfPCGGpH+$OWxkYpN8gU_D$t z5y4|yMje%sj9m7$(L$fa;)V(pj0>#ZhhsBgW5Fg6A zsrHz%t@X`*z!Yq?r$CQ0it=il8uGaz>D89jhQFfOZM6$&FI#NQicg7qr3W)mYwOq= zlr<#3*7G=+iQ`x85^&S%$J9YEI0KQ)$B3cFD}M(D33uDUpy((@_!9JP-)9Yz@)qI}_ zjO-|kjjWn@Gi2)zAecjr;RaWOlm=TzGgefN=QSs%G^PPq)y7k7R*tsyWUrjb?nIk%yt;0ZFZ4DuG-$2&~n!VS%AIgj}a@a7;7he>nDK_oy5jK(%0 z;-GoO_`4;9m;>p`2#m#vX83qO4yeq`#dBMd%nl5R&1R<*QZXF5 z0wR@-_CV;_8cwWe1`TB(Tw|vFtwZ6U1E|UfBb;dFKC>bN7Xm*4c7^$rcx(n7+692{ zFFtLWlvfRiJ0c7#_)PAeO!1>&&pLqJD92(&D}x=EB9XHpLatBcKu6edaI-dePmJ;-sgvo-|n}*@g9`8NjWGEsOZL3ikB^W`oGKgd2md7)?S$?zdr# z!RrU zllepqJsupD2xblk zHi=H4yIYfa3+ww!ykP1G=myS?W@UC^of3l4RtHLXI8`}G&6W~w>BYXbC?Y3z^L|+6KGZEYDd% zi380_x`Ry_#eVFu9biXWwZXIlp$+X1-1`fT!6w`MUGN)*IQ|VahQyvr6C&FPH>wqM{Yr;* zZdEYaU@01_tt1nUC)mw@IsX8=(bqMAo>Pbc*_GBh`^s$F6LrGU>M|ar9?O4lgb=5U z>Oz}{&_o$z2P`0;)jlV{wfUIg0bZvb3l$tQXOV&LP>hwibTy!eVGF@5Kpdjd2_V@7 zss?b(DRTMqW1J;3SZTQKF3jp&@ut0W6Xy`z1iY{gl&OGnP}T+z%jT%yZ^yY}0%Eu> zkHpD`B)8Mee!io@^??WD2GHHG#Mlnj)WR8_3%D$9zS~Q;H8_+a@_-+UhsgA1*tP1j zCI}#a$K4`=CpbJ=^xt46qA1bC1!9&r*-Aeh226F+V092@3{DS@M`8jJ^sH;*@NC>v z9P+hBxx(7Zuz?ez^veuJjT$O+-w-z*tq#Y-MLG~GZU(qLn#>O|7~g1_OpntXfUIqf z;Y9(FwYCZE2|tFFQ@C(4)VIGD;84NUrkHQD2{EYC6N1R)7zym9)5IkZe3x*s^kJoC zG$a#%tD5{pKqtgCi~)FxuVYiBHjs^@V&p_bX0QS?Q*jsRYhE)#($ZP_$gb8n7`(&2 zPCN!NQ!V5<^Fx^LLGKNu2AY{@r1d*cpl+m(GDfjGCd9jp>mu15R-%gISr;EcH0T3n z_~C^)YC%vtfsC_lgV6!57tCI7T$n7pf*=U=VFIjUv$&d)6G+yp!;(ODLuQHyz$%6= zyPzb;R}du{e^Wy2FJ_z2Wi7%_Jss5=zV_}hcxmb8Ae!yvfY9Rb-OxbB2P zybm-{bkl+M*Ek@lnd6?r8Erb6TdGqg#0{AJ@l=Mugp+Pf@PwNw?P7>k1SsN74#dVN+kh2wuH|G!{t7%s3 z#2swv*>LG$|}dvtUjDJMZBJ6 znRq=aI+K+eZMBAsP;2qF5pBA~-u9>fe?Wl0klD+vD0Reb2YF)0m0naa{ic((-J)v1 zhn0+Lc+<^Zz{y1VJ~LGu<__`*ML+{ms1EsHFqc{Q=}}V@Ms`Hk zd|3=5cX0WlC2&cG_9HXefL*~?_{;#5xZ>S$1yUE!0P{@vB$U};)1-ge)+_8;GGGn{M>v_SK@o?Q&0$5g!Bd7c@HAqZ z>vA}#S5CMkioe+xf^&~ycX*Pq4mib=Yz*)S0dRD^dlQ%_9xbb@nU4s8N$d_{eKJ?a zDRjCvnd6s2ZYz-6g9J#D@a**?Np!x3B6gBpbyTQ+F<2fn!WGx_rka>y(MUI}d`k`I zy1(d#8_FQ>#amGESjQ>$TG_T9ErH;+o7l<5c(H#l-Pa9qjbKfI+6aPoG&^7?+cl6B zVr`f}kN4AUb24uN!K$Nqg)&HuNg+A00(-B}XmPe&4p&gcYva^lY-euz3!E8TDIf#( zfWlBz#9&9Td_d1yIpQqAqlbf!k2nuH$3MLW^Ew=uPe|h$6f5A%>`Yd&;Iy-0h!{N< zNpEcL$6$i)0$6aBsHWRynVEkadFB8ha4GsVGU&`vhXGg#Mcf9U4W^Vpywf8mky-qS z*9SoSEa3%zFtT*cF!5aI6y4hA3v@9lj_MtHExlW(iPc z>Yjxc3QN*CGTBy{SOTRCO^u(^U|~IldA+Rz*0NCIKz38H1f!W*NTJQu~xfj=l%s(l+8K->Ylwdnee}h@r!3G4o zJw0eIPPUgPDaoEzw7oVAorF^^bVBy7>P&E)Ox>$8;4_B}fVhSosyP`LieJRp7`z2D z(481B)XCC{HYv1wf#J_iJpFZ_I`7}S{&#+7y1iQN*_mx`rkl%nwH(ivPCgx_g&n45 zkoUsu+HZaCiCeC`{~I5<>n-lhZx|dp)4lAp!6he;uRL}1(QQxB#tL+n0n1Nq*sv2V z*dEMJ)F(5}AVpUfB94>Vz|$8a4eb00Zyk(ddy_5`6#ztBGA-Fu!exgEJVnEe8V)ne z^zqaP;4yGoLUn?Rn-C?U$4G0;E+RE^P+=UIBb@bqRJXk<9~CkANKZT%qG+uj%=xr4 z$$^rPHG3Q=V-hsg93CEPTs7%IO3( z_zr%l;Z`~-y~V&3czUDzA{RC*=BnXNux;j zr)CJxsesOC^a9i8ua+Q?gSi>5unx5IXtrM)7rkf|Y@K3fd%E#fH`yA`4!GH#Ub1Ng zOR(Mwm)`P($;K(8Vn4pFOd#8L28)CJVowjo4{+p#h`q%L>EaM(1rELmOhi&Y>U4c=5OdNm2WO8c zA&f+@2;0GLH{eE$vN9YafjMS+h%+z4MTRF~jhj%-VzdDKEyF|VkaRGL)TgrD(gw`5 z;~2w`!yYXdX-k9%aK@Op4F?M*lW9T?rBZK0rNg8qHe^?UH! zpnQ9tfOU7xRzOxZ9Z*}fSoX56qJ&=NIvkDcwspH98*QxzQcDb~81;_cQY`3hA=3LQ z!{RUiBMF?slDEFe%(%YPm5>=Yi~|9jY8c%vmpEd7Qz(Nh`4D5YbFrgP$9B zaM0ttF-qB{ZjeH8cYMY}%wR(mdD#+U3oF@QDn3vM_9eAp-VQgIna6x*c1#7Dn*qZV z9TBHivwiyXV22%3IaLkE6Tt?5 zl4uju<}{BJ7C=hTwv``HiUV48_sdSCZWdWWJj>15s>Adr;IzOk$}+_>ZUc zK~{C(J>)fJ)J;3%c?-UCFRD9uT<4q{Y=UQgv()OH^VWC#(U1T52Y>iSpZer`PuuIA zd9XP3Kz{PU?39DWo&)n@8SUSjpLD|P#1m#GoG{znP3L=(BpaU+^iGZKQxoSj{m>iHC;DGKIsV!i@%d**??1TI!cB;JhS=CqkL^TS1J2P7nFb0}AvWCz zYP!uK${5}~bgKmKhwZ!z&Up`QJ4`tc1VPlDK&R_oL1f?xGDnq3DfRBS*`II(5;Dyi z0kZ6s3e-X}h$&;Lnhh-p->}?Pu^sTS3TF`a2IId2SdJRg!b~O}^v3uug_7Y^ppIKc zor!=Vt&M?28`_*fZ8jqvL-G%1dzEoPI|0cf5-_kSrZ)i7EwwK7@W??%HAL7E`Wmm9 zFVSa?Ed({Ng#*Jua@rIq^uCXEm=iLHYS2VtE&@ncJo~wrq7ve0j^|lb3BH`GGsD4QBf z4H;H$YE|f8l}U9%JKHh@gwWmVsvM?)t1cWS+I|t0CS*mslGge#L_QcXP?2&4@P07R} zfzgIz+6;z3yc_*V6Es&Wup66YH*HqE_gR2rx>(t;y%KOB52t#t>$dIomK1(xa{1<={7W5P+(>yxFF z>@Zg(W(7G%`6f#x+p8pdIh#SU!wMI6OeM8z<2iWU;W}h=hwYqL=8gq60I%_W-J4hN zrpQQv3OGdf zQ>1VrP_`4{K$hV$k-#M1nL>{5it&8_Wu4Mn$HSwujUQ*?7mhik9G^f^8!F6$h=Wpw z3fBA?lrZ~&|dQQ345gkm@w--6FL$=WW7~;*f5|OKbh)&l&QfSf6Z_Kl`R92!P1N%pEG&D#us>JO=o$Kb;G3{Z)hGo zk_Fb$!v$Ou{_D@X$qGzoel$F5q!1u{?zrS(vWb2f4@0kYf9L8$0 zdVga1Gi8`t@rH!^s>`__^$AS{j#l%E4o=h#_Q<~xe z@wz}Da|Ca|<}mQFa1~&l*CA%+ZX4AG=V^o`t~Av$q<2$eb0X1z3|j+>Ir%qshZPz! zk&XA|9%rv>1nEu?*wdb=Ah3Y~%Nviw;mWRaWrgBaT371UEH1-eJNb zt50bRAa$LP8J_=s&D?Lx@`wE1PF;w~i#d}L< zTMxLTps*cCxD~B2LnzD$^za&z9N@+|#1`;=TkGq#4+)GHlG)e$V(KrZa4;c+p=!QA zzySlnT8}ixN6Z%lwQuE73L5<7gophY%!1^sSOKWb!AZQynh17}Y7g=b z6u}^CjdBq^m|-KLbX!z!!-Z$!cHU$?`W$R!ak;<33z4d^C54-6y0<$&(a87VUnPN# zh6d+4O~`gp-XcSKN1Gkdwh5ZOIxINMIGk1};R$Zg94cN6JTk+Y2_Zh4lR!tS*^S*=TyKR42V`AR|9)Li0)&}}P@Bu`3+!|yJ{5xWWXVaUT>9#zX z!%9_czijzuyy15qee}_Xk3RO1kN)1yVzfDr=Cf!%jfz=3oh4op_*oR^aXyWw(>R|c z`81g(-Z@$SwYh`koXmYq?w*VV;hQ&bX~d|5sN4$}Q5|L7n4%94um~bY@)#E-WAu#*J%WhSAO_(Z^(LHu z093_;%4xq@Y603p2}0uG@n+0gOmGg71q5{Zk;>VKCSnDG65z)A@b{TSh(%dzH}*BI zz%#|uWr}9mj9_qxi4ky0F#6_r_MnVt8<-N#FbELL04Sd>=2zkQVPIMyo>6S93~3Kj zfg@z}W5B5i@HoNPa6pm^+3L?3-G(d@Lx?yDz?=jzF-+AlyOQ#+AS2!}q7_6vge`c= zlhY54aM_Jl?LNZka zVP%)~CXxjViGT?;EP2En&3+s56Hhms8=cJ;h2$r)8LVhX_!gtvwN@EW2EH3=4HV|U zrYTZEIKo-2tF@MfPx+cjcvRoC==iP}T_lKEaX!G2*I?j9q7l}CEx{#*b{2h|*i04Q zs<+K5bH+KWg1rOHAT`sOus)awrv!8snSA&PC;HOZ0SXJiD%sS?vIs*1(4Z|?+_8NK zYKQ;@zN6)}G#6`f!e4v^_aRW*^*9I#xZ`}nuO+70yBI5DvoH?|TcN@@i6R#k$gpMh zIv&E%Hb-JT%?V(@@TS?HfUwZWpfKYe8iyGhP~X--GY5j#oW}qwXkCs~s=aXwSEs{T zc5V|+mFV57bVpe5froDr zv*%HVnW~%s0m`)ICM@H|E!7LSg>J|$fOb?dCRHn7bqSEoPI&YBplJFF=HZD9Yw)xa z?O^H7Ptf9BBi{=ljHMHc`3EM;)`U48&0u9u_bY7t#34th;L0FtPgWep1ZPL{_GAP9 z)&}gLjg8kQ3s?e3c!tIEJ=W|5E!``pJ5sp92Bl~RTVT+f%~y9DL*l!QZ#g*5ROUPe z1mEb^x3P>D2bm8yO!Q<+pA`6d zFWzLj8zAmR5Y$XNfnzSS?@ygWdDK=-8%~wa^ld&5J(fN~YQa4eCDF{;!VBhU_+qdN zH*s7u-Llp#bI!?Loly}V?5>(l&G8}bD9j9}YRmejQB)>!Jo+AGow$0edC_xUd8< zFp5P7Uc-ep#N9Zl;bHTq93Ablm$Wi2I1bqlpq;IFg_8!sYch#D=huPS0mz;=`fST( zFaQE2&Y2ZKTkIFISDA3;WmzOg>!M&C>bn;%-F(-EBo7xjd)hdMVZbBP=rNI57*Tiz zf$C+Nmtl9X0oX50FD`MZWj3Kz#aDm{9S7+qu#O-#@Xa(ESSIN4?gYjFK9kf7nI5N6 zZ`M`UU^)s@zi}ZH_`xg+w;FsWfZAmiCe&!tDAy$RfilM=DOSL()e(~k0O+_J3KQ~h zv$2-|L~%o|v^41ST2qv^gT+m?QkPjoEAp z5c60l=UL-k;T}1f4cbCk1Ji)D>@cj~u%JHzK)lmsvu|*jx?3N%%^~O5H92YulYlLQ z=?bT9^kq04YF`%PlR!47A5$HrJ2oK;7-$~oJ}CW0|#KWpuUZMy=_piTP%48njz;^Tu04; zvW9ZUW))Z$wO6Y5!kW$2bezhlAC~nYkll2svN`x7B-(2D8+x%{5>f0>LfC^_{wKwN`i5XjbI5P3&V_v+Jw zoaF!;^yaV=*oBsCYxpSKa%U$>Fh#E#6_C1UL&e)1Rt2)*IC{bJT0<(J{`rOmquZcM0pZraSC?N0Po2; zsZCxNgV%F$&&UUFES&G07GHE)bODw#;y*Yez2waFqkEY$s0K^00}l^GE*@s)x4E#3 z;)OLX;l76;>M?DZQZe1~woVGRPK5@SCb^kx_492j+K@*DcnzFE*y5Sz2q8;soSKd8 zOdwUran&K6p-+43u13sFrWWp!#dtihBcOpH5rSR}hidE$1-V2owd+CY(^ZGK!?D3t z7ZR_G2Mpj~sVIWrEu*fAIoid;xz^F}pz$V+f$-V!P;t_CYQ}Lxv)SXg z$Jx<3j0i*Wb3$9VhOi~DVT@ypizesLnK;>&8O$M3Rez=>OYoE>^3Yb}j03h1>7ry& zL}LQTYBrW4nwd#0ECGENkP#HdsZ#}!vA|?DEKz?16(*+Tgvti8p_HNDVIA=o_XZR< z3nslBd>3)*3@c-SG{!b@%#H3u5h>fy@30W?idb~Y;&L1IfJrQHYTcMQnjo?<#1|zX zSd@3dPl6?bRcmpSGK3k%g=_c55U`9Au$@Q*c(L3Ow%KrTLg3L?I$e;6jRyeVwnmHs z$4uITLU*bSG08f79o!pjqf+g(aNUhj1@AXmKF$$Bkh-C+k z!G=I~2QnNtyympnsJah!!>z>o(8~?E#~HkwP*8i)GKP%ftE{fNN^zBOy$(t?A}L`;@M``Iu>^@Tnm2!+;+`?k5gaUNN$|Qe%GAkRn=r4r)@3jRjyA*7tm1KM zpeH9IXB{Ji7`KM6bF81mhgglhDIhwAqST&4{31ut=!3Qlzc8hYnv0Q5nUT!~*e#xC zyi?U|X!feo74Z=I)UYe~)gUb6?}F@%r;DyhcqZ{tdk{nIvZ`UfrUr}%+40JbH<+6t_{d>f5m;cDrSC&cGyhLSw*f(QoN+Z5P@cg-ffy%|8Ky|t zeGt45nbZ{B)akqmAazR+pQIkd_=|mMBesjuA?N!cd5tT`6u^*Glu*z^R;%OkVGBZ5 zvr{&#Ld)hf1++|TD(mAK;e|HFoxm#&TUBBXGK?iB@WhRQE#ML~O=fvxoAgn{}>*wCCx6HM1zCL4^f`)5c5j?%{RkhyU~u9`Cty;F?a6%)t4Zt%!oo;a!LX;R)9sH{ zHX*U<9j&8UKz2vz8NIRLZ~|Xhckr5#>+T2;hZye*m%>$legX&jumn)n3}~?1b+B0z=^V|`jNuLrJTjKe zbPkvbeAinr(_=EP;NS5~FZMOV&6+n?lAZ4Spq%b$h*{p%bXP0(!5%b*Y(%9*n=J-X z=6b$IO1B}UJL8!VZ#CdXu+(^(Y@Qfz?C*w|#XD(XBXc(JN@XvM8@xR@>-7*-_Q!`?Bv%X z$77!1E>s~X!=?hbWB`hog0irSU4M0wI+_AioVJ|ttEl1lkcu6aw8SC`9D*Heqs*X( z!*Mx(jyECYRGdcUHRlYBumYI1ku_^r(Sg)H6f}s#p+z`xkb9JGEG&i)Wp~8v9n)gu~8c zTMntQc_zoNXkcQj0C@=E$>ZsI96y|}Q6GL3Y?UGEzguMJbdc}hcX7-x-Y|m2n$F6Y zbFQn9$%6z}7Vm)F?9tH=&1eH|3IsUt4Y|!R1Mrc*nsa@%djYjG3@1y{p?1ZX0X78# z$(Df`XJL25w3Z`QT2lU7W72#K-A&OAi_+=^_;qYvN*2S^C4jO};u9bqAK@V3?m%4Q z(!gNgqYnNxU@wPEjx@&%WoYb7P&1i=qK;C4vZlJ^uP9sP$br(wb!@b)N?k5BBtTY# zo0*5lj;7>z2N$AaPnx(EZ891JglvcM6>Xt#)!3sIG8xncLm9pR-QeMAE?oEudp5D6 z53I-K=GB2AZ?l4tK{n{$wnn|o@CeMaD2l<-VfhsnG1|;j?mC<>ybr!ZkGG8`r#Qf3 z)jC8r;0_|QJqV1SJ^))mRhoRf4=f7#jEyifuR`7qq^_qkS5izf4fCMb@CGzDf-j_!v?cy6f?V7jAME0g7uc_v~}2wQQN?`sMB>P zmT+6*0g-JRUY8rz+ZLw-wmnWm1EtK!bszFsWRKWZcc?M{&uPd;v!hF(u+md>2U=U} zahQ>Vmc5~34pd{Hnxp=RS$&F7+)&wV%{J``Ge#im8k{ej^UMkmr_jYz-0WAERJ!c` z%z8*BVkZ^2sA2{7A%WLyjH=d%;D*f?yaravUBBf4>q!;2rkm897<^nuA+%`QjCb3h z5_rTxKOuElD!BksrEtT@_nGM)vUsv=Gg{4AB8hKNqsUUm@uD*p2_$@gIc~$M(1=adOM>s%vlj^S}I? zOE0_d?31$BoVqyuxPut8--uik42wQV4KM9Q zQ#&jSTtzR1MldFvXHpqY+csREQ~{}zEj!<wjWd6KtoDGF~Y`n7J^@N zhvCCAh|Ew1Q(PeHM6W@tfc0B={BURX0~6vJcx5F~tc-K$Rva+SfHclcm|Nz|u&EP3 z%sJPA$PtJ509lREj{;0L15RoV#wp{%W}9zjUnn9>!Hf3IrF zJ6LQ$P%}A%@e?RzR@sbY#zTBS*&N|1%kUcH?eM!JY!(6>(wlkH%t8s^G~iP#;5fF! z5qrJg0bV&tjVE_K%b6IxQAg{6&Z^0DJ;2xOPt3lDcl7R%!4PO?#>d%VN)k<3v4TB} z?Qv?lq2BXIc|+uDi)`+eY?bH<`V07FVls6&iE*=^wkDuz*61gIGJIaBJV;T7O(2{d zCWKV*jN$g`2bHeJL_om0$HWp5*N&PZ3d|u*ykN+iWrU4ECi_dBRfRcQO|cp+=|DcS z|6gHcyK1!6VS3*RlDsjVH=S>#rE8s{eVDci|q|aY*8w? z>P-&-`kj!?|C$V8Z+E8$*#*U4K&Q9Hb7``a!_{DQvYGDGy`lmS!wzq{^|n9%%fGtd zqOYI0<(<48@7qlFtl~Wz@y=$P&4MuYR?BE-Gupcq?cIp>F2m6>yeOFbUvc{DDEZeQ z`qv=&4?*(ZCdoe(lMBx9FFPZ;@{II~GvX`Gi17M5r%b+cdT{BP@psOME?vq51&~CCRjZ)5IJ1!s_L69>1I~&(GtUEyi z!U`_rx{#W!&Nz_*9s@k>AT^W}D_LaG5Q-UoF8hI)06iopD<&$?L3l_w$8J~#f7#Z@ z2FhE#5VEl%n|PDSCqe~R6$o?D990xjQ=ox0_{(u5_?SUWx66tNWRt&8QcNlFSof$g zvxUOh4XLnL0mLuXun|!}1Wt)A)l7q{Y6Fe!R#-j*i~_PaLfo8Yw1n)%IyFjHc4u7| z_yFr5BZD3uo3ud8LIq2Mhz&q`pmq*FhJkOwl+&ft{_z-Cm`b7<1O$Y*hLZ%aw!2K7RN>>>qInC*3#-W_k>TyD-?=}6rXWH@XOkgCDTiu7uZZ<}t5l6=_a zIOGJ#mU|vPf_%nm;580L!JFL)-Uq~0;NBQQeK(bEN62{%-V98sK2SwjKMQbJIXTn^ zkv>YH*;`r<-&Ng^4Fcf?NnNY&bxCKII0D&Lf6{Y;Zr{fXC~MUk*u%(xaPDHYz#c@3 zF<8If=3ECoofDPym9A?!K3;3qKo*UqN_7Zl-h!NwmSyN}Qt!u5&1|4ya*RvNA||G( z?Xw>=C?Jog%^@cmuXQ04!YXsW#x-kPvBqU%1ZmS@H&Hm|pmyAWv>CEj3EsiRITaZ* z)pGWL#yUOdcOqMjHWYU6+h_!w_7`fJn%WaHIx=Z`#s=K}sx_Lma4;h=M?nNB%}%Y& z$x2RkwR~@5vedJ^dc4!XS46$LmhHhiQn(4q1M!XV0tTSsq$rUvT{sR0IwltGXP{ySg? z&~xaL?Ki25A*ivY$OmUPA|L|?27;4Kj5+u~Hr{6#2M#_(^lu6x`XNjUAOfg?gLw8T z@Ts9?h8*0hYW;Pi5^R}nvN;49u^L1)pe(yF1JI)co`l4C@)%PlM)9DIINXPw;xD8( zM<%IrVc6Jm1c&sh+67e|#;mz(=Fdc82$a*ki-;57WX>X;5;2*&8)+g=!m)?Jt3~8E zss?`xn_ci!clk?k9vE^JS=HDP4+BQXjWt{v(b<_v!8j@)28Pxg)^Jf+12SqEZn>e- zsmJrUo*xp{Vy$F5U0UC^1wGh+(`^S`e^G9$4Iocq;vEA`O_kXrqDvRZ$T_quHdLxB z4hJw9i54S)4JKxQ+8`+`0e~pNSz^-Irc!AtRUlO#vJn+A&1uOxFrS==j{X)5KvnLN z-4X!gG&NSxaKDts{if=!lkFPV5esej4v|fVfS~8twFtSu7(iJ!#N1s#HgOD|cA=4( z_@Ov~j7te=%t69FG%s#oN_ft*JZiH}or!ul6}UIRYf!tX4P33CL2Z_CqRk~y8&Q0k4L#IZ8Yr#6gX6>#v9InrF%S58X?Esw8rVl$3;dJNz| zFWY0?8i2N7H1LfVkkwr`=(?c+v2VDB?P<0Ll`U(IWlwr;X!U&#IZ}W-puA!-SA@BM z-4RyPMDU~}I%z}=NQOaDvDsLa0T59^Q!&QCu@-Mg-n?S6d4CBW%`nmZMaA-~Jv_Q_ z4~MNtD8VLl^dQH=_N42`I7eNGZ}6H-heR5rOzsYrtSKKA zRnAMWrNmouvQ@JaX5ir+5gw@z^3G&s(Qpf3Yaki%RD`EQ6JpB3@fOT^5ndyaR zL>HcsTzGnN{z={irv?|D9$kD!f(7jU1FUese>_YcP4lB^ek9EgC)tx}abplAp+A|; z;%OdD^LU!!Ae=aG;xL?o<9RmAi)o%Oib0AK7_q0e!1t_x~#dTAQd zw#C{1!1qSquL7eSw+tAb9>(o%!1mL+4LaZj9_E%CH`&mYbL%wi0D_mIOr3 zt9@KS$i4Dfh;=8NfdzgQUZ|WCq^h}9kQa;2i5G|!NHZbfu_?BFV0Al_(ijZk6YFA; zTz37(cYzF$vBKI&PR&CZVK8(9A~2}Z_1G^7u+s*tBqUD*h;Eu9%Yz94(Ih(pvO9JF zF1JNELIpPm42(drwwXNVvcFY#tgwk7^HQ)HPG()iBJd7K${rxNnXM5{2>cb8H)wXo zK;TN-tT>lPMTcGHIVKGF3cbv(6gYS|rubXQgGb2pc8`CQ}_$ zWv4Eg<+cvaI?=LRYlD5FxTy!MRGK;vM)S;~Q;p3!G>3pQ=?U>dcMMKK#E3_)DRYF7 zUXcQGD~c^CnOP>@P%KcAExKTR;Z$MGP7fNKY28g7TZ4O4YU!{9En|!oYHT3I@n>uS z$Jqq3$v%-TfJ z+4u{!TOY=aVM2e(^gwWS@rNa65ChI;z~D90Zv&`l2Pbp0jb_&u>%EKj}y9MgIFK<7T<#E0bh#Fc-k1|O;0qL;*>GVX24iBd$*3K zQougfb<&(OrngyoK5tD{TCrbBcbmb68gI)G)c&G1noHrfobKr@PgaAKmh77B;kT(W zU;CiDI8o1bJN}YEgYitUqbskz{?C5$mlt1r0aW&$RS11Oo5p}-G0TE98b^Lqr0F!x zrzB=E&8#f>Y7qYSBzqywo=@`U`8WG@l>M{_zX4>Q5nps>eBqf)xV`{@KE=QA^a$@< zbViJiKxRiY+5z`HaK$sL}yj1FRC+KFq#_yP=IMD5hzVvwCFR(00EvTIJr1ZPzhLXIX+b_f1uE$U?1+c zK47kMBxJh8arnPJT-2f=7yPn{D} zIKu$&i$pnG5U6Rq2AA<0VVM}b#sZE*!$Oq7IN?-iZ1fBRK!1Xz9~AreMFz8grZf`t zX4tY(#3H%?D=`F%CBje*&P0=99bQwYV76rH>w_5T8>g2sXpx!2MgpWT6XA(MF*_H> znN7|hQJ3vX%Mc@n3_UZJwa%e#TO1XH?Zhb(FkQzn>Pn9|R&1u~W6MpW)-vlY180fJ zph_3N1*aNTfiZOEiU4YT4xDHVIzwdx&Gq%M(M!;49jNSA#dQmZheN_gG8StciG~R1 z=x&=i*PI-Ofn%MMq2(Uw+r#h+-i7}Zpe;(uxcV2&bS;))mbD7WJ8rp zmPk7Rd|~{IArNeE8iaLB+=V@0&|HwZxfc5n;|#L*6iyfh;^QkG4OxvV?)5gQb4Z_h@J<&&v*~D0rxhw6_RAO+0&9bYbX~$p59y>ZU zy?Mz=+R>(x?*+R-aER-6upy`WnC=}crDzknyUCIn4m@@y3#_AO`>g2!WwNqo2aJ55 z7ViMr{l$syY(L&qMzhPWzWyhF`j?k{`@(%&!7h+pL^CooEsD&Kqfz7sc^Vg4nrC^Q zWksf^@t6JZe`NXdN%4G^KbK_BrP;qG#m|c98*6b5I-i+bbY^zp8R_|__!pcOUPRqZ zWM6b<@&{+7mmKt;O!CLF8IXNA%^yjN$Me~3Q9Mn;$!rcfN3$XAMVbe2#vE{!MKonRjc_^P?E9isDMb?-fmUP|M#>}3X9m^--%SxPse;`M7cjO9 zt^w{i0FEf)b#DydLUk%5#y4O*Z~!1C4iCT;QIWCo>O8p&`zqti3g%d$!EZ%eAL18Z zv3GS@E4!TJx?1%<~VE8u2?wjAT>1gy4;33 z8uFZRm_7{y{I(wcLET|i*aUo_eLgUzBM+TNeM7*h~P#GYS){wA2b8mK?~0(l(IRgP`~&!JTpKr zWSz@CrH~{L*PL>UiM@f$j+gWHIEQ!1JmQg<-xkW<4w%;6^WnTJ-V6d9$OhsW#b!^} z3}1)JZjZ9gxX{8C{x(D~y*ZxB;RciZMl&W~Pgd>mqK;jJ8%@q0$;MJrxFxZT$*dFa zn)4HtkfWDk+Q}t5|A~o%JFL*z5H*(jIK1g^lzLgEpVx=;{_1pRaZ+cpt;PGUy5aV} z`P+Yc$)U@pTa$bhd9!$wM{XYX^F)b*b~rKe#K;meOS*a9&683Ve=3UpPavC%pmvu3 zYcl=mH2%Wb(N|xSe(mh^Yp+ee`Pv*WzIs~l%`@Zk&rZ)jEBS-7(?2*X`NnI~3r`51 zNHSphXeLy4UOX|K-ySCgEW~^f%!+6+pG=F%tmwzF6G#56m=rk{zbNq9$4{{$fQUTmqbTzpr^(*qnwtDqwMMErGFI zn83Mak#4MVTA6u!NR8Yahz3ItaRb)WRLoJOi>DNX&1z!2k*${D=rIhPFhLOFtLtIG z9myfhkw_)RYaz{;TIUip@`HGc1DH7o-A2A zK3VAbUM1PC4X4%NRLk~g$)2XakOAUsZztPrjTf9f(%)>3=Zy&@IeT_DC!CO14mags zQ%(2u@_pxh7z8Hv(eRouyfO$b^Zkp1=#nu0S`a=w_WnbdJQpX=#`qgQA0;pQ*}sp2 z+xK|)?D6l}_3zpj+`c!sd4F*Iu6NnK;EDs$<@>_R4}{-2!N2H4|J&Q6BYt=^N)IRL z;W&FFP996r+x&15dZQu>vUHNCUXc#-%m{rwoY;A4=P($FQN-OmRkDB%iXB%?ALbTk zRmHh-qk1=xyo_bpP;*}1{!M;DS?aCB8tf_uMgy{J@HB>eX4|95ya%_V*u_P`^~IYl z+-IZIiZErB_pnW`E3 z-5OU6S_npRdB3H4ID`GDap22oL0{uu@56zmH{Egq7!^D`fM7#)Me*?vAa3^psyXOW z$Xmyk1|cOOTtFNiXvsr`0095=Nkld?b>!O2ij zUkb@dX*pqT32g>jHBof)EX6P(m9|FDgF*8ig)K8QoDR+~elJur%tMRCH8LCg=Ac-m zp)>0PKLpp8*cCZ{9iyp(p1A#nDy*yuNI@X88VCl1RfW)})^M$DL23XR<^)WaVKv2Q zp>RZajbL9JOeF0#wJxa5+>9=ZS?ZAC;vxd9D%dT=GOP%Wyxe5FZOGv^d?^u%5x=6} zh6FaTDGF_7TXQtU0Z##akwMs(EROC%n}gBV0z>C8#wKGyYzT!7ir_UsulB|YZcD|+ zHrouW^M~Ml7zV(djrR#(*+QIm{){&6vA&8&|3bf%Yb21l* zbiN6Ww?`bGR7Qp3LE=r#WLF6`+Tian7c(a?Z$yeVtHYw|vD=><9n?jY>tw|e}1CAOv3-5B2t8li&Lk^s^U3hFvE5c(>IX}V;5JJ4eqJX*3 zZmetsO*sBG!~rO{o#cMg_C)F~yKc5bi#3Km*P)Lgeq#hT7TkoY1@}SHiohsd$V1l1 z2y?}TqWB7BKDMJdEMLamE3>N!Kv0qTO{M?>ugo83B%L7_oUs6o1!SfIYoxQn6F;OP z+xQ}k5V;SIFo&9%e>gT4j_VxbV$4Lu>v3%09jp=7=PZSI$OoC}&*8Yhn2D5zaRr(Y zLe(o6h7!el_?DAw$6Kee;GR=E=B8gjdc!Kn!@Wrt`i1mJ`TAs}ajefL%37f-} z_}dcGDFE595KJtgvd);7J>YEOopFJKX*rx)1?<*i&U)US%$ZL;EGW1AWdk7gI8Va5 zeYP<@D23ZVd37`u?MHTvbWd$OWzSX41-xP%&1A_^cz;#yMRvGx^ys61@z;OymyG#C!m&xyC@qZ4I=cDwwBz-=~M1;C{CW@bp!sqhh*(`rPFYw~IV)}eB zJC?>TOsB_->5Ikm_;mKdbbfrc#0tlY+40%p#n}R%zEI3wE*4Lx#S?k)WU=@`vG{&I z|9&z5Ua@#I&JGvTN2l}0irLX(dNiLNEf$ZYV0!XIK6@f99?y!Sd2uwGKI})|o%oMr z#Y1WK-6VM+i62VR2fbh`i^lUjpXJ58$QN0mZ^IIRUqEV$b%sS7 zcR%hYf1!hq=2&&%kkM(Y=>ygTPUeh4z*hz0EpMG~$AB!YNWk$!{Dsg1rh!p0swr|3 z96}Rvl_T{m_G6N@0bxt`S?UGAF?fpYFeK6sDXx3WEyIyOO4mTi-h`>sOb!_ktk^6& z+p!8C>;sP&578Kk5xSdM9MIQo5$EAagR_Dk4t#WB494q~0cFxnbDa(L3Vfy zjACOi!X!{uV=tTrjNs-M@#`R>u`<>%N6?$FB^2P|IN=AVZt4h!Koc20hG-4wWIH&4 z{4Mwj!?gip){JoztiU=LO{_>ZbRuLg7~K$EPodM0D(=3mq3) z4yHwW_&PR-e_@bt1);=gDPd^9%Y!$&Zp>@2kC$W=|B{>Y(a6Mq#+1Hng^4b7g2`RxN6r`U?y81>G(8 zMS34O&ap}cruh-JHpU`ZV`z4UN?vW+$9!$w3Dv%@!TIY#S#yCa0LWr@lHuZPvvsOD zz<$Nxs@=gcK$SDiLsY>)P_x_hU_FryVXgN&I2chNqhc>Cl4R%uvfX6jwht3x*%JtJ z85X@e>N=sp{J*izPJV7uF()!`$=TD{fv`)*-?@`?1JrPH89;jSYe1C@>0XdnvHd(33c5^(h*s(oX96kEjU;OP)Km3t*>|YM|u9D4px-pAZi!@lK z?@Xirm}D;`8T9h;bjlZL{!)~^;K$ErQ^5LpQaA&nf$SIJ1TS8g&iHpee_^qFX|{YJ zE1sM3^$YVQsQuh*_Tp^*t2}>nnm<0DJvo~_KAk;L%paT1j!Bw`ij#J74UUi5~$XGm?*ab1?GMs`%glGW^4)GCK6R13Okaiek zgA3@jyS_{Z4nSwuZ-!hP%3c}l>j!1v3@oN=JcihWbHIJ+Y?eg9sJWbKi_wW8o_}>1 zEO}^};0x4jnCuZdku(2Q#`UAfOJ4 zg~lXjyjY}aFhHz3b-3_S57=Usj@0Gc0xk9ofWr=%R+hS=DrCS^5VnyTn_k`zS9N`4 z3^;3Wr9~jBPFQZSF-Q~V2Xton42=`aBz`iZ8HUS2NL&k-391PifB$5Zj7YvWF2JS!K=1{i%Xj0iyRAK_)9Wcri+i- z*082P?AsD<1A}v%;|0@cY<@-QjV(83m3ePMo1{Xz4n#(WBXUugILN3ARJ_cE`q!ee z#tWJOhD2Cg-jF!)Io=dWfg_j=_T=M7BeNe^Zlu}1*7sH0156dmQ*lMGDXkA=cXYc6 z;jdD*E9R&J&y1Y))E*1X!DW~V{LD6<4%Gp~I~vPmfM!T+vL1E_$kttGZ9#b#VqABj zuSX_j^}u$69u9!kVxSoV&ake*2} zo)4$EjYoYV@YxL-eS9)HhJE}WL3lBeJf+)se!zl(#MR~CZf@4$g3Y(mN zGQsw-LWiX{Q2JAu35aAj2-5N9YOv}CtEQXQoJ{oKW{|o$o-ze+IBj@y2~1~mz6ED5 z3s$Ykf~7ZuLh@H?x~F9N-BEV<$m4(g*FXK(N8hu58Xa^VyMNc4Rsyvg7!Xd^ZWAR_8_=z z;@_2JcL3ROa!Zon#T~xCkwoq^_p>z2u_R!(lO{DF!}h6yg#cs#go$W;`0<=`x=uVB zcvLuIHfoJBC0H2oh8oNvz`-7f2*ZZ(2;o zVC0k$24lz$8;lfl!M_l#oXHn=Jbq@64eXmb)0wH};KquQNT!*yLvG{cy7*WmwB4(1bMWzbQq!{7!AV`@3DZY!7Ba&4D{A$SwfNaxW;7oGZRyZ** zOQfVjxysTNYg|=9H|D*;*%v-OwKnCy<}lNvEt;3MHSh>(k;lpLI+6EA$a>l!8D+aT zOYHdvA4nhQ;}kn$AOZ&_aWXl43k$>FxUw+75Y8RZF%<~LxsutXL=YCza!_vTb*ZbE zY(-t>lwc;LH-kCs{e)wtwP08r))%%-W#>E%R*ff?HijCXVHqE5!nkT~1S4AQXw{aA zA5v+lqKL-o;81Z3L5YhINT9Z*q49h`!a>LfatOg|eosmd&BzgftTN1b#pZyCAh4yw+j( zp~sRAftDOYieUzD{e6$ImA~OLg|g+J*eGDf0*Kh zW;z!1b$5sts?jegu=8x;#_$NFaa&*-T8xjkh*vOG*7V@aRs^qGgcD4WZG6OygXIP;*q!Y><{ofW^4LE+D937}!tBnv~hqB-Vmu z%f&GiOkEgHDfY+HmN#p-nGtT-(MH9MDubdOY&HBPv#`B6B(@T;46@QsIeFuRStWHh zYq~|n$r_V6c&)~}m2PMa(!+-z`>VhC>Bm0ydj~cq`#5W3wwz~+SvH>KZ;PY$YuE5_+<9?A%a<&Y_;umQ@ORL(T)agMF0=TcH&*Q<8NR=o0-2M4o#dc0!EJ5+Nokln<|;G|DD+sinu_rsbpP++#<1>-S* z4Q`ud=!KrA;WiNSHZfTOt|eqLp0@!6W>A-`jsy7_wBdBuwQ5y@Vp4JQ7@ST8N|u<0 z@PQOyjF`?iP(pFdxpIJ1SQHk5H=)r$Orn-`lK7&4Aj?doAz{6as{oO}&^mC;yb-*H z(udy-zBBEbiQep+%w$AHVA#$O8!<*Lxc@5THpAQu2Ps*DIj`!k>sLqy|vv=M6{v5?wqw=V+p%u8W5p)r}# zzj0#7YPd)Jctal-_|>p>SXu6eM3{w*q*Y@e!T8~aXb#R>t2@T78Lh^X%$bII__SpX ziR`vsX=s2EO{~lzJD?L7g;>V#GDi70+tS9I`vQ&#P90n^UPnslftb3J{Qy|I$XZ0s zy9n6}gM{6|eZe)VDxCPdgDVc~V*8R&7or|G28EmJ=m%`P!ZbVRbb2H5JR~`$V%& zAU5cE^Z;d%{=o?w!CZhCZ?+(cVX#4eksFS`Ytc;`Kxe`hvFUXkBeOfY!w825t-ao| zn4fo~_u(82)$SOJ++`fb9*QX$ZBGNT&5=HgpiWfF(`|oUc@K*s8$;-By~jWYRJlmw zb7b9C%t4nUlLIDh!@bb^;C_DqLG2m6vE%wCcx?w75N{52!_}~Y;g;5Qy=~4Jn8@P- zU={6kSPa%2rtG;23bO=@86d4e)^L~*!U4>@rU*Vvq}%oiFN zG-qxDQ$*G&eGFk!N@wCtHuZ<8V4o>GpS@6;%$e=S8S`@d%RO?Pxjb2PMzfATua2{d zlVYh43wF&OO&jBBb5K+vz1vd%gg&zc-zIZ?Ocgxy%<&&gPG&+0lIZ*qq2F zwWsqV#hl2Fdy){@No-FuFHa{-FG(gv z+Dj5BQ24n`+%c0W+uDsq1>hjo!X<}%anl3~C)>fB|2%nAmT z-8KLk+*LzPMMU#yjVcYL+BTa^xdTawMSPJe6Wq`P*4EdR?25eY?y>_-j6mqII8a07-l;AeMhjDI0;xsVhDw28%IuI z4&sZRs}$G9P{yfV2gF6T21gxbz?5D;vjAU>)d1P-uS-v&)2*`rhqX4?I4P+*NBjBU0QPSlJ0M>erpu}9cQqpjPu4q#2@Vl}poGGH4x z)eHB|5VoV)V;~#6#!i7khLS}RAr6(HZET-fyWiqhNN^$H`v9@VW_}^`I5fD{1Dc_@ z#~f@lsH4eT3lQfhXbS?|99V7$IgIro%ncjAf`N6l>tRz&{^R^%L~}=TG;4$xtZeKu z{X@m!sXdD8b?S)4p-YPNz7J#r<+kg)UhGT?Y!=o65QoZ^wO&cVWt+@EYSGqx%E{DO z7weaCH#;m%WQ7~9AN@NY{{pXgdYRQ{hZQ_;whv50T+=MWL$ug3yULlf;qe7!h!;F0 z%+$`nXocwnsdxt#BI|IpDr7WfJd?dC)H;=W4|+eWTN5c*l<~rjs$B^7X=^lXvNO~i zEN+fwg4$Wt&1xXKlh*nvs9h61wM%wdVdJV0jINKDtK-u3Puyz1;7ntFQBHMx15*k!ApJjxHCLH7`-?c zzC0Kmx1HmI@yo;U%Y)%dWAEkhUKAT#nq)1{$0gTs3=A*4+x8hhWAG zzdn;S;hO{5RmEmbu40!!BKUnw$7XsT4XqPf$)?0!tORSzrmU;cJdatEqB^C9OfAM~ zd;wW1GCb0B*gIw!;>cvcn$i`Vaso!EA--6Vp_l6tn=dn$fWnytjf_7sBe+7suCwbH z-6p}o5n2ThEyTZN=t>-n255R!EfOpq=>nL!q^VJ(q)wR6%9O@O1!s z;XN>w+wuxHG!WEvi4hpd^jh#l;qkO}K!@=P8OI}LNycHr2Zv)0x0nG3Kz5)yk;Zfv zR?V;mT}%no4;SJ5gmy1zX|7KF#Fi;IbxjR^g9T9u?pL+G=0siG06b}Iip!}LaMC*6 zO4|Uk;iKTBRiMEEQz)eK$1l z70ot4dDslyHJt#5VLGANj}%5u#=y7h6|R?Zpw$}4oaMkSi4lCxOWo+hq2ttf>`=jg z1{}w~BY{~ep^$DB2WljjzSzXG*u zoaJj;b#o!Kr*)8eSl}H%8Gp-8QpWq^8Cwb3F@TOQwuaO8WQi@CcJ#n^AO4HK{@J@f z^u9P56tg7FQ!G&y+iCjd7|70m?B_}C{DrJ|InAFdrq6!tL(hHVE6;xUbI*SH3om@> z3(tM&bI*VAv(J70GtYhgyyrf5-gBS*^z-L^>bdhi`TS?kd+xpOelgEqn$2IB&7Pl& z825DXY(D+FEc@GH`qN_icg6H?rnA2;W`7>1KS{EmF%XFia*E6XN8o@Hm4v6X$vtc8b!fLQb&aqESMTN<~(Fra2s$UE>5Tz zGfb>H<)#AV)d7yJL9H!{l?}iVT#gw<)i|30(G2+ZJTmvy=rC0(AWI-}o)Nu_$Fi{U8d{d@P4D62e2qSDiJhiNWBAt!IF9=fv}>7{lq)0GZNjag)7h$la|4C zXqp_8WK0?Eh1fn!0=CT1Ey!qzpv0Wb*IGR7IhN8k>fq<)q0@gAcSQnzD{Y<~vA;wv}+ zHW-0nfOV(NweW(!RAwPNr_F5&iLG%$84;E-82x8^DT8T(xHs^x=Cq8V3V%YetL)Ne zvYs9r5kU-UUX$s1kjXU(UV_%tVEnK(9YULXA%bm5B+^kVt3AaUG@y1Nu5~5?@~E)B zm>U6<2a&;d$#hwiXmjQlNNKSC)szzGYvBzvRV>`H%pRvy*6XPqnVl_gZ#tX@RbtB# zAMfK^Vw(&%%OXLgtwU?O5cT*XHp>ynuITK_(aV8`dkKfZipQa>x%d|#W}7Eb_o%Z! zAH+M}8FR?d_F3!b_=Zblo1F2$GkRXv33^Uo*&fT;yQ5M^%+^uwGTh9@4(uW(lCPZ@ zBo$91TktTW7UZ=#*>5_Eh#cM( z@BxV}j|;F{9>Imrus#$wwovN@RdZ4k-Aly4=CnPYN&Z5MH}!bCBicd%){Ozv{s7{( zztIpW+v_wEG39P@8XPU-Q{Z)A@_V3=7Enaxp!=*m(Mm8=v~|_nvz4k*B|RB!&shr^6;_mAAS1!N1pzp?>&9T%`f9yi{(qJ)$!Hx<>khUtJMp$`75)sB#{l>Ek+kdZBEXTLtWyXnngcJ!9CFP$QPJuJcQK_7-4u*W+uRO6639=R$qAg$1R@=e4TLcKIp{I~8vBA%&&UZI%W?D)5C?t8ZXyE`8^^|4 zd0+yN#YV6T$aCx(Ab^d5Vg=S2CgO-6O$Z)ru^ph6agXkh4Pb#4{nZJM8$hSPeT9Rl zeF*t=v_y=`G9$YUC(>cF6rH7*EH{_OS&fMwe6!<*ZnEj7TL8K-$^mG_jSbjK__d6R zruZ$rVA0`R3K5(qP0Xdh#Okh(rxLrM$&nZoZeph#EM-AI4aB`fm(MUx&df>gpFVkKp*J#1nU6M zpe>^oBrmIAAf=!y6dRd0bwmrpiWz`0Gu_?fJ-A+XB4cFt1BsI7!;vq0Xia{tt zQycJ%1<;NDM0Wyvl=i*M9)-O@P+}IX1wjF-vh-OLF0;^_1B`tZvvKIZ$69CjfM5aE z5%bgltVDJLw*|xtdlnDNvIF!pKV+R5GR)Z2%?Y?p*OvibhQc|eB=j|;y)GrX^caxN3_@#VY*-TyD6zCb$4?`E*GnJpIiY=)&6Os8+k zlK%oyGsBuO>*MqJ3)9(4%hfa29eU=`hn{}uo?{Q)^UOo{iWhf3^}wA^KX^CZdFr8i zo_^?Fym z8WRO65Vp8p;FL%#0k{o+4u&!=+!ehq+FGeD=@f%mS+>e;V;!Slt~BegJqk|%8p@8* zXOWu>fI5K)1iSFf`5dx)Cugn#Yk(~lZ9*h6OIkEMVqlju3s2H)9JiRlnHnM^k4*eUDOIsU1-V6Ft| z1OJs(Dy$n~(s$1Xqh-jK0eqvKZm_h1Ioq__K8%nIG0q9p2QoHdjC6=@Q&=F~g=%J^ zp*8^eas2qzIBB3BcHO~9~f^>$7(%ec*hk%9RuCc2sds{Ps5+?!5 zTBOj3T6PF_b{Ao|17=d{YWT@;+N2)S1jQ5zG?uVB;JXGNOUz6poUMjV6U!WJ8V2?Y z#OnsT2C~CRL(<7doG9A^A0ey3YtHkcSWU=zh-*m)?&|=3$6~eys15baDRnFyBxEeW zEmmtU7i<+N+e4WZ;U11w!4+3I*J20K7?&PS4{QMAAuiW6p`bkoe9&3z zdM5i>d!Q|I$-9hAGxviyel-aMAO>+8KJ8X(9AIM;wG?wnpBWz>kgrbO0B^t-)&b5EQO( zkkDTj(N)cH3HPNPRP-S>QZpFE#`?fITU+?^x*b53GX?@Wiy6z-S%aKE3AZxmMTNx9 zIo-h^X)(u^GvMGgP|nH8dV%aMo8Y@QmHlOFTr@e|K~d$L2^k|H1BOJz?7dlwb&@ma z?oP16It}byD0Hl_E_|=_B4aSU_koB0>aYIpGv|G5|8}r%JKx~&V=8Nh{ZACv z95WQiULG%&kjc+oefiUmJ^b{;_dN6Py~iHD?->39&=1~)zx?-+^>Xhsk3aIvP1n7= zT)wgdvNvAY*nCMWFU}Xw&lks6LUAvbp!N&Pjc2FRWBG58&3O0X>FNBbH2Y*4)$ytYLU@mCI z=dBApTUNRd)MmP=2eXps@X2nOx(i^{OrQ<0qa^^T>lQ=6RGrMg8hHJ{5QDru#zREt0BX^#Y7D19jxm@Hlw)g}2#bU79QwB_>{w#M-G->INj5bd z_}k-PV2uNY!aF3e9J1Tu+*%?VkLlRhAeA8d7CHE06`N(~+yy&Ww$3>C5NZR5&A#4@ zx(q>W%1jbUw9R7*9p~`In~;hOKgYP(gu7mw{$KarX`+NY2%_+w;_W280gWiuI zpL@xs9dB^%;86xq3`q-dP4SC!s5lM&D9#o}n_;lOYlrQj*^v(GbVT?bK!+u3!j~64 z$LXW!t{p9Kc+3@HuG_15dlJ;#C>>@yli7Z2Tu{qfV=l6oDh2o|eP%M~%b+lytDYNmI&o_d% z0wNRNOdVmY1KJ$Bz_(2bz@hessp&?B8-d*=#y6Z$^jsIA4~MY} zX_QH#-~#j%tv{khFW|&rc#HvecHs0OoNK+HVtT+qS+$vR&=vhI;9I$(SD&b2S0E_H zMK{?5vRh7KMjQ2B*me@AY)JSHQ0s^($}F!*+mNhPJfqkY`yq66+hZbN6Mzp$9CC4P)sOlt2u+^E&YJ;@mW|eNJ_u_l*d+;y+ z>hI3`?8gplhx@mSt<`j6F`dtf@oe_SEd7tu*~=g`kUgIRzAsII+U2uXT_%uyw?HDl~W()^cH*#g;l@$)SId7A&DPh{UNkbOs*F+!4M_lNPG zBMB#L1k+_Nf#raX#sgnBSqw=Ti)RVa z5-iZ{CZ1tvG>#Vb$r>D3*L!seL4C;7x*m%xBsZwwfhRpVdjI4~&Bh<4o?)*Xl#*4p4O7>c1KfTk87!GXX%uX5(^CQc(nsNyQn z*T%5iP{2pH)un2uQj_S~6W?xyjq%w2pY5p30mlOjF#|Hr7^6mF!eS1Ab{UwaNAKW^ z?8@KsWaxK}P&tb2Y3@YsvH+x1S4-uN1kb$(G0P}0oM?@$HijL;ZUJfra}uaDu|Y8| z$C_+boa0RPDC>YZ3CLrOA9F=?mmykf1U7+#*d0;DifR|A64H_sV@Owpv^Sv>VR4%( zLl6o+WwA9F$6li>?PFg$AdDQumSGaG3(msD@i*Uc6OhR42OtrP!m&pYl+f*=<0O&Pvmt~7qQBo0y}Y&adQ+fln3UogPk(fc@Z20GR~K*T%)3Y$0e8?p)YjZ=po z1=|1%1anoFEW`GCZb)OmVacI}&FXzcvlX~>lCG#$M>ZtIRP?T_TC!rws%cuTZaAve zZOaCyVApLNA$HM`O$pad?X^0(Bk}NEJ1Z zpfLul7^b^6$F${=fXIzdi4>A3wMq9^5W=Rw`9$zeuUGZ%wXzFNi8L)ojzGoky&|c$PEI{^sPe1m^ zv74@ENMyC~^42zAY;J+n#}`W?du!{(jm;M}HXyMDvS&|cL^gPR49MoPcq%J?6{k;6 zXTQvgU*uCFJ1hPj+mD2|<@sG{cBjbm!`}y@WN%89J;_s0+t0JfH0`IEC{Xm70|3Db zIW|lv@rEh6oZ%Sa$8FE`^ zmp*<=A5@utCJN2*4pEEm4nZjHo$fY}-RDTD(5iU$=!^>i4vtr`8b{1nHABHDMmyI7 zk9db+dd*b_F#uW;CIsYaW7n)yW(-O)oLWPX6rVf0B;=c7mU%KRyi$Zr$>U1p^PP7NH zX|m8G>W(szgKWvY@g(0!7rXPV{Xv|{jKliSfRaF!o$Ybc?RLhK{+N%0D_>Q(6h|0Bf=Dc^4{2)~|7xOjr9hcTQUEoX{Iajz0sk31u#eH=q0Ak)OJNay-ZHB9w=5ca+-W z!VL??C2W6^ZT5!vh?54G4(n4aC(zepeQZDN0@-W30{DW+BI04wp1~$TILjupJJ{&M zX)(`)W=1R!=8T7c_4rqeSTYNxE?Y2KIERc%iDj*q4KNco415B~0OGl8u%1F2`|7sT zF7-8IHD;ruw`B`910T`CX)sqVPc_uNW`ox*&I9!B{3gZoio=k zHUiPz&G$iQS4W(1z1ojJC1JL_24 z{SQ9;_y6{PJMT-M-q;Gax2Mz9EL|>=<UI4io3G>PHOGsj;wenj`yW;Z(59t%$w$1W|@nO63jxRFTC-_FfpRj0DuAeVt5UbtP^;B8OO~w> zTTgV1YD2En+m%|U4k@Y+${jJ*PtXqg|4aL&6dJM1@@(bjvm4uKxu;b z%#zk!_NY_4;F{6HmdC(cvtz<0H9CgUn@o!h;HlA#?tb{lIr|sY7NtE%CmQxcI5Sro ztZXsh-qU&$#T-#e_k5^nz`D`aw@?4AKmUtAzUu1huDjvZt1iDRhzs3K`u=nf&UM$9 zx_j=r?@t2Xf5#^-zv0{8XtcV~@`N;7v=w{bxu3uH?we#;??QtIbA=*$2%y`;gadj` z$gFCkuQ3n-`vltqy*w17d_(*SsBHYGM#pS+^p=Q?yh=>nm2{Wu1DYc98U_r?T{LoH zF(eEgz>U|8Y3S@h*wXsg7fcu20$k{I^c+V>hXXnqmaogfPf1k9V=s{EO$iJ23Q*1= z)0PU*YtT=U)o5!tx9|mNQ6Tx1o)F!ZruW(%t)u8AK$iVOz~x~I1cTR|5xW=@+`Ry5 znvrEEsWX8(XFNn7))=-Pz&8|$B5V-BfVkz!UeO*VH9RCDD&2CE&M=e5g*?o=!BQD= zj#R2YCo%k`GM+NkuNN8d2B)oIn7hDUAk47^9z#E5)Z0z;WJeY0B3gt4j}Q6An*>vpXAD|dOq;)K`ctAo8@+J$`%3L}_~itQ^8U47?6k9_g{ z?|%1e@~&m_JJa+n1(xj0H2G*TefgA=Uq1D;2F#yW!aFH#~Fe^~Y|#;iJ+7EkaukNZi$CZbTv%+gtR zJoiCuTohagC{y_0kk2A7n^ln=TqcnUUGIv<10&{T3p4DoQ>&QVfZh)-1Vk%ct1+Zv zxuH@Qi`ugi3uFul!e^2z-W2+pSn>2B99Ew>{oFceJ3X94YtiMhgBkb@I_Jz9~uNg6CL10aF0Bd$S6=E60Z?Peq zEjlF`#4e6R@Nu07R&Ayl5src|oC!9s)WY{;cjvs7x7%I#8Ff-{Qa!7=d7 zhE}R6r6!D4uhy|jb*a>}N>Uf9xs1Pcqpb8x_{eZeZ3E~pHH=cJ4MvnorB7dR_50qo zi5K0|&b{Q&$MK@p>6OYYI2MNEi*c}FscwJs;>SMsmb39Gu2f5N)E>apFEteIx>V`! z|E(MEz7^g8{*{a&8_xAcG-hoB-aWkaQl(w0c1q=DMKarxRcq+jKBOfF5~_`jGv9K< z=f8k$x6M(UF8VGr9{{6Lsa2}W_`P)rtOwl9QdPk(EjNu)MNzsFs9=?SM91Z-{MvVZ z;^8~a$Kk{K0q-;hMpDBK${omCrz9<|yXDFGVrq{Uak|23{KOY;{`4DPTPjIbundbG zV9p+d9o#l8z1}vf9lJM7EN23%!wUPB#);lLJz$!VWrH{t5p5x~MdYW^(SU5&4=@)@ zSD}~Ti*(17})E75Tyt;5-{6R=@zje(b1#{}ZBehYTO z9$SM5-VeMMZVmT2he-|49B_yI1E%Y2EM>yNaiEpQ)5WpjC*Wj4ZbNiSYPTaBjHqZ< ziH$)3O3@7&PcLwZg=2$wfP3tKECvH(JkMW_VbcT3*aVV|sIGkm>$%xH#x(}abx3!jg9A)%jZ|CXXdk~)AX6e z{OS4pnc3{=+5D;5?5Q;SMHKz2D1MPMB=Yk#{pU3O_d$5n_Zbg~0qf+}IJz}TZVSU} zCX*|pbUvRRc3&T;~|ZMrSnhj|eF zDBPMgEO#sbw1P*aJBG#w%0Uw`Y}IFK+N*JoAsh=}9m==Y8$K?k0Y$Y7aTDYuWhy^B?~FTX8V0GLa2b*+A#+8RuU7?W-=mx=n9(XFOFI`{pbyX4YC-~RT+n?cyN{C9u!^H*MT(-oIp zG;#Xf(e5>O-2b;vJo(8Fe=M2gJ7>HxN@ul(;v{>1|H4bJyz091zxu^+G6t`U%>yT# ze$x9t^R=t4x#{10>LV)TEhMMG$a14?oOSMpAH3tj5)1{vXHVc9w3U9aI{lm9IdsEK zH^28ipSkXaBeTV{*ga)u@7Chvw?6TMpFMi}t?&8Ww`bYrYhV9Hdk{4B;hDevkxMVX z=FnBwe&C(IE6LrCHaYRcH=h04-@WkAwbxvG!&xWpskTg+BZRC%WH5w{J_gj(@Cp9^ zv3Sm(3#rab4>sOg$3|eH1fZ2(Q|jU`a8J3d^}u&*0h@x;pqOJe>f>1DdM_?^Bw{SY zx@L3cUkGiHls$&y(h#-s_!N6#T|4KJ=f(+fN$+Sjz5V)_d zyyh%Q_{-iS>;OfSGb1>n$_DO@F|;;tkJYTvOdHSi@!SkIwO|Q4V`VtwP~UYYX%12? z*iif>!{~0J#9MN($(XerF%mMKwO9QXQz=7yNi^y(bv9t!N2{t|NHgV zUHh6-S7)7&pMG$0#)0Lj2j(a5n@9WSS54FZbGAG_U%oV7GFN)F`ARlDe(I^u9R2Py zM<0CV@B_~rzVDeM-+lJTL&pw3aP0m&o@M;{ek|1258ZR@$4@+e`9-g!*(+O{41;Vk zKjdFm8^2yGNbud=)#~YD_Wah? zGaDPvt~Q=oZ5~@~JUyNNGR>Y^EPpjy`~u5#_VelNpOWm+IJs*&yC*O1$n)Ft;?8jbsaK1#oehI5VU?N6QmU;oq7pZn+scK4ig>!W}Cr4PToR5L&~sB9qnw6}iX z@V%FtJ=crp?j(~;r&pZz*bjdE`H#ML@5!&d_{N8S{*V7)bnW+j<=Z!3^XYJT>Vt>> z;{NNdIp@?f&V18*fArW*wOZrc^S<-_#~*&(S!bVk)^Fc+^pC&x@ps`DJ@EK1|KTT( zpL5n}r@!^%Kl$VDZziK^hd~=46=wrXWMD+)qA(u9NWCKF@sdQ22SeTz*D&5){3UtW za<30j59tlv4b6eCNCMey4J$Lrgmvw>H-LDM9e%0;Cxg{DaC!`f1FGOP!{R)Qp&=T; zGVcYxW5)o;u}3C@D;8dugQ$gjwW+{1h)hZgOmE1hq*~0&Zgqid)+NJhu9+e?i#?v0 zT*a(yPSU|?QsrS*F+DAqG0$3L_<`dP%bh{m=!I11d^kN0T>{_KbQu>n1*w%$0Zm6U zFvt|BX%n(*AUTOTnz8LNr=2X!XoH0|lX=zhC2wZuyNpnC4#@~mHj*7H-Ie_fyxAU2 zm3X`5&052v;bc(Ub>Mz9Yx~PeFRD3dx#Rwu-~ZOne)h9#ue^OUBzWA5f;+Mtzm&NQC`Rt$L@+fVK?qTK@AwNg_RAqy4|)@7!PRa%PZgE3$x1H>;5 zPv_h;ug>SKau|~x`$WD66fVflfG;$%Y%u@=_01qS+o)p8H8Hp+k}_UoW{(aS30Mof*}?%BY*`0VL+wJ0bF7l#3r53X9z<~sUJIekE*Z20 z5ctmQyN9pYI`uV=J$`gx8t~cQ@R2{b=(8Vq?K?hl!52Xd_1=f>Sd8l%r+(!}_ujzJ zM5)%>^VU1=zq#$Kjy(GKsH*{srBd~Z2OfFdNju-X{_y)=dm^JH(BP%&VEe3p_&@$W zcI{H#lI(zShLT*8opV2R$s^Zagl&E4ibEfJ?*Y8%pZUArzWNh*f%8_Xw3{k>SpYgp zZ%`_0pZog5fBR>Dbi>WJ-*eynZ+_kBSXqYvKPtkl6HnCF(}XgXX0*e2aup7p0c{6VZWmS?^7rY|rs zQg`RqKlX=t=?nC@;sXjgJJx6Z8T9tGQ zf~@CZ%lppx-GBb)|NU0jy8FKS2VXd^R_T29iaRd($_Gnj6+S`D-G1-~e>!mb@BTM` zaO2hIl}eS*e&yCrzV0>H*1p&L?%{jBt@Nkg`{AGLNhYOszaw|m?9?ZJ_=sbAcR%pA zAAJ3O@iSXry!QSNz4P^@vI0qK^e1h#FO)Ke1ZAVIS{#`KXQ8YaFcHXJH)(>JrqJeC zC3E{ElX=!6)<;pSQZG}pGpHhpC#jvGNI-en0@)eafaK?<9F^g9)}sU5*qv;;{b6Fc z5vK;W2J5UF7!v3P{Dm=ayqs;eI#k^Fh{r<%fMat?94EBdY_rjYG>(~a0JYVHGwU;; z0ZV98pq24dbp47kZVh8GVHH1JBfHrPC6|Hknl`LMgM;Q>j|fh-SOaN!tYYW}lAB3h z(E>I4aou8CH?%hNJ6rnM5hEntyxxx+Owdk^Xv2y(>k!m-$g-MYu0)%Xzc7+LTD097 zPiw=h%2FNhC2P8QeN;5OnFL8Ln)#K0?5|$%v!DL`bvImp*6Bp{!R^_;t@+;V`OfCt z+n!%K&Hu+tz-yO*6?Uz;?FKutVym$AN-yr*?-Mt)s+}wC^XB)_Vacc__`}wV%XP3)kK=vk( zz4^?>=Ci96b@y!kt0aGFz7)u&%Kk+$`+1x`{u^Z931nx2+5~iTGyaMN)CRI|j^jK} z$1}n@!ZI(SMLsABoZ&`q%+eBE>)xcIxwxjZyFCt6a!i;#vYC<1sl`}}VTtBPUU{A5 z049R(ERtkreR5N^Yi+&KHW-+0DCI_{(vWHZaYKgKEJ3|8nmnwKyl$n#j5^NhVvQ=M zOY(AlKdsi#plz`!G293F%;7u6mzhIiGLza4IAuFY3K?#)AfDlDfLk;qV$%$rr6Mo} ztfR3BYu$x$YG?x(gLN_tlsm*DzQ|Ei=;*d+N+-WslE)SkZPBWfVjq%<8Ga)7k(nxM z&Ca|OmeTkwY>=X!HJO}nV6c4T$y;q(|NZL@fAM{9ER~1%9(f|~%WwS17cTe$RCedS zhwfNTn!9Ix`PQ#}4a&MH>%HjpmtS^6_oO%e`M>+e%dfcls%vjNbmcWie)#>f-|@~X zA3E&0c13Zpi)!154!-G;BRA@%Awx5%?t!;_;F??RzWSQ$9(wG_!*_fG!20^t*MI)w zX8~d9Z++m3%t zzUii$Z@u=0TmSKAKbTIe18@GlJHP(*TB%-=y{isCnJ4pWuY2%aC+?}LkdR{-k#~LS z8<&3e9dG==c~@Qn1k1IinjCoD19yMNP*ux~&3=HRKIymK_t4$n)~&u9Oov|5)RQ~! zdg5It?T5$T^P-lqedyYw!=Zidd0)TwicbRiU;M@$UwY@crG|0v_3wK4_KWO2XWsho zea(j4gkClVrEYrY(eG`qPP*>u$6vQGD=EEFRsHa1Z+YK)e-{TJf*wQYUw~LP9UO#a z4c1wSZMDbp7Q-R9sjquLc1s1jMeu~LskQMYy+aTdpf?8`W8?&2Z0v`X;ibWQzzWr- zO3KTGtZK8m9m=|GxYi(c#<>FV)b;RM?@b`>nc&DyQq2Bt;LfKiAIP}bV1XE3r=6hL zP;Iq4#5$$6!-7V@x77<7W#)W+%rvM&S+L565e&S*!i+sPE^BZ(J$#Gd4mXk5axVpW z+fJhSi>4UzszJU9KmZmkCt;QXn_bL0 z>SW#-FrHqsCQYm`p4SH%n?sG~oStTwSM0dnXGmmSq~7x8?a{0`Dr&u?)arlsOWy>t zZ@B5k*PgX|+Wy(Wo%x=v#n#4bdviJ5o`1W@|HmA>roP5<9Dnotg%eMH_Tl@E9r>=P zmsuxVW4ZU~2k&|Ikq2Hy_QUr*^U!_A{_yeVue$u#iy8GbkiEMDYQMB+=jDwps_Z>G zK=zv2$9MM}$D5n0gw9kqJDmxJkWE{WM z4|Hz|FAC}yGPx-lHnGH}&xt0QZp;BjN@6YW!{P%gJ>aKim_uDI;F z;Yn|K;NkC@mTL|p0I?$(C2M-ulRroXW=Ud0zEax^55DPvd#})?PDAeH2j20$M<3m@ zT1jnb>#X-Yc*h0U%QvpQ;jP7+Tmn+I=FTLj-zx{^a z{p3Yge({5)D#Uth+T)rM-Fokn=e_q_XB1SW;GrYm-A;O^o%^9XzxMS;rBk-zYmR&` z4U#q11(Anzf`3Y});O@&*NtX11-t!ug zb;?^maNjN8C|6rbcdXj*)T3MOed1lG?=R^ieH3(t`);`BNyj$d_NlMlK$R_j<@|fU z{O)&_>c)ZBzw41ZFVwOV?tkPVts`~19wc+6H@*Gw#}a>b?KMxlX=hcIY@CFTop;N7 z-+L|&fXr1zm3iL-nwf`Zx*Xqwu!X+nC?AuxaVS7`OIwdIaugAF3zfLa*}uSdW@p2k zOV&E{f!DGz~Jf@Yu4>^QNAS#w~jLP0br>u%NbB(Sv?GS(rK zbz_*ocg8yvYof8}CU1+r%+TO#`ZE`hi1*l0h#4d7A%}NZunt|!wht4DlPVNVz}x+SBBi6A_kFr zWHd9|oLZ+>H%AqSYs0O`COl|CdFWpu+rd!gRP;GkX$-YKZl?f81=d%E@)ao`3}G{u zqhnQ@km@F*RM7cL*F5yf^Z)MP zJONDK{kgAQ@}+l_D)u8!KD3=#d(Qdh{g+$}_q^JX`_UV2y7m5=?mh7RKY8m}`=A+1 z4Kvx;SF3AZzViM<-})4*V>*4s8RaLx`S3&6>Ya9}(mD0FzVZFruEUl~CH2tZzxQlB# zHRbYqAN#@w-y*iw{M@Av{?(5k23s$=^~hI0@Mdhym~8*eKR^54x4p(*p7qCn^23e9 zFSktH_WJ&*fB3{t_IOUIqMZJFUw!$7e+bRe{@?oGL)YP8YPJ6K)*t-oA|9Xmt}j3F z!1YSK0b8Psw;%oCk9U&cTR-)+n+|=fRF;}80QL<>9=ckW6-i@0Mx~*ie(pz)-g9xe z+61%UAK-eu`)k)cbo(LP52coM+B<&#S5N;!Q+!|{@@4RUaD#$ zEzbe6+5WUU1YuREYztzUdC+a83nD`ow^Y0UAG=KXP(?(WEddziV1PnnmWa`tKn@G0 z_gV_{@2I0fq;u4<+EPK=TAPU<9D!unQ5U7o*LM^Yi?_vv7R%{HxXEn=eflFPwNH zBOyn=`zo@5<~6b(xa-(M_r1z%s_c7@{ot`@uD<-0#p30iErIM^0qC8VHaCy210#Fz z&hAS<_TD`&0NI;c(AQAeFYN3*zs&^gXP2v|^Xao&ThDH6JiEDZYy-&Nd}==bRhj|W zzXG-A^IuG7|6I)f8OV;~J7)8{irF1g@OpZCF}*d*Z%mR~^8DsJyD3X=5PeyJ>{*d} ziy2@YEvE5;$ab;}=eE(C$SjHSg*!EY*o2yE^*JjA-r>cCrzINgR)9GOTZjeRlmI<& z31x~!>sP=#NL`Q%BHbKU#8@ID2_R-uXDpiXaY;F7^?KfcN0KwuGan95yD_6qF`%CmPz-(RPDS0t0V7<*YO>y8PfTvy$?B4$XC zOmz?$lLAVanT0Z^`(pC7+~>HWwBA0C3R`Fy?C9UXYbKDGjBdBBddFmX9|I{pSQmW6 znYqouIzobP;r$Ly<|t94z1Q7#Y2ewVnwp;at{V=0yIzyamF64X_leJc^tZ}Y^U50z zEtCGf*M9LkpZ|Qh4Bs7c>Wpt)aH!ep%ujvW6F>OTl~-PM)y?-Gy7YWS(_6#EHTNC8 z`R1E0yXMx5zV_kCa_^xlziH~M&sN;|)ps7f;p!_dyXx8-uDR}#Z+^5=seS637ry@; zCsnGdJl?+byMJ`U)t4q4^BW%i!{2%BDYcHRJH8IZ+UUOjQ`dk0=;5mlU3lt!+ z)9-!ddrv&^?MpAe^X_|3Tx`7c#v%H zt1n%1>()Fk*R3yIaO07O@4N8g?>uz)u}}XVZNnSh_sMU5`R$d8Qg5o0ozt(l>?@si zyUlVWX2)-y{+2)a(;r`b&GpyaaO;gXUVC6)*6z+Ox#i*e@4n;Gt8TvL>bq~a=62mQ z-t@uGp8vJ?wmQb%H+|syfA%MT@VU>NaLOC6y5cMK+W(iR{|=j?OxM2A&bh0*t2*cK zbj~?E4;e&63@8W~Fe|7aD&~NKVnE3`=O_luY4XgPwPwwlU_e0yomp$W;rsS}zxUh6 z{%7yw-RF6?^KOo!k9xYRtE;QJe%Eu*~<=h`bY2A7yT1SNg+H8Y`+aU%>JadI6fXQy+ZoY~}%#y-ei{CJ>w zZSF9BmJrwUiimVa(AHp6n9k0(L$C*dT5iCm5R88{Fk#(i7sa)Wc8|nJk^nS5D9`kI zXlh7r2E2Qr$1yw_W|`u%7}!VOx*NL!^c7!B#*mQ_Bf_aoWcyNTXUO1TmsRju=ZZl5 zS_4cd7lnOA?u-LEC1j1}AiW`u)R1Pv_pM`zK30;F5+!3Kr}f1_TfLh$0MD~BAHz#1 zt8L*d0|edRKH+N>bwxO@i2VdJQ0U-3i!*SxGX~2+R|%W1#{dzm+aSHY3|!HPIw!_p z4zSiicZc(qXhG{w8$&s!L~^*0GY7INM`ZB>kN@gdzuvfYdv{Q)mJ{VtI+q{G71Qb5 zh$EYMB9Z(b>D&b@87%n=`Qi_$?1gUc{L%g2oH+dT(S2u+>;PRzse}7S#Q&A!4CkxC@a~`Xbpy7 z`{|Sbd7+&NV#VqQoqfPJu`5GLGmo5c&_JivqlUo{6@_#*R%A9X#fIK+t>nijSZil@ zT6XfrHm;ChF)M{Knpk4LD3&OJ=!Sxp7=@yjAe=>=BkFV@o>}8+yvyn5s}S|Fi0o!Q zXM|05?5t)d1(GH?Ecp^P7rUrnhxB7IG|*?T`=M|hkl~UKRFd2=mp_TG2}K60W)g7) z7%by1^~5UEXI?YtjWJh(4Fh3C{PnR*CQrU37~&)q#IjYmIF0xSXQVrRdMTIH=&U%} zp=8sUoWKW$^EU5Dvo~siTuc=eFQ>w6P;HQJo(MiJ5X;6#3c<(-c8h_(&LrU~jGK0O zyWLhBtU!_tR5Clgk>aJ7UYSp&aruZ3JA<-A>Bgm(UtO)%K^Baks)K1$r(NQ5fnot) zDCuzdquKWOiBn~n^Jzem1S;A6#rDLRvt}1ES*_7UUx7#v2iKqzjZU8#_74J$epg=nD&#-{a0K9hR0vpEG!}r3^E#pw*;zLk1;azi)d1(vU$|dU!Eu()~w;jOm`uuQ?67^ikBhN zAldLot_;asnD?#tt*1f0Bfx? z%z05CqYQz2RyYZ!L24a~`DKmJ+7R7Ah;DE^Z%vd1&@(DmeDQ-%{`NP&+rE4E_{rT$ zEnBIT%C$;~OW9kiJe|${&mwusI!&S%!QXPli-W4gp6hJkJ4TGqEAm~X_FcJtu24Li&U{lWe_brmE0QaGLB~k;opgF{p|n3& z*qhJq&T-k5$!<@L?4V;LyFCk`&DtY7)0t8}8z~hMrDC#FjF$={)sjDx#Z`bsWVH=9 zv~!f*YC;(uOO^6+vpogQd?2mEkUvs%#!5ORq-9E;n-ha_5KPCQYUt7Ch>Gb{ET4^E z3s|P6&zkC$0e^a%h6RpgR`_$!zhQ8Oa0MaQq47CKLVD68Ot%S>*Im@fVs04Io zm)dBj_k%$x0m^FXXu7JQZ6V?DUhES{HLzP?5aOK@n@$hZM`^g!3Pg13Ms;tK-$K^9A)FPm95I0n%W)@N}? zfM%1Ej5gw4WwjtaZ*~UFY(yJjBLX{k6mj~~77=C+YT$!FC?${tJJ>MW6UUPfRubr} z3@Z@9ChQndWDBhQ?}O3=AvY(FyCs z*h0}+91Kl!`stswDFl-k_(K4y^fnAEfFvN*# z1*fjJQb4>I{sc!BAnbzq3&!Ic6B zt)7U9PFr?{#A)Zy2Zqxu+dL7GD<8)x#pwn3V9y-BxG$RX#)_hXYm#+heMxsXKqA-qZt ziGzgzp}VmGj4{rh$$=f>7lK1&`lZPZOe;7T90msj+zelhwM}r?_|2&7;fys*e}%~l zz08)oAS~}j7c>srDX|O?ZU#9F*#$ath7e*llC#DN_DJ3m0Bu>f&lE^m*!3=>VP;Jb zdw`9`Td-T!?emS8JV}GX;(XYHC7iQG3sSTsr|RyJx+R4un- zOk!xPk%G+Yf%Nt#L2bQvL>FMrI@k?NJCZfmNYgdauttk&PZG$!d)ec^``th7*}LzG z%g2o$l-un}ty!zqD%D0c+^j!cEdIYl;`oo?DI+=>e=C)M?DNO>f6F?n2fqWLPaZxm z0!4^yM)(~*Ph=mVljQw3zT5m7i;%RM|IzKxE7B3Z>}KB~a-t8D(A zOmGZCAp1zTM4%FV8&+W`+D}`LFS{|vCxKzv8Mm3nr z;jEg1oMy0wGAxAcj^c_NeQ`)>8;xI5jZq%1S2&|}M`0%hTOI)tQJCJ%<8N#06;k< zw%yNZOkjn{j90(>I3WPH_&VUNM#U}e5GGNE#Ku;hUh-4Ua0l2VjZrJUQ%bti!)bE%5 zF_$+AlK{R0G&p`36J+xR%Y{7}bR}L`yoGKV3C2%o11Z`m^^(H4ToRjsi@QE&843`qm z>#RNGxRw7?Xt;l8qb)R zBuTLbc2j_R;~Itrik9m5MTT;e?Y@-J!{(6mZ1_j4(L5z~IB$;>Y~cd*HFgdrjzyy6Q{3?3zos~&gg4Gb<45t*UIumtMC~u9G?eU7*mAK=+ z<-h&iKkePWAIP3KDD^tkdZStcvg?&lz4~OK@PCunjUUD1-?5ZRKlXv_14Q<*1K{%c z6GS#({q>Q()Yrps5rOP)-y0&k_8*YgbXyOR-Trr=e~9dM`^R<*)c&E<5%Z0WA3JTp znoF~VXP7(l4`hFf^?xAy%l|*JD_<2$Ulht`vxRrFxxJ;*{z7RVkX;0_i@WoM?di;} zd_lOgbDVz6=XYjvm3;Oe$Sx0&9mr;33x}ELFsooLE~}nRZ=--RAM zMiXaPjuniam_~uY_A=BOj1HvmGte@j+>hZG##=C-=15*IV)MJKd)n%NJR63V*xspw?t}c7e9+NgD}Blg>R{XmL^?nW`coa7 zWqLV;+NG?<#?a|ljM6{6;q>0Hc>-Rd)0uPtoguUt{=t$XBIw&89vRs!f(4C|L5vI_ z^mLG@N`S?!fD#3Ig;_IdqZ7wNpg?QW74C&4U}-=KcIFD{IPV{~xR@EQG0UPZU4#`v z+z}UkvvR14Ecrs6g%<%wfm}P6&q=KsLj!eX@tessKcBswuI} zcDLQ(lZ4NjLl7XI;UXSpvfyU`&cbNnPr#b8mqu4eY^KrUvtap*Ovh(Pr6jJD%Nr-( zO-{WPqaS9|;8R4Q&jd<}$tWgSFiJ13<$NGxzqG6_@57B}4yKKM#&Hwt zpa7&XrCA)p+2qe~@=(<91Ijf{PD?_^;odf}CKN0@OoW5_C z56oHv8QkPhaKa%IRZ=x;h&{1PBn!<3l${>*fo2S5O~ITkS#@RFN~&q{ju^v5XS$^g zWEU>F|F^&S-GM^~uex%=#D1~gE;s7sMy(8?9je!!$mjp>O6|w`u(}=}|6VHptv|}H z1#cW@P&R!dhluPG2fq=H5h9yG*+;%TcIf=Or@!B__CM z1ho*_-R?zv3aH&7tS|gTZ6f`=a7@Fj75A!hYHT+pBz z*j1u9rDk6e##Ks`B~~_vQA}cB1g(wJOUJh}Y>t$mrnOd=+U%lP4P?}=Ahb3;EzHMB zm?7Q+q6CBY{}P50qIjtl*)8Xr*qz z4@T6&X4nZuu~uRjAKmVr1S9b9B*5eff{EM%hSGEnKqJeHux4FTH?z;_G?(eKW>Px@ zHMBW)LQ${72Ez5s5D@~M?1m)Qn(W{p-UY#~!QGCVO4On zdmzbI?E*0_42q)$habayD0HhcWOc^?5sMs_{V6*)V{sqcqE00W^aP?gk3YrR+x-*Q zfE5goq113g5_uxF8aK8O>5KrQW8^2-Dlus z7RYlMrV$jN00*yu49Ire{P+ma#P0M#GD{f0D~r~mW&n{)gayJQ_D@FvvrAY)8m0mt2YU?OVVGie1+1XF zC|AuMi6RaiX9?#D7Z=|e2T!O`m9vr*pzI7J9ilS}{`5w3zGxn}_eOHwXx4?7M4vFc z5g#NR$3gO1)a1hfUhi{T;b2^ecseoYFu?&Z5(eMPCn*s#1HEyH znG#7Z3#SJuZvnntOk20(H!Ra_?Z8hWXoUK z;~kC>;!s?>Be>bXWd?+S>ERq(&v?LV#&O$3hd@IR`Wjj|hC6d8ggKuHpwo+;g)j%2 znGB74JHR{|Gn*c;Lk$cDv^i0(#Mp4%4>2BhhH_SV(nDI@34nMI#vl!yu6IQs?X3|o zD5b*yA3yz6-Ogygye(c8#sAXQ5H={O<;0D5-1i$I`|#CQPMXv&^jk$ByH+VxswE)% zv3&l2R%(Ft-|EdDA%Q{Fa^=TrAG+Nih9A*s{{Vg6g4S+==D;+N{XN)SZ&F_mkzE$Zu2dnh zhsge-SUC%1XY>2Ym4icM7fX8zSc*F`*!lN}v(8zdIh-D8$v!S@LXXcJ8knphX zMkNL^8s!j(Nr+=(MrwOCR=3({=iD8JUoaAMeSoumBlcipl&grdrWm)tgah;#t5SNi z*$o|zoQ8qyb>Vq#Y4xyQrOCx~c8M-jBj^t(JDA!7?nCkq1Hhf(3=?_SKsJhxvwHDs zkI-T5j##{Gz6D-eJTV-PQ6g=D4=QdzQ}R1K3A;aO_e5>14IL$t2-yInpFr& zfM$BP-Jm(>X0p0$k_X84L(+=PKoE@jC7?=l3daft?6N<`-42Hco(SkHYAw;x0V~T^ zlm3(^k^{1hk{hH0!Ew?o4#rWq{7H8-4-?4gP-cXC*~CB&ndwR3^nl$LqX1VTo=_SV z(H+UT!&y0$QLsRF`xE#Shc99G#OR=4ptN6DDSD-0Nbtp-81&F$VJATxFpLn;%$#-n zz^pQqwVnPDXmhUwOXdo?yirgd8{;JyEn-@jB3MLx7Rx-bZX)}B0l|306{LNl-`qEh z{^r}=VPPXlf1$@=$ymf3p8{J51hc~ftE+RI0a8O;(*whBZxH~FqY~$tgD3jgIa8{F zwxSawnC6IB1Zd;-1~-k~mtA zkN`}Q3_G7s5KkaNUQO1vG_l$wI8T|8-Hsy0q(z7D?j%73iF|VAiLMb%HO&@ zhGRGCM0Tq^RM{8W9U%LgT!F}LG|$(u)Uli^SH8&R&sJ++RI6W>t6!8WpO>m<^QCw5 zg}s&Pp;8s#-dieT*;6b5*1Jlj9r?n}LUAWKUfh+>waTSrqn>Nj^38goQ7^We@k#|& z6Z~b?j1txWMr=BR0S$X~0?=w)EU3b87FPk+R3AudV0wLQP=E^x#B(qNdyI|4c}KE} zABn~x+B64JWI88=**3xEPnmsjwN+-tD67I)Ks*Xx0ayvb3du~x%^wepHzP4bwLdXE zXn=UPvO9@EiC|asWn)wavNNKC{t(7)gKlhIBVtadubm74hva02BnvWVj8=RQ;LA8` zx>iImAEdO^%OW9G76QccI=+P-ZIT*xg1%I@!K@fCl=jE1uwHV+f}g$JXOTlVBv>6I zZX31@403^*fmFAOJ+m_l^jCyEB!PP`L|+^z$GD!4+)QRn7_^wf=a1w(!L;II>s6IOp!fWF7W~m!NRLGAd0u1Oz)-{xoLyVxc#Hv#c1nGoPD|W^u_B zD;+^FS~&6;3=G``xGq9_VkdNVbB2~D!Re2~4B!~tp%E9BU<&(p22#-4fmp#E905R` zLXtyt+nm(MoIIfA3j&%>fzDyNBfcX?Gfp3PjU$Iy!WR_P@;C>G1ux+X4#P`WD2g+v z0S9dlV@1S5S369Cuum-ID#ka&G*&=oELPe`ZcOKu04`{bYi(j}DQ4NwEpB#DICEmt z$qL$bR?uby5zL00ku5lQzE@mgto&4n5x1XSj>*X~LqwFAMWi*-vk5@EV>-KEZS&Ff zDKt1x>i{CdIZ=;-khMe#u6Rw&WVwjJpHjn|;&(&$MI2(>9?nA|L6SqqSuo;uhWI?j z)Sd(gE}$P%vx!vL=wq`RYCuSSPuvVm4RPn<09I>3aqHZ4lyfT5lfc2) zLIp>>>P$D>`HnqaaVBdTUwZy+_xhjCT3 zsQ0j$r%1iQAS|K7g}^?Qm@S-A*%Tm~zHAFU+RT=;`#^0vF+?N@?XDh#(`-VMN5dATmdL+3v7wi4gP|~ z!_0NgkZFqdl*a;;L*n7! zhuiofIqU(*21;;v__CzA9R?%h369uh_G;mjAi?UhIlVT!XXwwhvj_%z%7DLS$?Z}? zZhu?>nmv?QE&NF?`}p-mt?C#SF+_+MnG^Vv+{Wpm z=bdF>V@4b86TTx)yDMbiBrUx^lrQSad$B34yBY}%9qH?;j~kLF3%G;G_;$WX2A}QLjU1wHBJrb-2W0b&JT7NZs%sxO8w>i}B?sewgY z3v5Hjz04wicq7;i8z2xYa@pC)!p}M3e;^y2rIBz)V8*zA_U>Vjj|+<49in5(;dS8S zuq7vBd8L4I`fWHlsW62{%yweoCk|&IaZa$M1hdLnhvBOrI1I1~Ls65Gu!gd%y5~(o z(z4PM|702@tNOW_#0=Fu%zZF=6417`Xxi`gc6hjSO8=*_M>1A z=a@6;OJZ-r>k@-51Ev{RhT$+BDPeFNZ{gcTZaR(!8lNm+lgSw6zr>a|umqqy6d%+d zKGzW|VIXhD=-!{Q#!9wCRZ7+@;i8mk*y2@{D|YRTcmC{Wzc_IC$mHqc%H@%2wNR=S zi`8PeTJ+V*OS75(Q7m07mM;|e_(O?RtuIz87j9Va!_7Bcym7(B8?L{wV8O)&^DoZ3 z?)>blF3!L1hxylCoHzHvb#pGvx%T4q^S{4hCQGeCq&FzlSy+{IRx8*EYxUI|_>=K` zwZ;#X>i3oMg?jB`wa$>fO6@!0w*ESmJzuGvFW1hMs^63My$iCsP}r8ug4crDMLZJa#X_@OjMl0nwQ9P~$6TioDHhaH zkc{@m7*6L5GEmPQqk{`J*h@34fv}C2t>G-kOt90i*|e8IjFxaMv~mbG+Z;+8{7DUL zs+X0dAjvhHR}AZ6yoEW(k3?hj;+LQSqfIgZt)+*=35>EAyVcg)_t>g85|XGP@W1B>lneq4$}EK|GM0bYWZF?670^ z)9XS9H>+lo*TY%OpV05b3gkH{jQtqxdXcuy9SZ4Zl>9bN6dwd?@KI)yUo2)(o7)je zyTVyIOhiht*%^c+#BkmuA|GrnwiloTV_0-B7%f2hF>nPq=GYecE@8*`-4ixLMM9E$ zpmup@QW0BS(A`vjpnz}+i;A6KO2X-llF?%B5%(=;w1&#s!s$l}Y7xo?h%IH7`a6NQ=1RcWf0c2Ba3k16u%olJ1VM2Z?z6jnT1FR0O>BVR%!g*uCXkH_XMJT;R z){Mhvq`0Pl_{l3G!tH@+TxEO;OfrPOOI$M85C_g+fKlE;8)AXVhS0-e z4rQImsy$gY2Snk(XweYJs_da_=iT%P_O@x&HXK3{P#i$kAE+e{=HcGdp>_Lkz&eBvHb6)^4}}$ zG{*J?#nO-M=HL6>AG@8u_qsp!IzRThKQtS7^2dJvhj#ae4&5VMT209Li{0+UcIQH? z^=-5LeXIR#qxns)_-(6wuF?Lc(LCR1ooh7DR%)N;ieJ>~UsP*fV!d4bbGhqJ*h~==_6;N9gTpd#o zW;LdEg&?#|k-SCHBCACH5G@2x}!3vC; za3pN?%jh~=m|e|O5+^5_Q;r`13_nwKg4mujiZ)0^zs1EU7rnu5VuB2FCV_1H%Ku>u zoEC+eU8A?^4Hl87L+7}Gk=@t^g4)I^C?<)l7l%iJb2Q-MNZjt$LzpvUkUc6*oSF0* zY(6stDO58fZG%=oEjVJuIK!7Pie_4%5`;F8EpAA5DFc_WfFO1yqWDq}eRK!WIU}MM z#H1VrsVktcMIr7+43^zSlhb5zLc>C%;Tz$$#7%A$^Jx%hCWjk0IRGU4V%W)0fqDF4R>w0y064|K5=IloWTyFWSKJS+1rHM15c`qX7cmO{0!F|Vpa7u_YXO$wNkxc3 zyE|xgc<`!|$PUUFA~?M+#V>BD*PKOe0>Rzl+~ma_h`4&f|F^*e8u;Xaus| z85(hh(~^J0LFh9k#}~@D!y}PYRS9G;zQIWbMunGVsHuNiV5R7A_tEEr6UZTgaEuH+ zA)WxNso#YQB*IRHmqvyu8t#Du3%Y}N#_)@!BM5s4$=-zQfwG2S2;%F5+OnwhB(4#o zJLt1^GR6@*1cmXv@QCXRJ2&*A2p0ah!E~?{bOyqfWt##SF?>#N&A;3*|jSWLH7$+MaTC zPo)Z2?=Dw&mdZQIbt~mmyP0n_f$T!NSs8Q^l`4iZY@;4zaTo)uFvf5i zweF}E1cXKwZVd=+R#nBh1+{slq9T}@A)8t;|Eyxc8T?eD2H}!|wFcJdErFqhL1n#l z(PdGIVqB$TDJXieHC6@4))3hYq|;&@gw6% zWC6j!9hhfdT(1N<@reD)0ml4U6 z2;T+W7r+5F(;MxK4ur%u*zu?nN(U&RgtxMhqlq(PUbYN}dh*81ppOz_K#0)Vk}m}z z37%3sx**)*4sQaId>EbxaV>f9OdJ4(kc93tIRe9YH4)%N2PKg~mx8GCDIx((Ho#X5 zkcBq`H#Q-tgsn102{;?Vlo$6P$M4(^ z7=br3?2rBsNKOy<3(e?s6Hic@A}E`IhEUKxKOF_YnFksZZx?0t6?ZTYh`Ygbz>BkC zG%Z7i1HO^{A1xfADCxY&!^c?!E4@-s+!&GIPYx6ue!hhB zk1?5e30jq=UBq<5;Ne1eB3XB6L=L1dn85e4u*Djq7+t=k>`y4cwB$<&J12r8*@b{p zivTgcj+lF-YZ%mnP2#|U%w?vJ-RZU16`Rvzw#gF495REcf70XplhKVbTOUwm|6_0L za*0ukP}!Uqz!}DqE(`+j-RZDqMv_QJ;tVIP0xcY^2oP*$32X-Q;e(*5!Dy^w8~hS* zw(%#7x8jT86ZuOJ3l1CS5Zt#oJSs>hDN#||d@8Hk?2TLeX(K0~SVhDZ$$^O$PeNt$ zITK}HuA^6C1~(m})>s}8$1P20hO*3#2{HQ_17zIKz&h@2eTbnTU^JUL`VyjY1%!FZ z0)Yl(K-xp#569OI*3X1a$484K^|(FC&@>&BCle;oc2dhg0zW~II|?FQ2!8{MxW=$g zd!%TN6pW#qEmpQhiz<8Y>Up>Q?B~BcdFqXM^JY#SD~}&EdcAtH-N2IQHkVc^Lu3oz zMg0eWyVd=nR)-u0skyY>yBdj0!0#WnS{KsHqN*V)4PCRBFkT(fnq-uxQKuGYWE7Qd`D zzNj`nuhjlZWY@kdRo?@$YxRTRbxlyaS_7h>{%W;fs{+}D7I|Il zw95Tfy4f_4i~**nM+^2;1-8?uL|L&9(DWskm*h`DO{<)K78qfxW#KU4SPHz3stDzf zF_;FjRnDN^o6IQ^WBWQ`FvR#%Do ze?SZcug%A4YF8K{RBM5VEciyMkltD&1FN+bms&3wTp>@cVU1)=P;*LDZ)RCRdnnD> zKamWn=k%r%EC#tm2P`M3>WpM@$Evg@wwI*KTO{cK*;d#Cr_Nv_qXjzv2!q9`H#s22 z&2pGNXwHDKvLIfSf+>2gakl_TP>%kj#T{jGIR+dKKMVub>BVN81GF%9NLPt3l84O1 zOEyn5lq!31cQ`4*$b5K~gady?*gVITp09YmFwfehmo9S)Yc8L^A^ zvS5(G>;xmAqje^`-r@ie@Gji>cnL`I1V`MyIOHM3CcPGdFR&{R-DXLV-9a!5Y%;Rv zH)EEu_(DnOP(Yjt+TnFL{R+S&6Y&nG7qE^d^4?$)LY35GXaoz+!ERyvf#YOMAsyn( zT?AZUx}~INc%%MsE*dXm&lX7Oa2oa!wpNH)R%-(K$w zhJ_XPe+mz0trDY;2EgoNT`C+cUFr~A*aOx@bg&dJ2Xb90Q8k3JMjzgoQrQEuuDR*6 zpa0_2sW+~lf5nus(u7`p&}(!$&33n$?6sCuD*vMbKr_7WhkD~;v-xAQbFo^3943fc zT%f5btDCLw3&kIxvKh?Rg>dHVVz2Wf(A;YL*lGR1tQk%-4zp%1;(4*n58d`fJk#l3 zXbNO^Nb2vXvI%ae?0+D;eICfJHKDSwm4(|6HwqS*iiqyKD6W z)jGJm7mv02o@#AJ5z@Q1t6JS5sEsH0Rfz17P77lS@VeA(mj~UER>vMGsGT4z3~k98 zV}}ZgVn}0RH=)HK$)95LwqQm~_IjC6!-<4ANDZS)(XB+a{)Cou8zF{u<0WSpuVPeW z@I;3>ifX$k(+brLUFn6n71a)0ex1Y1^hk$~o)D8H+#^m_BN2Tg^>jh_L0gs93MFM> z8oE zv+<0}k8y*J9S%8fY+`$IMqv;4ATGM7fk(RqND8on3ovDh9z27ums0cB7cN|WGszJW5XTgf%1h$79}HC zTGPm=4@T*kJb-eNV`>juA4s8`D_#cEwayUu3lQtvVlGi;1#Jj1rbM!QHi>K?g>lo; z8?J?=#Q@wHu?4eIj7|*D9B*gkRn~4!8I+h7un>+>j+b$_i>w^_Tl^!eI-^x543-5wAlN+Qp3uRO$hA{g!YfE4%mI6SjLkKwQl1{ z;Fy}4^1RjjQAA$jPipFRo3&N3bi07{ckMQo@7omA-$TE*!EQVWYInYGcfSRr^TqS+ z&NoduM#$?%3o83BxxyE9^7`{?rjt&^8i?mpg|6Kb=j@z^owgzRaFgS0@aAV&2>2!9#;^{G;ZBC3f(XSKz?K3ceD84RZQ$1zT3+~_fg6kLH&a4-At&iN zcljWqq4!}z7^jTy4!9^GFXJczW}Azm57c&eoG#D}f)olJ{Ng+w#xeM&PKE$QzRbDH#@#zH%1#@JI7XDDA)j`{MMUxFarKY)F6FDmgHW8^POcux;20R-mAj z0QuP(@D5!;lTU2OaUL{N; zcg2S2qIRprg=^%2ITWsc2yN^ky;KeRtyWxxsUfk;lkB`w7&a;k3hr){w!EQiV-y6p0K zpM3iB({G$vu;8jmqs8&PYQIw(^jcWbz1H18cD?ySqkW;)#B!09tlJmqBxwTEKMa?S zcx-pRFIA|cfob8(rq8RB2@%Ntu2#o0 z^oNk+cn=pTjX`4^(B;buJCoO@l~b%Rkis!z+I`GE!W;Jm48BZ zy|K660I%`5qYQCf+f}dctkv;|4WP0I^;)LaA+KAlLc3M&cauOi&Xpi6d#Gd7f-A@} zib(($22u_68ey&zM=hS1&PQhmqdZ|Rfo5C+TuK;JK-n48ID>cuvaMl`w7_dU?WpL9 zAxtbi;CNIbQ0vg+Y9`3|wRWGz;)Vod zZD1pI_D?W7S)+=1G-0D00yiCDjO~&ps3(5{nwLtS&2EO;9F~BF0V-Q(bg(xKe#Uq^ zs4cOQoZcpzp_F}bmcxcXaRjKQophJ8bC?n`;t>K+$Z%lJ>JAT?ZgfJ>_-x*ooe>T` z5d{GO7{F*iV{x$stviOHI*^TZ;3gQ&m)lc=$r_ZPJCudqgwVEwUl{oUtdPlMH}mUo zXBx~d+`tZB)FN|s5kwwRn<%I577=xvqhq3@$lUV-%~c6@QBr==_r6zmT+uXaBTd_ zHs%E3`-0uLltYybv21k(?VgBLWK=T#I-J3or0x!lI2makw#i}eS_!6H-WawYE)cfh zwFEOM{)Ab@!BE%=UNaoMjnfFWGVvY9Pt7g| zWE>dJ3H>BsJ@(Aaa012RbO#->pUI8X@|?CM;)MqcmP3?qq3;XViyWsahi&laO?Hcf z?O{h1ozbc_T6wu8KYooWNF+0J3#q37N5mmb3RBQ-5Z!<*bvJAPm9@6%uv}li)m2?BgV2>2_ zz7dr@c*%@wKlt#I*WY-1-ux>@JJ|s_R%v&ttyVSGtlp8&{hx)>_oedprPB9hJc^ZK z@j{_^pYv(G}^VRw{)%w|D<%`6~SC!hApmTYc zI8*va{0YN+MrQScH8-GJJ)VzTg`H>BO*p(Y7uxtFE%^#hAEA~VpwHg0@@iSR_jfH z&KetQ65vrK94R_aLJXn8Du-Xiun=4k`a>8c!T>?m!o@YEKg|)~EJdP3M+z@oSSPcf zn3{ePzuLwE+0@#cToSHr2G~i|(SS9$j5`_6=p~KLg6El=j=PIfj$Y1H8YSHGChFpd z*320~F|WvE89n>(GVYt(i#l^aEs@RXN8Ix)UTkpswa}X+EKum@?4pBNlqO1Ja3^HP z$emN2^rdReE;9zpP$v!wQs{B)*@WBGANR#_7O=w|GP!~f+SnmR0Ich6_eHbKNI2#6 zCLEqP!`D1M7`A8Y6C$~`JDT^!OHyFO8BB39lfA5h%)WuZv_qFc-g4Y+!hH)4 zGOCY|#nD1R<9R(x^l@sA$ByHFs#I;-<0DKiAAQp{<{X7bir#=o5M^$vT`a

=lDI~lEF%`Ac=&bl9#Yn!ro94?6bIh828BZ&!pXf5n3G)9PJb_ zg^Y;D#=xtau%?O^PJA3HS2#N1WB^?aobpwi4xd{I;TzdOSQsZD)!~uo){g_4U@nQQ zaEj8!D6}x$6gGC+mZAl)5}39Gv$!+$9#-80G&RnUg+bg&qi+PaJ+{Zjc-|ah z(z%h|=djxDqZ|{rJ@@Hloe%>H2STJr01YI1wcaGR!O+JELCxrR>Sz%?f?tIizY4sI*)$`dIo27LhvAMtrSrqg zWB>RwruW9^4*`tW_BXBuh0O|vXll^eBCF^CacOOCwMZ^!tR6iic8D(!7Ub0$Kxa13 zWuZ|y>`s=Ug>8Y96i6AN0Bl|}c!%GHg(XKA`Yq-F&CZaK?p+DUHgRsyhufaWwm9@= zStqm=R5n1#SOSdD<$xBHhmut=T4&&t9ZD^ff|`aIfMkYjH+!NWyWJPFvCl(P4^;>* z_>&HQ%*xu?VZGHe>%ND(ja<4r=lwHpURrAztR9uxW^@1(evL`NcotvZ6D`FHeU~q7 z^JVZUDpvrbSfc}<>sM)QDzl=7nKV09I*SSe0xRF5GRYA2(5f~i2&D5N3#i6KF z29-*uHoI`2)9g-afJ=Kkx%+qKvp zV+-I_rM0RIPMl{xueD8`ciS}+Cy@x)p~@nAqAr)WJZaYA8*b36v4L5oF@qpLk{XAq zcW7rqm9HF=n^oU~sloI2em>{M3mWi!}Gv`zH5C0e5!cQK@n1 zRXVdc7&Tkfuq^;9Y=~F&%)?@DVjbJ&7$j(Iv88eS_RZ7#S+&L{RVS@IxXWfRs&wrC zV6n+6jTNU62EgQ?`vsQ|W&@U9rLn=}(=X)m>xKV~r_12N=uLw&CVB8iN%F$FtJG#a zPbNP!FmcYho$LAOS}R1c0Y|H`YD_M>%ZGJQ0i4PgKV$r`6<^F?!qKW8e0;}}8Pn7n z!$|wGXPSj`pI!L` zPm5YyN?s15mMN?_Dho!9{8d=Q$8(VNUEN7hYcU|%R_1&IC3eBn^n6SD?K za910kcFEh;_%}&4D?sb~IcBV(eXE5hFLe7CIz2i@Iz23mbh|k-Hel>HP$*FqzQHoPivs zs%ktj5u=TDj*ysB;|#*Aaz?=i0Up!Riy{gVhypKwwHm`6$i|Tx=ZBS;igi;Z`q}U< zP!%7CA)0V2<0nX;wN+hYriD2b93 z8ZmofCQroZiP-}qM5-$UnCc;gd5sPiS;kso@+1h3M0<%;+l-?jdyF@BxN5Jk+nwf1FG<#!M2dNDZYaaSi6=u`Ka3|lp`{?aA zUjNe8&ptS`GvE)HZILOL%}&IiT9Ol|UFwY#ZoOyuT9lLhn-Ls}nRYHaP9(r`nl{4tObb5_8-}ssH7u~zG)2KRw zr7LGGxa*z=ubwf*ilMz7ceOI3z*jnyO-a0@7*JbFu)Yew;P>)u`+)CwF{RlUDhdQC0}~M9n0>xW&Ze?SATu(PY>NX zuUZ%_=bIn@{+|zTczU!oqh74)%--h2sh8h$@7Z(zbn}84C>w)}}K%a0RcwbLpLT-U*4DXiuDZ?G20XU6M=0RT}&BIk(?^ z@BN>A_Qs5{yv`^)8dLXu^ug_S-E;E|*BdNyed1M%?_D;j-)W3p(yG@CX5Yk_S4W~F zv#wwC;QdQt;TV1r7|_%v&z!yB_WPDSJZO}>#cp>nYOuH`PMH$PWXH|A?v~r`2n7?D z&%J%gqPr*GddJ?k-@Ns%`{rIb3%|f|IRE$D->(;qHt(zjit9C9nwg8%{ICD@|46&7S1)<_*xuJNm3lB* zyllq&JMMbm=J|6>21}&SU$l71>Rl&aS^X3+ef9N=mMmMIOOG@L(?`MqU#364(=>UK z{qYm?&2jfV@aXtn9hAplLZx@n1!)bj3ydw48#*71qUsawUfig-d*x)so349CYSwVk z>`h=O3JHum#}>@uUS$zJf65uj+e29^SkFKX-0A`)ZB&2E_SH>xV`QlKFh0gvX2RHXa4USuN!IYW=%LgHJL7M1Z^9fu{bp(fGd8 zr3)K>g4b9?6!!T}m$1fqyL+zF1+4#?Eu3w3zNojpXtcg+cE4(O&(>R?kYtqZ=(e+1J=8nT((xKJHhLgpmwXhr`6uq0J2-z(LrU<0pd}^vQ zk4EyazBWYY&`)BaTSEhJ&4_7-hP;N*rXN6OuwukLti;65yt3cqj>0NP7!-TsdPrt> z#KJt6s2M*kMnDJHkw64l6Vr?X^BL@JdahyqAq()l#CO?3NoaHEGIzWPLCqu@v!oZM z!T?s-W6%z@ppV|J84wU-9JYKmWtKNB6GUeC*X1 zAG`k9jd$LC+x;)>+`ZwI8*aQYpH1qt#<80peetCi7A@cNFQ1)Ux?=s&eVZRzvHAT| zd#{>3bHdEa|M16OFPJf7!z-umx$LsT?|<~_;sLyC3`O=l?o=G;1(>%*FAa{PoMn?z{ip zPk%dq#<>2qx4p7%*JmG}e(1TiyIy(17Ve%ne&XRLU)-_r#TBm|-ty84jS9ln`Sj^e zfBEL2yY74L%;7z^JhS?h*H%E%zWK)fsq?P>r;C4IvFz@9p5Ack;I^gDg^_@4|_1Mopdh@z@S9NC0I(p)*JMUa_{LLfR-gxWj zH_qH~>m9%OmoM(0I*Ee}m3jTax8}{5xNPO7Pe1zL);U+Lcy0f63$9)B`tivV7JT{T zxg~es^WHChIrGv>x1D(Vv1Rw{d;8}rpL%Ha;^&TU-+br2PaZk2YyHl{cV0X7<`sMY z_5JP5sdJAWef#}4-+SQBo2N}1KzcKJRmYNSoZlbDQ(G8A&03w%$Rb%LfoA|m85|53 ztbw#BBZV8-Ymg&StY`?NErB$6YH}y+!K@k3^e{0UX223;y=*-sJOe+XW`B~j#Wt)B zLYKF2hOkMBEs~ca1!ufuVXK4@PJ9vZkjyX-{$ULY6XY}aF0$$&=kX^Vy_uGhs3@tL zoT`cXP+3R3>`pgbvD)Oz=f3;ihi||0!L7F~m^Ps@d3>usXtjIIZoi%G_im|H{(HFw zSq<_I0sTExGm-t1i{k=d-C$ws@0*Qth2r;(1|>F2@p0A>q-McuY$-_n6S7;K?;1dM z9mxI;XzpNvtnQv`w!f*>#d@DEkyhs{=uDMe_^R3dve5>zzi4*9Xm!4-w?57m!04l$ z{xMLy-96my9&C5^0NJh9K61IWtI-0l!RW2k+D@*t@VK+p+|_O!XtpMI+u704>S(_@ zI^Z&HknZ+$zLW}zIF>iZ%jO8HlN*^Y6H~haoKEE2azyP2XkeaUN&#!W6vPFhqYT3x ze@Yih>)bJ-oZ37r3i$C|8jS8CoPpE`tCrhCIju9uKyU2C%J%9^r~#erZu�vSpD( z6J$fkp~{B7W=BU+0voTg(6&o2dGvNS=qd7LTsjCPU&@;(8y!KT90GQ2(Axfl+UPXc zSjHOa-r{0d$T0McVcIqYYMP;S0Jq(b@jj?67KTfM`}RNz>mtRGU1@YCPJzO5&?nB= zVK2i=m^|r*yb>vSF1op$KBqTsVZdAf#y>rqDAlYsSAO~Nhii9lTDjr@Ja^NQ zM^~+S`u(5(<&|fjUbpkqD-S+)_`v3XY@GA__J{78XKh@$X2-T0pIWo*$)}IMxyP!- zJ77seM!l)G;QpsqJiTb?h9~DvRY{p0r(T~vbKapt$Clo9v)K_na%7`br&_h<^p*MC zqc6WSy&JvkhIKFBeuK&o-1z$OQhn^;QFazyvi;zLk3VtpGRgS_VVUE$M^1hWx&J1{_I>zqHy6SN zo(c2zo!Ez!RqNJ2eE&_4tXlWP3+q1k&CdptX71Q`bm^@Nu3oa@kAL{}^5u{1J9gyQ zyKg>m?-kg1`BVEIpM5#IEvrg@=!yK6YSVELVKx#Np}FZ+T*@7}z9=Z@>I zzT(bD*6difx=|`JWYghQ(fgr90ZJnYOK$^E3!Mv;GuT6ff=HpPJ5|*<7(K1BV<;VG zfqauHym z`#L4_w*uM3G@c}{xqLrV*9$ zw9`8(czvkdJ<#gxX#m;e^`3TTSF^LL)!bQcZ>=}Bx4YY0-5ss&u6A!nd$6a`p4#r@ z#sKSHZER5Pw=1Ll(zuC%+IV}S%vw%3b+M9(9VA3>h##ggs>OHhT*K+@@g08ZXm@70Q@HX_W<}_NhhH zYzBMSyc(9Y7CpucPOZdViyFP1zGGq?$i_1str;6QIE;f;7;1CC*AvmZf{|Rq70%%& z!M-pyx-v{|jO2n$mt~Y*0Pr}`Ggi(lS(!@TQmSXeBjRBCPK(g%M3&gp9R zs(=0CFP1HP=IFDlVHmc4@T-aaIw&?_{=L8W@L*@+oZtP^Z*E@t+^GZGs+IE08(047 z?YAq9>A(8@ukU;8fn!IHmWq|bAO7aCdl#(Vb$a>j^QX<6U8*%to!%REXy&}K`@zNY z9qp^v?%aOo3tMi#=bkmYPuza>%Q-f0B)irO-F6JKJut1@}KmY4*(zU^v&)&#p z!prv`o4a7a&SP&~HDNIGmPgmUy!zSa4m>=4k}5vf|JEB8GyU4D_a0yO^j)_;viYr( zJMY@K>#mz->HNjhCpSO7cJrRKtDEEIetG_@t0t8UX1B9->9Nn=H>fp_KEHbRfejyi zdZss+^4qiDHY>&Z*Bt-9F8n1C3_P{r)Sg$LzVzw^({Hog+ZH=4t(eM8C<<~Zze)G)COJ~lUHhuo0C(fMOU8{FL{_R&!UNJ*u zmW@W6FEio4{D1$~{+E`jEwR7+=l}ZU-j`I)*zS+dOuOv1ceirS4{blT{PE{cpMGn6 zyYb?_ch;_1_25gp);xMoqd)77w@(!_`A^UOA3L92cJ-n)|Kt3hv*Adt*ju&p)Z53m zsMH3RH>xuDfKJAB0Jx@L+7YFc)+sSdAVbj_%E^hUJyJAzqQe?bdS?)e*_W^eGDc6r z;)%NwKUHM52a-n6pKfcm@dZq=0S3-OAZNwgApIUdIbMRP;07!O7l%lP*0zRn&RE3~ z%DR%+VUlx?oP-SE&NsLsj2awroUO<>Ai(k92(j40d6*4XqUy_altj%LD_cYP{^VIe z_Pg(Xbo(7Zc6sWA*4SusFlhC9tyI5tL#^^(%T=muitGA!)y8-A=699)w`Hj87MAb% z*kt>dM&o?Gghx??4}bwZ^$_|C@II>vr$UR`;uR|Eosl-_m)kf6?w?`MlHn>(DV$EFbLlkM;*gy8Xl5 z{-JJff4faTb-S~>+1lM|?`pSqb~;$u-KZaEclLEUP~`_&g!_?ZV|uS!m@w9wFupl{ ztUfkqP9C4@cPx>jW2ElMwv8AS#Y(o3hB1=Wv$rzyp`fqT&Y;$l5N?ow3M_U<^x+J& zIWum2acls)D>5XR^rV)A(*ua70gk}Z>w_7pc<|kwutLj+GnQBhzYsM5Z3o4CB6P&7 zA(80}0hcMRLGYm?o8cc$wb>4!Gsl%V?y`{+*JQEQUD*u}f~BbIBzT<2D&GP5t0& zuOD3VFjiVq7VO-2c>C5Zoo3aM7`(iB|7&YEJ+RUH$+WP!6kEat6lTDV~$%mhPZQa^U&p!FU^w{1#JLk+A zSD!TZ(D74;_U)QBW%8p>Jzma@%)IB3g*VK}O_;spkw@n)e&m{~uc%I*fBf{j2X}25 z*K35M$qCoodiUZ*^KW=?(G{1+o0FD3x#HG4A3JvR*vrp7mdRx9e|E#x7hZhio~LKD zo0I0;efr3u=@TwpxA*vgqsL#}uqKtSKK|PNmsUP}%cD@`>f=2YxK5MZ~AMScCFj6>9(717(f5E38NjOJ9+Qoh5lIfsaLkI ze{J1M&p%x)q;Zm!LhtqmAGBH>Gv{7Ej z_u{%8>o#nhF`=!u$SR%VzMV%;ojSUH)Am`D#&p)m!_ThUxbC$Vo>`Xf_HS5xkJ)Ha z60Oy1cWznx@}<{Zz2J^Jw0h&58*ZFDb;8mo*R0#H`LQRSoOJ0;8#irx`q2j!PvGi1 z9(`@y#s}`cU6QJ-KII+Prbg_SsVhYPI2(`&Z1I zP>)onKmPC%$(eiN`7N)#_R54_U2AZN=|^u;ZS(S0afSdy(X1q84`k^B@g?<+kP)jrqmeA8%sU8#P9l~(6$v-PELUVmPx|23KWs@(Xh*7>5^ z{A;QD$71Erg$j^;0Lr=z5V!X?+xx_Pknh8 z)t1$3OB=Oi)kZd3bQP-ZY&lqN`Eq3?U2r6`DpyD?hmD@3F`QN5!li2FkvgO_&#)_` zqK7)5XW^HGS_y015iZPGC&cky5tJDgPVEH1Z3^eGH;od(TVR+q(5>;3HBrW9oL+`8 z4yLWivYf8L+%lIPV%!zfI@l*nWY9=VeFUSeE|uA#F*vkLgJe3K&hBQBGUl(-zX5}7 zbkldCWv3;#S&4a5Ws4FvGH4_Of}0&7y@^8D9!y!lL76?#S(XF~gfmGUG&=)UmYnwe zZ$O(xpKQ?F0;?eTb!La&;5RAF z7J^7u8B8!R9#}z}XU4pH-h2Q3ZgE6!4|)PA$&=7py>?H^7s}|crQWHs`7G?Qk~HJq zGq_Y53!YRPWo%|~1vCamF90zX)|Lv}oL)wi=&TUe_&AkOl9ZrIV>Q|t+jqml+dz|7 z*KJ(04kPHjfXJ)sHm~2b?bUUgUR}TW#aB0M-nM(qtLxUR-SqOS8`f>wv3|pb7uT#^ zvv%XAt-IE4*t%`k{>_`VY}m4E=dRt@bo1tIn>KIXym`wjudT-(wrt?z$b24vv$MF zuWi`2WB04CtrwrW1$)DP9MvmpH{jDZZP~VI$KKt$_Pn-sV=7lOf#4m&=L2a`uOd$05VkVnMhTyO&dW)OxW1U@NbV*9YWZ{;qe&ukhjZRJm zSQM8BvQ&BG(CgREq+>*7aN35wk8$QzRx9*`L9#Gw)TvS%ajFd_CrpR~pDX&|VN3iz zaYgiICqGMV(cww8fqO96^*;r=80bpEQMrSx1<2SQjn3$hTwZQzkZev5_Gz*)q}An( z==4^tK~n22JO;Ii%_wZxj~44HgTsaa9QJ9H^d=Eo;)^hD1TU#A!$fu!gtOM}6)n4% z#-fqKCQs5yj56ewF?OCPe&05C(x2$EtUSZSo*eH!E&x#`KDYsU#WdlC~+y*&tV-zu2j!e>)(_rXN#q8>P^V%uj`Gk z`PlrbTK}q0JX>#`t+l?YHL-kAYkpp;{i0BQr`9}Esh=s=-z-&67t61gYsV`!sOJ6T zb!%TkOgT1MJ1TTr?`*cVW4+Pd)@&YZv~R38qPc>yPBHC>X-}nDTCNM_i$_GmxUwhJoIkK4p^xi~~f@x+I6Kv?$Eh zv*CLwtVim=Z77OpJ6Qsdtqz@@sKXO>cv*}I2ZPNVo`{6eFcVDDHl7^Dp|flgYp1vk zHkXyL#vwpWVhRisHF5k_CE)OeWq+LQDESPl{n`1UA=wjj$X@pF#ZFv)7LbA=5pmhW zG;X`hI@(wqtg{jIvaMyrD)!*u=Z09}1dAvxh=a$cxLCWD*?_V)>R_ECAHD_mz?Ke- zP_&5_Wq2*CMGwrG^-y6!+>tQG%O(?(k5|u`2Cn1yi#VS z%d$ZMRxm!ZIy}sBWD1hoYLg+iS)W$azsACZ9qg9*lL5QKXSIpa*dlR8a``M6DcI;*$>1I{dg3gWFVwU(z|a(k zWjq7WyAov!biEMEAhkW5gJgC@3MNk>0Q_iD&B%W zV?`-mBECoJ)ZN*(GgdGMQr1Xb=Zf94^r5%kdi%*IpQ)5{tyZn{Mx1yZ23}`%S0+b$4*K-2=6;@^yFgtKQhz-WVRgYW3f%H4pYj4|5qi z)EOLZ_Yd|)_qDo*dxL|${=shlK!32W*T=#s$988|r@IqNySJm;J<{sl)M~~D{o?4L zG&WWm8!e3+D~}&%i)M8SCykAvj4_ti`4SpWTyga_6B1PD(4J2wV1>Pz^ew= zF)*SHW_7^~`-i#NRaxcm>wGCwqN?#GH26sX*+9RWo^DgPsOI3z4H2zzN11oyjoC*k zQo079TOxUlBVbDw<#bbuvb@Q#;V(-*i4YOaG)i8LMPb`8wq#U<+uEhEI5oHp*sa3} z)N1W+=xdeP1;*(mQS?KJ!0@|M6)Oe-7B^HgL^me`+3%cDeUPqpTxeh1Do6CgQrd*O z&x~ONFfAfLOb+bI!yFA(!|;&K#I##)W0W^`qPOxbI*K?a2x$E&*F3Dpy(+Wz5Ri@A z8)E{4C{Y4?!`eeYh7!^koO;Ozo&vb;a3(ZTO=N0HfW`m7YssGivaL$QA)bNcXMYAz zlF54{DWEU(b%ZHD!>m7v?B@evB!J{WB*Z-kAZ8AaJ9 zkUgrfHCG%=gzUu*S#e1e@gTC_Zugz*3%8mtihoFnpbR>vFH;}(KOhQTLKM*u|J;gn9U2(V}haF)-N zsJK&AU#6iXtI*MA4?C<|*`Oe9#K74R*2!TD)I=c5xV=a|0AU`mD7Ug6Gk9toM&&bh|J(xH6Gb(%Jfrp>`)n}ireDTF}qf{AfR{E_{ zuT^Qc^1XJpRXbEFf6{Ef(P+F?Z@gV^zTIfN-e|m^D|}b2e^+mwuQn*9YxVQZ_BWOK z*Y!FhtVJ%&H|@^X?Jj2*>&>sb{d1kcH@*Hhz;ve%WPeeupY8U~c1OSbX&HRk>U~sg z9_@~v7>ph7k2~5O9PNz)*87`n!n)hTLw7{uiRxs|9%~&Tof1(g zVU0hdrW+)t4dpe#tTvbf#3{)=Vm6W)F@7yBL9~EBNq@ZL42a$|%yi{WY#tFK=w%yq zf69`qIC5=cAj4)Z(16Kmpge#*X8T8Id7DUBx5@0`YjkQIezoW{rnUPax7B8c#$?AM zkj>4k3WJw%hbSSoA7kzuxZpSV;$~mm6DzwyIjbjPfnp7&>`?j=Hw50nez5c%^WB+03A-YAO`i-{jG+LImH?qZUcXRa1x_kTyoxUc<;8-W zI5469T>gZNtH6?YxZ%A(vkqeyqg`jPnrt#?2&;fGf!55pI#C8BD0$=QYR?mh;~9V~ z5Y5Q}oKIo`8sEa=b_za`-F3b3aHi}H=h~x_{h=s~8BP%n2`9ffHZ>m4#?u9>L&2xR z>conTP;A7+^F{*$tb^l_)k?TDHhD%c6c@n{K5!W-7;kY0lAd4+05wa2=3r_eork8z zOIQ>pZ~~x|_E6KFKw?;n3NOJ7tF%^paR~?pvWaq$jE)n+q9ve2tkYk02_ zLL24>MpxwZ0IaRP0B+B+sK2+%WGc8Z5h67gOl|Z^F$IBW=WXXe1eEQ+XtDb+p+$gtt zt!A%X=h7;5n}tT@K(X{mqxDv!@n)_5X1$5!WTOd{eXd$%g=;A2Dju8Xn(ecd`dQ!` zm~H^sop0K`v#s9QX6LJV^Q#U>4NVP3LuHSiZTErfue$v&JA*H}gD*P$zjpdxwtF8| z8%KJBV}sFSgR!Ii(L;mLgOJs&HY7ImHF&+R*V}`o+uL4m4tc%3)7#eRZY8pNH@8|N zqoWlD^Nm)=$m{C3aZ)^|lEZW{!)oR_=1@k(*~O5G361nhv#Fzquw;0j99AnpdE5}p z8erZ4Zf`;jF|I__Q01PK&YRKztoTz7>HKMPysUMGG&VnIuEiA>-SL@{4&Yim9GL~u z%+rB#hir$ehEDe@>wL#Q`!V0zlktLrI+c4dRZO*k|DC9Pt zcZIB8PBxnCY@~}lnAp5EYH$TjzLsTicrVkFG($G zdk%Y@;Fbf_m>3PMN7(sT{||y)4j4tsHB_e=dXTZN9 z?AY@gcCTFVlumC>_Afhd@~u-Rj!o%x^kz>yUH3=wMzgF-PuP0$1ctaOm06{-V7Q>t zI}9S_Qe_F;c=KJESPIZrX(g2r^3y|ysYbHFMl$Ekq&CUa(UM!Gv)kMeSP_j`VM?Uh zs?s@Njj#iV&r4YuUYSPq zo~!2F+-pxhadNxQsppm|>yn*^?^-yU>uSc>*;x-HqS86?P~*ph&V8#!Or^B zY7>45us2Da(bm7>z7O6yJ;-Lcfx!t`tuw>M%TVHavjZo=VD`XTfc|!8V9J#X4<3L0 z>Sjx8bl|(_3^tX~3HGUVHlAKJPdIHkl&Q+7HL)fl(>PVowP6`Q4+$0*f9ka?+v`?* zaoRS2{;fCn#1x)4jvj_tks2H2E#1~Sl|iD{Tcztyy>aG@DL4aKlkh~VG)k;=*~~Fq z!5bFdQAwt>KP7pZz<7I-ESeY+3G3dtn5p*yyS6~q=#Ho?Zrp@;-jOJ>#0TiyAO$GLs^jEf4uexERfD`T`xAJt4ciZM>R=ck=RGkP0PGx+*%>YR z(oOof{froa9*3aDC&ErZWe>x^!Dy&>dzdq#CU*k3#}0KO`jA;6-UOfw9Aj5l@uq4R z2Y}#E*--9Etn3IEm3Y~oYRHMI$`QG5*&`o+{Mqv_zF29M+Jknh-)VMR^-inYX%&Ua z{c3ZQ9O@4a_eYNo#vL7u9_|mItoOA#^oNX& z?i~#F_ObMLce>l^&F$^ZcCfqC+bWQKu-(0--5PT5?DPtPtxR1LIkK?5nV6^ zW3SRnV4_-YXNMZSjZ==`HRQI{gMk;oZN&|PeY%1M7X65Ui8_ZLtY`IVvlEI*FB&!2 zJTXuk;#%+UDX|==X@D-4Ba$x;)~h-ESD^bCOk!a>M+h-9RFXFioIxxD!62F$20(~w zfSdV^q6QO)4DAfXYJ%i(hnjKHz6RXxgx@?Kv=^b3Y@VV8m&YU?Df-zJY zcjLmF3*mg!j#19MyO%%l)QUl?d)3_QeV{?4GWWVUW}`)Ai@bX3!>68l_PG~U z*NbVD#lPs0RnM<@I+ILr3fCsfvC^_9Uwrnlha5`qiDR!{K4t3ENweJ!|AcGqc>cv# zAAaiTMyFSsG&5fAy!GB2&prFhbI+^@IK7LvAG+b1Y5v04s+V3}bjy4j)VJgbbZ7ka zyRX-+xH~vfUiQ?>FTVV8yO>XvFL~^-m!5d|exFCy+p_yV`qR6o_D!04&C(@LFS>1h zsW?sZP9l&8zEgzkV)`3dDnUo_EudPd@(RvP-9^bT)&@IqAyl$9L;$ zt!wtYTawA_ElZzXz4DnccG0sdUYvF5IGj~isCe7br=EG@ z@p^aswR0~sn5;7{yK%HNcKpoA=T|bX@TfncaKcw*Iy_uX~9$)?P|^O2RSUby`7 z$@6bt^w7iiU46~;YQ5TxH!5J#V$4!XwslgjFdQ)ub%Hn4%)dXEeK!@215|D)?XUv8- z>4@ZAu~MuuPDxbt7Bwdo6EQ@HL6zfRzx$BgVh`t~aLyUQBV)G#bXT~bBx?pw>fU9Ke)`GJ@pEZ*%bh{9-D@|y%|@qH?X`>T z`hjBk<3{U^S{>AWlXAQDI>4PTd|f88LF%(WcBA!mv;9@I{$-_hw$%l)8E4(@eg*B! zY{mv*jrCq1%KEF`=;xjOpDNWay8SPDqkruV{@NM*1&{6iyVW{m_2JRc!-FxbU;(W6 zv^#sDtO@JE?p}XaueYZ_ z*+<<56Bp^U~6W)};|ueJrX!L-_+0+;o;K+&Qay!NN*LZLR# zkk_s-gto>TR}t1sj}%jv%#DN$XIc&3?(l0I0aK6{OB>AU10!HJ^thHa3}X1@umJ+Y z?I8$~_E;Vw8U}-HWt^;ttui?^4j&^pZ60tL7t|Dp8{`mMr#pP1Y}1#jGJ^&KYSCms zW0V}>jKvef@LW{pgJkwt<&Zm?vx>G}&OpMAK~ z@qUnlcPDG@54)9P0qFHs1<%+pI`*-=wG>R-14&4Az0CvBEqNnQI`sV7-3H06v&l|> zLaj06F28Hj&dn-E_V8ODrxcg3IQh((EzyYA5vZ&`d}j5N_g}y4`8VGlj^yg{+YH{wOM|Pcf_sGF5ukAW^{gnFD zo1fYJ+Ec6+;!N!O>|ZvoSa!pb7f$Zm_~>(Mw!HS-1FLqwzHPmp6*=51w;WmX?DA(` zJM!wPXP0l^dC4W$9ou^H@=4de^TE5bF1zfFU;lC0@+GSdy*Yl;q@VrM@9(>L{<773 z*1ho5?JsY<^X|pFPrP;KtqV`Q^P5FiPlu4S#j5Z9@}s+NxoZ7^(<>jp|GGubym@5n z?CT!AaQ@3{FPm(!JGAEDbNk+TW#tohKD6tbKmBt0rB|MM_r1GsyZO+mj~~7Fp+l$M zylvqv?|kyl*G(H!Timi2qXE-1tByW6>rzO5joy0IJ*$sxe%29gA31X9iIuNzTf6eU zr?#BjvNo5S{KT`XfA!CQx#hCCZ+!CQp-s>Q4bCb3=T;e+;M=OuJ&*iM-Ej^pNT*`G&>HD zppTN*FdkAUD~0k(vI@oR&oq6RmeDhE@3O}}`Q&G>y!y&uv^p4Vw0q4~x6$ggYQ0ve z)7)1mebk^Y`^|de%|`RhX6yAv^X)?M>q_nGT7yv^b@KX~R`;taOQZtX-!z%f_;sgu zmcEhh*?Qw^`a__ydz9N;p=0E1Z*aCZ`bBr}WpDJ${@53t{s*-Nogt%x1AH9C zD6z5VC-hh?2YO$z-NdaRCZE{6?Ba8@ZovJ?K%C- zS5!h4{1Px$6IG-cx(8LxxC_6{8+C=!7N`x2i^+=Mufr$k%%aKciY0QaNUrAi@(HoyebShP#_2RZ2E7ooM`THjxet5-}^{W@$_vq%0 zo7QjMR_nE&*|X=dm8*AdSWdr$zxt~$zj^t&XJ6gEfANxgX5D=Mp?!O2PUtc6Po-b_ z{N@*5SiSm%RW~ktZr^hcWAnnqxrg7~{>riaUW2J2Y<6wByIO*t9BLbmpP0`+?fwM@ z_mr>x{N*!`J-%Vf?oHc{{qwJX_vpiq@7j0rhKZB3X4&ozsMM|(*PMEA)(o8kmOu>~u4J^I}8d*?3Se0WB?h(C89-M)Cq&099!uTp7O9z68mQ_t+*{v@9F z46fa@fA1^nU%qBaN>0x`v+Iz{>`V>dti^s^5oo435XZ5=iX)@OYD;SQJ0#MW-^ zfJ0&Q2$1daMQr%-JK0&-6HK~1VHH%W(Zg;p7|DXUX7CX=7zVaj@g|Hu21ILYUb8o0 z7qf-Xwz&7iTz`;RGyaiic}z*vpm4QH2=H|#O4i_rlBmRr18=Gc;M%Y&0bEz2WOgS^ zFbN@k3T|M0oRN&?VhxI1c@P<@TqMgt9SRVSJ-M+UgEkt$wT4 zZx=hwJ%!?j_2%hDlW!>t0-s=1X zOSAK*dgITn?qAxyKefAmY3w%nYzP~rv z*Jn%!SGxVZo!*Xmb9cA5yEoX~9qj7%wzs?6+MV^a`sQY9Q>%?-bE~td-PzMSMVOG*V&x*(Oc$`vxlO8)A2 zTss!?6Nsk=3_DjM_C(Pf!S+!)&@8fE4x4-<2B1@B(*TXxW%57)M0L=-&L9W^DPUw> z&=7m(;^(9=#T=+Lu$EIylnjkny$QWtHrSlZc(nWUR@veX0?>9(l<^fdx6K_gyZJ7& z=z(J9EI%uP(jRJZnVnupW~>-(3TLjAum$J`i#a>TcmO6ha_snM1nCWzTMY>%#-+&_*kKecG zwpWh6^WYr|cbxpy$!!k_m#F25{bz2RHzVA<>60D%G%D-8#tOftUj@efW;8JB-y*PAaqvGm$I zo;b99?SflYoO=F6t;&Q^KUDKQ>yIqDZNZf{zr1_ty+-HA8y|i8;9a*axPHOllB?c( z_oLgdzy9XiZp)?_|RQ9KDmC+hSg6OOJj2vJ^r&_y#Mg?>yGW(a>cA`7B0H`y*HVB z|G=s>Pd~I^`HnYFY*{_`)<;es+}fQq^Jl+)r(CP9Kl9e~S=XL?>w|e$%z9zVp(pOU zWz(LWH_a-?8+U%P|ESYw)96jT`44{h&KsQxm%sJNCpXTydd0ef>sCCV*IU7BR=f2E zWp@zb+M%%Yt5XhIBsUR7sNZp;R*@GE>wk4Qx$S`ySM8-CHCGHSqNwBfW zOI7ZO6rlZGL)UhQ`+*X7M2dJ)PE?F?;?BF5e)z#Bt6zDg(8yI=<#MZ1XcY6cQo2%# z7jxTF>34I5N-mNy@skh#3w%%#B-fp%yIoW8v)$P66 z>AlhJoo;tu@AOV}`X^f5lfA*o{^-fxC?1dZ$By;K4mY~Tx`QKF=?xAIu#D~-4E8o! z2l`_N`r{z3_w`5jb7Lvo^46Ft`Qfa*iVk1Wlq*qeiBw=_o{<5<7W9Xq&=Wy^qrm=0Hm0^lOxmUepNFvuKo0Wp*(#ObG+u z(7!r%LSQv*2L!b@&ae|3#j;2!4;Te`4R()_wNHb9Ce*Q&!dcOqoeY>|;k^*lv<<9x zvYRzTv6*2W>=*#0Ec@ahubNH8oKA0qF(m8=<7I_n$%CC3%;31&!ZOzUIH1{pmz;oj z5N5#c4!J`k4ETeUl2{MgEP11i$yd&qC%FQV?AYTg*FO31vPdZI2^C~_G+vsp@}>3n zKlt#Kv#(Ma9CL1e@Y$6w&YgX^-e{dM?~W;>U5&vr{kjE`Lm9o|mgiQzH2=y=y_x3Y zt6qNMk%x1+%B}Z5@zj%#w`z5a70fnSWr%)%bOkEpcP_Vl^WtXQ?^<{R}obFOpw z3opI)$YT#(I&};dMQ3*PF2Al&EJ&f|oS9b}&GOZA=VnXw`yP4z$rUTFyKW9x^UA>w zp1$iEmC7nHIxu+2f;*QzxpMXMEAvU*gM}rJty-~iWv^MpK*S;`u2}8i6)&xN?zwWg zG=9#F*;4naSqnT)|D@Ts-LvGO6QBP2zQxz~E}b)yD=oNf@uN?zdh*fblEc-SHLqAG zWP6vdeE#L-_uuRDxf#l7_g#Jc_3^0Nlj%PG{MyyeuPP-|@zT_*r%X4Q8PK9N*qfJJ z(`q&g%^6osoMJRti~Y-2J^%8<%kJ~YuI|+NtDb-9p(TsrQMLef2NEV*VA^Fjj4M~! ze8=g>SDUclvCrPzrBP{};o^Odt$ObH)uXL)W$en8t6qF?$%7MH6J}p^b3V*&%Vw)w z8+X~N7hbya=Id>C`I0$zW9ub%-BU~C=iGG16VI%A{NZJiO`dVhy(^wwb=kzO!Roo; zp2wbB`P}qrQ)XW?OK-BaCr)p->kq+HZ`tz9is$;(qSg|)^TB85&Y3lN_MCvnR~o%) z)ymcPFS=E-+NNK5O}(57W+u+P{A!HvB)8w;%Rczns>`N~&krtpVfD+)mo8QuZYu-H zLk<}d+wUT>!?K8Ogt!(V-i-2A={*U9pBXD)w@5?=pkrn{=@!iuS=NJVjhB`rZ>-5SceN9v(MkAZsLq}CBMuov)%63NTq ztVOhgVrW5t!68(~0=pKvr|}UZ05J~if2(OKYbt1Ft7E}ihH2}tC15v2x(^0mM2Zxo zFncd>8Z%muqotuFhY4{;OL#QMiM#H7@Z(Q@wr1_xTCZB})XMEfsa-F%YK2yPq+Z^h z&V5j>p03y5s6l8qp|#&=w2qgn$D6Gat@g2Y=VYggYVHk>5Rw0$-&r( z{^$vSdoXr#bll0oxD%t}j}OKjA02)&~aT z_7BGPiDgfJbbG741LC?r*w*cD>-M&R+Wo<1i0e*w6Oi5O;c-*1zo*-~wbK~}`IYGv z8C1u{iem#up2UiSF7&bE@vhbc5|_;pP-$w5Vo6BWD*0VkM$-`ZTx-(Gp$T z;k+hN0J7Eoj4nb)iZ+iL2!h6CeW_K>R0UJ40Ge%9gC@aa|$>xzw}9i-t&6 z8(>#oEvo>A**KIU2go+m$e5 zmMOHIMzezfxr`n5nb}WI#$qr#!EOUqYz(+I;0{q(FQ1~@<+phvk~iiMQF_A+6p_Hf zxM1iq!`7au}kil$eqdJ24lR0N{>eotAKT*8V1RYu`O#=o5cp8zX)l7m=@)s znf+*IYh%{DR%tAd^KNglym9}T4NpIy*XZy?w0f3W#y<;Ag4xB-#m)^bS|FDn>RD}K z-x)?+uvVv2Z($2J5iX*;^WoKR9zPh6U3#0>oa1I*|Ix=kzhYcdZIta!k4kI8=`-5BW~+9KA!WAQHKk4jtnL+C+ zmF@Y1Z(cgS!z*QUNlq`f(cyWc$>uT8qou`l%Z;7e9X_^lcet^c(X5!v zI7|4BHk>7^%vNDo*sw-4zh^5>kF0 z*k}z}^?tX~YgPK)Osl>ld?l@Kkqet4EV}r57gHf@JJ2E={ zV1I0Py(z@?IKp}`ie+c7zopsQ-s3dm)?OcU-qItu*EgDi*Zobs-o{>UL$?Q&eQUd$ z88=oNPcL?L+-Pn5`0Ds^Qo3qP)(we@E?Tx`TBdZ(OIAAIbf(9GWru*$qzD zjr&t2ttj!q+SW2NM}TRon`QIto+!wx6@k)F&31nb3>9u`whF`s!|ES^^)UQ{e_|(2 zKUTo*Vd91vHo(DvYo|W}D65Tjm z=GQ49{K*hwMk0DaG^0&X{7LK(`kk|#4zJnHaR5xk==dp;-JvltAsYt_0vfH1T5~{7 zIs8oM5MkOziz2y1G7dgk!Dlg55>|o!P?@cSdlRR}!!e`X&wBYH_6`FMSP|wTDp8x0 zSuj@EGiC!aokxsam|=)L;E)&|jy=2M_0dZvO}i`yMpXlSQj#Oin$WX-tp(6H?jW7XSTUV3XO1dgcnQlFsIQbTkVR~ z&eo15h+;Mc_Om6M!y`F7CKwDmu9^=YYKKK+z9km7#Q}xQNOSBNytc~hckGaTE-c=N zO=f0|LkY3Ny(gjqdCioxG2Cf-PtqtH${J?~0#+w8FUII)JP9A{iaRRr*$SzsP{%&%|W}?Z&gM+*-mqN zw(vo@4rTpjqjegX2C`f26Sc<4dh=APbE*w}O}Txl19rEMx~tyU+aKKvb`J)-!0Y}f z=)AevhO!pOCa*V(`9>leDjO2}AIRQIWOp)SUd9mlA|~%G$Mv?v)@CV8OMhx=9o^1*}9#%JK&WsfzBg}vk7j8w$bC)-U zdruF&W_IZ;E)pNS#;2PkJ)Hv#v7-NknG{rlOzdW&M-*>_RCfoGSOEegB?4qyovb(F z38rW~prFOw3mIr(RwT?1IXLvBJG>xfm~;kG0W~G4F-khS&*6<2tO~FKQb6?Ks5E*T zb*>Y`2)7Et)8N7Bz05_Fo5ILz7yx!C zXDT@xm~k6?Ya9u#2#`I@QwPi3Ot%T?j5uJ{=)l>AAry)AOll{Ty-{x{1+xTj!-9gs zFr0Y1%N=31A=~waVCwLRcE^y;(B`t)u2>{kYY)al!fbE~8t+nkah^$h7uZO%leU@L zD>jL5q=Lpi9X>sbhiKU@vDugc8(?FKlN$%1c*BG^_KA}w`y4XUcDR3d^{Gk;wU(HG%oi4UD4NZ&}1DeO?z zbdQj*2_s8?ge~4wsy@+~V77%R0Lap7ftR4E!BBf7&mIUsIR;-~bYR5pOIiIXdnjY^ zCa@n%knRyEXb5eHZcB*uMu==^?O;|!iHIZ`9E>*(rLS{@G!Ec^EWlgDd+AZJ1~U?L zy@!qz>;Z7!%d^#RIiF54T;UH#EL{jr_>0X-r8!Pb6%W4lA2b#J&( zXm9NgHndusI-L!j&iYPweYd-z2bJButP0Ccvre1B}+OOatLiZYxpre z-R@!YPY+GL83Q$zO&_8Cb`6tg!ba9w@)#TeiK#JBh-j0HXB0h@3lrx;X5918*8siI zrnfji3NTK9I|zbc@Jn*}0Bd@#?Ote1k^-t0xG{iGP^QkHMe>7&c%#uqeFUPJY>L(> z4dp6sJnYu&VCtYK8R4Uo1O#VySD|*Htr%qDCK(wT7{G@DlmHMEH1LEKf1*75+8e^b zq|FrqIw5}XUeFnLBh3RfCfkf*&$J5k$*}h>o(EGbQm{YmnyF)>7)t9c%zVS`4Y2wm z*;uOR_D8TiMg#tMq0y{kR1ToywCGF@d`*{d(?k1%L>Q9eo4S;+-l&+Jk?}L-bz)tEYMicW7(X{{DddfMez z1%rO01SJ@T<--txxtBOC%uOe$VeN22aA2@WJZVHWJ~zM-fP{|@;+%s=*b;=|@w4Y4 z!AeN+B!i4hCFjtDT;_s5VUO9-ku7wIV1S!k1Dc0#+FkZ_6#K`P_$)t71tmX!2G|(eP;oY>{4IjfE^x}JBXdLM=(BJp%28# z5RvE**)qN<%oX1*%98M<2<(ayh^usNW=25UYF#1dCY>k2^ar-hWsH}}&$M+=5>VDk zK30ihg8~L6K>RgFMi03#29HVZuUWjP!?KVXbX?SEZoV z$ySh1+(Z8f9*2{eFge&8J?Xv?&q&>qtobu7y^^^3&LtlL*_*dqdTIBPDb2C5W~w@$ZO!ZFeYuU~IAXHT7~9@#g4DbEV>^0%z#5u* zOTWLN-3FaE_xqdry^US^uc55hw_4kK{hhtRj&^THzqhm3JJ9Vd?soE%CN##6RR_KL zSidoT(3~<+&NX$Bf;ybFq?^`k+mx)@M(U=KrXg9Es}sHLDb8|V7b~fJX|+2_p-pNt zze(eXYj9=51yeAu@g$+9HNg~%rn-~HRL#Jgb@u1wq$Pu|V`^7a7tE@Caki?FLXK43 z*BCFC`r*o$Jzmy<%h;P6KdK1SfX3$5i1OKN`0I`sAPZQ$H)(JM^sbN;%Gd&NqmxR_ zVDsxm#<|%OwQz}0U*jj_4jVviPsqr0UZ(j$DVre%eR0FEE)NjwjWV2ry}CnAZ*=$! za0YyffIoUm`6#pYkkKLoc3>q~j7Mm2V9Vt4Yt1f!V~R)YA2Jpz(FOf7z;1neZ+;K!ryeG!)KF6Whtt zOUr_7?E0uOsno_u^QsR%_+-Z9ORrjZo7rO5nOqu;e)e6XWpwd2GgeYLL*~0U3slaqfEd0 zno!uwqt#llXqlgh!!WB2PT_~ao-wfSfN0&M6ysC^vX5=u0cfjTams$h z4Ort(2x=ZMfDVc6bOrDgfNYc1g(pF6!F}3Y6-2bC(?(sa7bQ0tNDFF%iEPgrvxc&C zN`Q}6w@!|*K58J16~5|@;Uo@lxHXg$@g50VFfE1BR!JklId`@XpvGIVqZFTs8*j_$)U&FqrTs zP$CN_2~7yIZ-)NvVQoL`gfS%1l6RyY$hK5cXsEI`ZQe3tdVA`m+PJY+x8G_3+1*aI z)7qHLyEPUIM!h4aW9~G?|^f{@Pld(blc*W+>}6 zA2+o->l;lh8=5W1?e*=>x>kE*tNmQPzNpn&+-}{~Zr$GQ+}dp4(QA*EE6!BOoi56$ zyepZLN3dSehtevrGLqNDtCmdLo^Dza6-~Ts&b6(%o>UqQwWe57bq%o2@Q7d=x%yQD6Yd`v@w{m#!GaY;CTSu6IbIU$Z$p(`60}KZ*OHZ z-k#zq_AH4KE`cSIGlz5LP+F^mHFh_Jw!|hiI=ct3*5gTV(;c?(mk_o26Hw5Qdmy9D z7smntPUnU%0ovjvC6vbK9`H50pz=JD4<`zYbSI@m#jYiZ-4mB@@HTD_CNpI z%Ey;jCD!n~=h>H@S$-MGs4{gfxqkEJ&Bxz-d)Jz!mt1xAl<_&Er?Gs|15UGN(Icz3 z@7QtWWfNvxxA>J;*WbF}+DSJp|Ng)JwZri#Yhu-`6oou;(&Ez>xKKJ_HzxrbO zw998-c@s|D^qcP6zJ1r4=bv@B{8!%h$ja4gc5UC*$mNAI#|P_$!GUnUvN|2WEqoO8 zUt?TC=Q#aKP~{;}C`x!X=pmuJ#R3Zlxhe}}V?}^l6lNk)S%DAR(J@E+;$Jx>h;AH$aC(5K5Z7OSlU@C5Yi=k)S=8|0WpFmkV z-2s;;==O%)o)G@Tr(uL$lkAS8QrXBQU=b)jmXQ157NRpH-lC_5EMhCJ9>u>?LJrivrc~6Q_gB(!% z5_}a{@x&P@=7~d?GkJ$Yfi&GCBKjN847Y*YwukegZWJ>!l|)5t3*NeD$?yO0uLlkt zxMEiSvT2P;<67g!wL63QNUazyWjCcWzil)>uD3p}wcl@IX?;}dyjf`-tv8R>@mN1m zZyv8Vk5n6n%C$qK+TmL3V6Ani(LP*n@2@uw)f!LKoA-3vceh%%wA(kdyK`He+3n6H z_3HFaYg)fQvELu`dfi^XJQ!V2sqJVsw|4qNUT^92u(Gk)-qdbyXtg1?H+DMf+MS*4 z?%nl9u-{Mgddbm2Vsu<$Fvw0G?-(hlOkR~YrE(`!_5dF}Ne%34D6I*kHPM10RkNpC z=2TrBE$EUpU81UqSL}tJEz?qka#~+X9~c31RZc%Bul9{-+!$bmRdQG#$s53QR|HC2 z7s&zKyw;JTIh|hBxN)M6gfc*QN`_2pLZAvqxocEqr<7v9~|m@ciTc?4)BS-+y!4 z;TbdLY&&ye+NJk>`R9M`^d=tr=(8JdzUSQ!-=8~Y{<|Oi>gnaro;r16w9^SD>nDHz z<<=(`2fUe^7C*G}#0S4Pw(FAlOZFexn{Hon^3$L9|9`~&Wt3b;w(XB*K{9Ph#$pmf ziOtN+EL*a;xKzwsVkluTh|$b;yU}j2-DYNiEtc&@zd0l2zUQ3#{`Y;k@4Xr^_Sm^I zHfHVLnz3TVib>+Hap+wW9sqpse*5*`Uvb6t15Z7dk(E<7u(&zW>a#@^-27B@~_x+*;7QWpH^J zq&Dn}_af@JZGCJIJf-`|%(80hPCf*~|L`w+Ba|&%6Bb_J| ztt7Q@h|{q^hB9*&HM{V};2`+jO{imcy8|gsb}a@qPZ*R(P2mRdIyB)_q2FBiSY*G; zpDa54yoxsrL;}{L0tGw%Rp`XPUJ?~C^*CJ?Ja4QKz}5hP?lFVc_>XcZHoIcAsn{1* zA4kLPIEz!kjksVZ=tXg;0KM1+2A5Zd3V z`Pq{xu19BZN5Nvz{g`eFWW+;IJ4Nnnw3J1ns063qs6~LkL^WgrUIQ5hcQSq4^mzX> z0095=NklAwt+ik9~=9Ka@Df=?GJ@btcGW{%fP}g#9@$h#c(7fL$kvs$Z9pB$6I%vrOt&ObkOYHs$d z8QJHZmv!Fx+2_s7I&Wt3dFNd}Vf=Y zW`9OvFf&dI>0qrDYV8Cs9o(GjAdrp~{I|qAIDxOuqM<3~NShFtaK4-}n!O|Z7oxR} zHQLxjbGQ<0YJydXw==vC#RTCDp-qp3-zo>qF0O#cM!dZu(m?pHxwMPu0`^3)^AG|J z)b`MmYnJGk7HEK2)_i0=wKH1EWC7hE%p$^MZ+_XE1Z@tK0JsJ-z13z8sbJnqR5008 z_Vrm5Gl4<}H1#->i?Z2{v*?*+n;vbvji{`Pw=Z1ZGkeb5WgCa~?%liafw^m1`>whC zrjDVl7hg4RTgNhJ)}r;j_00pX|LT>({E~+Hrmo)os|pqfG3!~k`-yC?Hs+#xd%M=m zUflBHfi36XaewEk4xK%vYxiEe)vAXo(j`7p-ngoLuFvDnzT&o>`#25N=!@>$u%fhT zdFPzFC+U<~y`7uZ_Y6I7`xW@g;2z)IJ$&!o^Iv)8<;$+Sq^*A&j!?9=e_na*@a`d= zSD7-fdB?`(EpzV7)kzoZ+qyeNaVHv`qi%h)f7d`bl5CbTc8)wh)nnG_e5*!AF1~th ze?#MxDUWQbuF&b!o>hG%h08ZJa!}u>3-2BrUfbB$o#K(EU32e{80nX2Wm;N1Ks-7k z73`y>^v7K7AS_5KvCoz%31Lbt%-kKa3#tkQ4XccX5#%b9sm1_prE8dJ?aa(aszAM3 zoM<_*0wE3)OQ$(I252GZ%J6B-9T>DYRPYpF#m}dD@c#o5?Xf%E_y_~wRJ@uu0@Vym z#~dIyb*$$Q=oE4r@Qp=)XsC?S;Rx8*=77NvPH=@0c;ZlKD9|wtL2Y-s?D)SDsZ-51 z1sf$1G$QN@Zv=Hne|D?7oD|xA6cAi>h0wN;sHy1&fr^JGx1VMvAG3Q4X10$qru{8pZZNCb-NI8SJs-zNl#nGKn^0NCFuE zH^)!9B0?;uo862$z(EWe+SE)`B8EY7+DVH$#oC^F+F|e)QlMbaX^m0 zx#1a8$4;KOW8%c!xzo4hPTx6|ZfgK~ICt8}GNIaJCUYYjl)8I@*#t!I3%Hk~&Epf1xyXWttV?AeU}s|x8k};Q!y`kIH_3(zHrN@RZ4>E7 z*bk;!oSMPx&>J1lXn4CoXSC>z4h_5D^#irtfi%UFWW|dB))Pivoz6UWUEdwoT{P?7 znlIn^l`+x3b@h%JQ!Z*A*fjIv**jW@?6S=xH{E&vhQ6Wu@4DyC+iy&rbiuaWyXVZF zec2te+eh|Ayy`_aSMJ%m_MxIxzk9kn_l7&$SGMVN&Yt}*KXU6ejMdfY?kTL@yM6hM zH{Ob-+PeNdc@I6XYWUgyl?4~yTQJhM?ve6UFZFj{e91lAM~3dZ_ksK7797~V`HprcWQgVb@DHTya@Z*T6-WT~V{5ueM-*ar2s`iytVhYgl;Cbe(nP-Yq+QCL7M; zyX>yVUVi$fn{K^eTJGHP_RXtX@6W4$LN zvaR@0lmJaB9acwSjUk(=T=ipLhtn$tC9d@H+yxJRDFu0gQl2$1tJ7d((HV_m@A#TEdLFD`~T9pw;k25>vVS@ux20s2S_ zLuDJ4kX{ZLJV}toaW)s&jYhFvOF~ncX*R{s8wLOX4fHH?Li7ZgyWlMaD*;fZ4RR&f zgPB-|YNl{@G3vwUjzS;<&=yas*_A|5%sFW2dKT^!W*~_fV^%N2 z1TC&4C~l)W$$^8om^aES<~_g?=E0yuNOqAl${xf`WjaII3>}G#f^wIWM=MD=QgoCt zl%o%iGKF$J@x1dVorjh4#?G9Pl{;zd ztmz>2_*glAR>sVkSC1RFVPfvuDN|SH=B}PJY1O1jt8=HUoIH6Y@I7rRc)c=r3Xr{i z%CrR&C&7eppyP}gqo;H1%(#or^8(q7j}FDDQAp-E&QXva=ZD13j1OhT1v8A1oJ2sG zp&(<;X%j3d}J$L25=egE!vozLO00 zBhT=%X#fXKq#3PJA~X8)MPaTD$u0JMSoKT-Uv2Q)zwcgZJNe%RP&C?t6UuK+g@=T~|_ z<`Za!xOQqG8)1z?&lP@XqFf1Zq8ZRr_R$3ag)8QT5keK#lu?pc;&-8sLJP^BBveL| z%OnDF?3_eDHsJvMU^a)_DS0(dNYNm-VI+cfYGiUBV08+Av0ZY}+kk%z#YZ=VI4|AP z495gv{d8{FRD6XiiD}_juO_aFmGM6S)eKoc7ny3cDGs(O=v&8C0sSbrcgc<8a|n#; zOH#d25w-|%O{X?ia1b054+>J69uE3*Z{GkX{KVh%7%qEt95(bLfAFjmIIr zBRGhIBP5gAwdiKjD81x2f!%0pL%*vL@I6rpgX0j$KtEm5OtPA0fsp69sI|#)5pxZE z%h6F%I9m#4k^3SqpgoYTmx6TTh`vXwH#I>D0{T)Y3p=t0k|TGru*4}~Iha;En60La zwFT*KaVC#9hQ{bUY5G8R#?*`V?%lV2+xE+@y()Xs*a?Ey6Q)m{IAdz&%;^)SOd6gr zdFPa=!?{z2#l+{Fh+y)R{@kep)29zioiR97PeGV3ePpceGb`EsIRBwqI6E>`hp1)(l`Ol zG|+#v7^FV-f?3`%6Li5WNbEQ*DZxt@M?x@D=Sk9OVNew!Iu5@b@Ey$5M{@MhoW$rD zeRNEGFazt3>?zXd>6Y|~@zB)aY-aLPqk8CcEeuT^54p{`Y=US}(fh${B(x2**8a3O zZ1F@`4MH0-UkR9^IR;-kCBMU^vuip4F_7j+9V?}bwgl3cLd4;TgBFIi@k)8HDtKK>_joyWb6Vourl*)HhdD)K=Bh zmz38uwRBcg)Ku5C;A38KSz&2aLvu$>T|-HEb!AOsc|}cKQ+s1edr?VwVQEEKO=DwI zTXjuSLrX_-$VlH;va0&JrjDg$6~$%MI8jwy6V8hh6_w(!9Tipe<<*T1jZLMM zHT5m+O|2dE^-TrEW%)&A#pQJkO>G55r6pxmC1urB)wQLSwM{J@MaB54YH4LnbwkV2 zvdSd|B?ToFb&ai+m30lR%d4vEOG>LMDr;`M{eBLL5ra*@BWOv6oC_$6I7^0ME{ zx~*k;x*3RqE2J~cs@UurC{NZqG?PWb)nYG;O|#>g@&DtXM;q4i7ejAk-`4khc!nCMQQ z;0!_DrZQU)ni3p?p2b-NIahBa7Ln};W!b@QZ<-n&rG&C@3h`AsXG`!hl7u~qz-}Pj z0lCe@*{K{T4+|kNl!dCCAJY>Y3}Ueg%??=On2tcE5*>w)C~9IR@4EVitFtHMOqiYvSWlcWZPLtXSu>}PpFCk;{G@HUg!SO0 zDgA=i1CyroP0sC~Hlu&)^!};Su>X3oTNOw2JdbH;@8 z&Koyt=6ICzW@gNqb;bB`Yay<485Xi?N-j%o?g|hb?4CAl)fB*b%JQkXYo<(DIAJ_g z_L%c#K%S4CHDfGv`o-t_$4-t5kBSdM2&WpuqoAhaf@$&oG=@~uqn!bKvo|uBi4x~a zNsNp&;g-W$*r@ZRJ4ek>#?6d}YL4W@1u{6kF=K!OM~;_w`&m#%HelfXd0s4dKh5g2b!+o*-?z7$Gq*$?3? z1=5|tG~gR=EY!3S|EYK_Wk1Ig^B>)Zm(ak3+EOC6SXH|gfYhZM#7?D*HYQ{;N7;$? zsmY?4ZJH;L?DnUqzGTUZrnd+ead=#T6e1gR=HNz$5t1BBGiPX}&)ObKE#fp-P$YsI z#(*7VZgPZ^@_Fc)6;qrTtqPj?ptkIe;IJH#3`MDi4K|M+n#QbfL^vm46+wGCBR^t2 z-lj81A}_uf+v81QU2o@-Q@%PlSUldsSqt=bhT^d%L+EsRD=H*#CINh8CVpMKiM!|w zsLA*lIlxFev&`r{j&bKy0C7e|Z+0bERGu9>;(8LS9DRc`>TQWeCr7SxqqtNQy^SSS z4OfC)Vi#uQfbw5%M0^!z;#h5NNf2R+iC9lCao{_zjZ-KX^%j^z_Rdkgicu$`MM4*| zO%BkYDxAlXikrS{(M9awWN%nuSENXLB)P(ziAL}-Cbw}k*Z_xuBh&2*u940fV=7E` zIl*MbZwJ!R4BJ#$_4@)zUSAY7iCrOMfmBKIuxk+;!ABW#o5g06Ei9_T>7t9n;l_$W z#f^QbxPfem;1&vqqVtCNlzhq!Vw+NN0S6cF@uJ5kLe!bmu;n4KPZ*oIj6 z3J@%$z32i}v|uc75J~^x=b#78!9EzS0e})nn zWASp@MiAd90uK@;9|&#_W?6ixkmMB0e$JM_f#%^+&OnwN$})M9M6YAIQ3+chy@QMZ zK_dWA2DL$IDVS+>CF3g#=P=_)OBA|CI6Q|qb_CL8Nb*RINEDUj3}$J`W8JCam83Cr zp|}N2!a3IHSW_TV=T1$Zdg<=H`*!TubK`9{j+va3J9En9nbSb+2{VA~8RK&&_Ku$f zeceBia|;YWT<1>3de6kkeN(6PO_|m^WqR+_>D^P=4|(IX>6sT?F!8+eCY(<}JyEzp zvZqX*c>b(O7o3OX_*v7lb0wluye)H*lszRe3~G;xkB-I)J=%ec zI4E~t8nbK%u#!qyjqScP*nk9(J&+cUr=2p+k~CH)`60BKsa1iq+4!~11S5-t1uX_7(V2^vS@f?uT~MZ+c~;Um zk^(j((c;8yLgHC$F0`X96mAT9gXFX_U@m~Ku{bhl3}BMi2eAL5CXBID$MxAOdG}zp@d-2SOW0M8+-*1-ck_hYL2t zrh?1#IRL4E6jp-3G$TXA7eclnZhp){92iFgI^9je(P0h+?^OzDcE ziD`c!y1`R`)uB+=+ktEqNX5l)yVcH#ccGW@6@FIy=YYjfyTV1o&QjQT$bX!I7J~Qd z=a72*I)dhaEQ9|jll_qS6wx+~x}LwXA2$g7u6RP&m&c*Zr&EZN0ofRit$8EvK(gkG zK${C2pjfOh>Yijv00LQzO!KFqKx-$+Aq)N5X?i7?VE5>uuia4&bo3-Ax*`k)&>|4p zJP*x5}r>mO%jbcb7Bd-}lLWj6Xi#h`tV7g6M2r-F! zsx6cWQiIp@kVF|e;!mIG2xI`$=Fn(sWGuvKqCZ2YCTHee{M>WTJ^9$5n#A&0? zJAc}Y^QTWef5y1!Q=$_mrjHxFbK<0Zlc(*TICamIse7kP-8Fg2_6fNo<0tK$I(_>T zmXRsbMsla^nLOpDDbv!=zhKOa={dQ%W2R3XJ7fCj>C@6DOw67-Eo)$ICk8kabxF>8T-KKF?Wp_d*_%jw@w&;Z1#7P&8A9wzw z@!8p<}&==k&#y z)Ho@q@##ZfkL>KUEM5oeMtT9gSCVL4Q^z=DZ*sVoxI2i`Fv zIMJj}v?Owp8auuM6J<_Bki?mJflkE()|eH4qU7ZaknA1=7ELGvdOLh zEA*nEaY}+iyAdUdFJfd)B^P5z1iNGXU9k{Apc6PVm?gYg;8y~)wpBKnCB4y(mz?+m zG~G-I0+2y>o2)Ve0O+EjYn88%z$-nlV3`&~n*gn82_}a`rrd*OM}wDs6|OV#0q?Ur zkcv8HJCBJs7CfTQhoQR+nE>)sFYK1cVgdQ4@>{xw)gZ$e*@xyPG_5kxLx$2#Ptr+V zmoM2JO!r5#6z_lLQAA6ESO-b~1&UuW`z@WzB9;Ti0val8wFrQ6BsU5S9xf6Gm&82o zjCV#eAE*+bXXLe*?GVoyTL5lUV?YRpyz{BziAh=nT*d>(ac~5jf@5Jg+qy`-0*0~& z(r49z%(Uf+;4<*j;$HYv$?jN$pUV@V&44|?gTm96IfYw*p>NDb${0aBc1U|Yu802s zE|}p2qi||FTrO|K8%TmM2Ql$42V62v19DqPUEmKChVBM5>8ch!6X2D+7O{6WDsILX z;zz{q0{)^tuny4;P0a$^CPt`Z1@&=2*kJZmvT>$Cxnm;)HH9-{SNI#@m=xv;qfKCk zcu9&6)`f!}>AivMfK`_5>?y^*FbRsR`P}}f;)+ER;=WWSU$uvsPc;@|0Vu~qcMGS7 zCBXU1AzhupOd+W0AO_IIz`~>i$!|bSCQ!|gq8vSeLt!rtd-12cQYXmK(Izb{M{{sA zDD*^d-<8Dq8@PD%pBZDA^?G-_~filBBfSd8n0xHdDIh1X1fNH9|g=Lly=28;w_#)DbrP_{Y5 zjz?oShpl^8vO9f3VQqVD$J$G8y(x7up%Jmd09uDJEqORu@AeC*hzlO`2U zn6PC0#0BFf&Y3XjfpOzO*n1{TzGL#_TPEk;Fgf?S+}!IXPYOme4R}`GWJ4g66S(+N z62;h-1P)5f(s?sNxfhl-x0f}w-T2_V@T3XRsgskY=0>NmBu|?fo;*2{o0~RudeZb6 z$up*5OZs`UJfkPzA{ohtr=2#*7|yczQ=KW}^ucUHbc_kNz*!u_ao$v_<6veSn2X=h zlM?4mX9uGzMdxPrYR2TblL>b@9Ov}YH;twh(2tr9f1EQAr$ltlKmw7S!6+0FG?JJ( zIWZ$QA!lad#EbRQuhO4)gYlx(m3S=??ZS#7J{Y-{Lu zwC%93IN(_Oq+`?bQr~Z+p+87{zm_&UXtw$Hl8m@x?^ffLIn zno%q!rr84&^q?oC_bO1lbb(;tEr*bK8wG(&f@*UJMf@4&kROo+@-gcN-#j8us! zXkZRN1UT3<<|MGF$<{iq-(;4}7DZ5iViu%>&A>6K7NLkiTZm9#T1ZIn#mQ)j2&gAy zaxx?sZh;49wvCX2jlN_-+W?fW;tAu7k}IP5lA-Bv8922B10af%ehKE^U?M79Brpo} zIKX`f-kA7ha4}Xi9}Hw9b|vRX%3eWQBby2(&hT?wfCDn0;ddO_DB1_Y6)Omf>xr3! z7~gSHKpb~UO^rJhVb?e*^tEX20NEm>kB@>aBwA3iTa1T+uP<3gby9CV|?g&F2$ z(3y+tlwi;3vxd21E-DM7IhpVT2hm&PM5BWqFj!ygf@_0@)dH$WVd`}GA$3(3n+`k_ zaOrf%#@gVH=(eWI!sEnGX4iOXTo3G}(ATH~&f=0p4}E`%6UTJf&{m)Whf}cAm#unL z7g|erfIc0#W)Ee>JN*WrP(;^(uwuY^kbxXQ`l%t7A-eS<1_Q{3BDQj3!s}o0f!&z*yLePppl;OfR;1{gms3qfNU*g ztSe=#O&kX_2fHocyF1AO&CZD3sMVKZb0t}|Bn$Mu7G}U7q`eXWsoBBkO{1EI@d#zf zK@OOdLYbgHEQA&v<4ztchq9r#?cq_zKsGR~_h(uG?l9NEZoNNSr={wYlmu^9oF`M~ z&DOcIbZW{ykLEpg;PH)HdP38t1}9I60IAcba(&wL;PmO9N#pS`I&(&7+VsfunbE0$ z>`ZG?rp_JJxgt7Wy3UiPb0u@MOCSyUH!)?L&XpP*Kcl2&*^b_Hky~TTT9m1n}+PG_DY+da}NDp-u;Gj@LlcckJT4GS6}){efeAM zl|#y_hm>C(RbM$Ozi>!->4^HP@6}hn!$;+%!|IEN)Rzt`FMO-La9DlrYvtK5)Mvj^ zpZ`*Q?sMg-PnE|%c0Tik^3)f~v)^Jz1(l!u()G+&>QkS|d*7BeK5eb)GCWXhn01XI zoR#2I6HI2Nt)y-@N@$oH?1?&qKG6!rng~T~Q4-BE-u6IJwiTiVFFX(|+WSz506Opr z)G$zpILX9#8(FGR6zySRuj__sx{n!^O4?4@` zOTqO+QL65U3f0MB6k)&xR7D-MHh^rRoEnqIf!4M;eQs~EKa?)~9#o^kZGwYStKuM@ zK&tA3d;@do(11PAyilF7fra#$0Mjr7B6K0(gk?hWToO(avXT^&fLc5vG#9{SCTStE zMP~y=F$fF0f`^QzhTy)>7fi#&IO(Wi_A8;CnO8(W97;T7wtEy`3Y4{#`J^E8MJ5@W z0{Y_=78r?NfR70TXtIEzI5_k>MLo&Oo=Kd`W>@LI#*>uYv2IL&8wkd6WIii) zT7s?gQ&UrO)VnYM_~?>pY}m&Lc@7*aG!jA7G1KqCu1@gR46@T9?xuT$cdCKNcFASM zznnuuvp`aPnkyu$9vLkOa$ndI*#o(ayU>~3Nm3-opoSTf=S_y(hD6mvO1qNGK%t0_ zcBf8M)5hB(InHPfT_R#IOKfgzJtP0Z@p2I0X4FS)4lqx$$sJ`*64|Gvj(4Z$I>KWh zz>S>SJ8Bm5Byi>g5!7MvF_#lVr-PYxAG;hGVWL7=CqrD@fM#zhsSSzk#+D?rJ7V=D z*}VJ;1doLY0{Wt7GSdlC`$2QsAz91@sf0(llgFviQOpdLJk}H*ZH!cbJx1Ajp@^-MW;+pojxON%CwZ+Dd9=E zki*gO6Cj7flcxkHPfnRKHD&6wr0Fv)!4#du`E5Dco5AdUoz11Qy6Etg!#cg9C1uZU z?0B$l*#!^GQ$~$ea>mM|$7(F&%$cL&!^!%jR7cKeXVxfNMvg5r$C{RD%ATN~cBSF` z8;n=pW4U3r>E^lSI~SYpEwId~v@EE#EULGbEVI_EbJTP>ntPaV}metk&$)i>I! z-?)DDjr!s@%8OqsFMI*os?UC=JoA}`)Y9OUtj zrN=)}pZ;8V=1ckM&(#AT$UFYx?0wm}{(!x1lWj?p<<3Rsi*GXKUTDmkVDyFcHkp~B zbO}sd9B;CU{w_3x(K@Cy7UQJ#RwuY=6f=)dbQ432+2SYE-2hSs*yqaE{H0~{s`2@X2r{g1hlfnYS%Imr{6`NDna01%mFkQyKFKLjcE6=EFF z@dAIi9-fQbWI`gW5cDDuD`Yb8ErVisfn8AR9>{99KUov{7uCQr)tltg5CR_;WR;}DOF?IHS?V>#{k(1==bk!%pansP}ajkA#T zu-vdQ9CF3J4ICNY;<@3xb{B5}zcQ4vU7_*?dGQN!Me(Yt-{lUmt5d{2Qy`;e4AYVe z$VO3MBzPrM#JD6}2Dt1{JTbYAeX)^=M;JDah8HC{3;?(<;o0(Nv^_im)i-X3`W;6D zvcYScQ*}r{zZ*IlThJ^3orUMeqX~m*cWRuW1`RTCD4i8e>_`seGsCN0kwh(OVh?1< z;!QRB(;&3LQ+(wJXB#}JPUvMuKr?zI-tN^q{dy+9_v+<<$rViy(b)z!N7kU-ogn$a zZlKwdG1-$bi8-X`Z(+PgoXvy7(t+UP)L#t6;{ZiYTmafi!OVDvk3ombe3IfI#Hs5+ zZMs3+QL8Iz^CnwhZ2TDVGtsD||IUfuHAU5uP|P;3(X1vKoMxNHWO3E2WoIWEbA!B^}gbNd=Wz)>{@en+rSL6>D=VmQAW$9=_{Qo!hH(1$6G9&gIvk$)mXA9EuJ_(sWKu z=a6-h!n|%5U+aGVNB5tPx!ydjy?NU8<{8&tPJ7-s>w5F7_UF^?*H5_qc+&N!(+5=P^<2LSK0lRwDS#l&s)Uq!FQwsZ_AIpD<6DUIry&n*ayn~ zccq|^7I!l2Fmu= zor5nqHXO8-uC(5tXSnd{glLA<VLRXsUIWdpK#D7v#_WAeno6%L01dX%%K-uIiEy9?G$#Ev>@h@$61d1eIg$ecUP92Ye1d zo+m21=pyF@Gfb1-C!ZEWIUO z4ht|lEmjFO7{7vDB+G^jXUqwuF$FmIOGk&pMY4-L-dAil$?$&~XD-5juk z9|)owAMJRIHbthN-J`h!fp9vun=MWqV9m}$!R2^Y)XWsvX^G5%mrPv@VGFQg$-X{L z9HaLpC%VFk4j+(hVDMHr(dpCMy=F!DRRU>N$W=9L_N1D%h{cy-<@5y{g6K}05XhRM zrHpg1KQIlDMSaovDW*l|aPv%?@PmthkR*c=h8eJWQ&F7Q;$=4@wp-MQov|WOvn$FB zuCNMf7`8zQXE~s|eJQqJx=jh$l1AAloaY#So;-GzH1Q&N@}o-X` z<8-OnaYh&Y!IFC+Ykloz-D$?$-YJo%+IO>dRkgzd7Ri z!*LBf{p(NeH-2)z`FHn6KdY~PV_n#4FI-`|Z9$ybqBEP~Oje!I5@$5W8_jWgqt3t* zr#HnJ3_29Z$@8vszxz+^cSl^mJFKDn_FMH=U%FoX%Js^ZF398;ztCR(5=-@k&$So6 zP@eltdjaKB^|?>fXFgV*`B;4xD=f;>g49odi65#@WBI=PI57IIEQByf4S+iL{#D-d zSAbaF`KC1dC+EnYCYrG0NpyZ%C;AABFQ#TF`VsOi0L zOIX?Sw!G&ZXlm-~gAm|25v8{Tl(X8qpt-d7U1`tTAUlu^NzRS<3K|^Nf-?L)X+Mtq zj*8tMgK{UzwO0I1-?hkc_3h>huC|PsVGAT_ zz9`t85DP}rC7Kg$Mzce2VVoauU=R};;KgP@f(Y*gnz01A*x4u?)<&}|AWrEGY8!uv z4FKXTcFh}1mpK78B%~ksW2Q~v55ddKMm?1^$w=rxGXhVspaN({sD64^6vp|wf(~~O zl(akWhWps=hM*H^i72n=f~R<=e_6OYAj5@2CK8k9D5^-KAyj!3{Nm|2K*R46DWvgH zhF$|qK{`7nKQ4o=8yj8o_=p>fbnq_djFY++T{sj9V`YJ9Zt6kcOkqPSju2JY$SdTJTZE=RbU+mhQ&n#g$f=2 zGZxv*m><;wvjj81C=?fJ;*sJAkl4U9g*NIlYK0*p;>cc#dWwB!fWj6<_2a5Emrv1X z3+X38OUvb#nY~YionU8%JK**uF{XtH(>*DcV5Z5JZUhqp>3UzX-r;4eo+rsD<`6LZ zQtY7&#$bS(!AuT~@ue704Ru5|C?GolLR$$M?SVweZwY2d$zx1j4rSCs>EO2vWJr-w zQgpPIJWfp-t0s?uok);_i85y?Gx<_DPh%+C>f<~KQYhQuOLs*_Nr7~;Dx0dY}13dge>#bKf{#IqLY`3F);{@?TD?Z=80${iF8IPp=KApOo{#_K z`RL#75C3KV{O4<)d~IOErZqrzBv}U=E_<=mIkY&trnAa%7Dt>#(!uUo>^hS@&S;C% z#oL?uoX>yd9C*#z{VVH+XKZU9x2@b`UAEoYHe#vYVy;+iT-aoozeb<8L4W;XU3{W0 zE-pSk4qX1vA3prI&(MzwzWTDZGFn#`joBpNo(8F*7j#??N6~_WBW7K)~9VO zPjP$4v$oD>EFDkVS3HMeTk))8C6>?FS3YfD{tUJ_Ry}WD{k(nU^Y&FQ*jB&jSpTwP z!z+#rFFQB>O4|Hu=a%0%w*J=9^E+qXA8;em&>yA2*QNf~oqex4`(Kx~{TV=)0QB8& z%TT`1$dJbLc)SO2(^c{q-6Qf|z!%aRvK_)4vibw%;0Fp7^he6mAIpz_5ZkCefkJf; z*{%vbj%qS$qCU1f{=Q6y%tz{z+z~bDlfk}EexN-K+w-yV^k?de->9!1R)2MbDF5{# z?ZvN^=RTEpzb;vO8Sv5qUW_L}qZ_ZERneQA z;04|;i&Jz|LSmcQmqp!e<`5f#TTCzF62qWXH1H)L01bAp9dD^kcGwlO$zcQi&CXac znVnXfjA~Y^>_nrOue9W_$tq67EJBjgsaPxy6q`dqL)humoDNmSS!{|OOB~QD*>Geh zc%eBZ4Q*s-E}6065U2Eec!O!Gk4oP~2R8vn$1(F!FwPG!#fq>2!WkkA3Csxqjdg+; z)&*OLa(d^%dMHOwLp0%iZZufMBmlHhK%rG(i(a%OKw+HAsgTqbl|79(7YqrE3Y0i^ z0enT^4LK|O3?fMj&Z2sgZ4yHR0oEAM$#gMxiBb8#%dF_k}HDqLS?hXAnqEnU9=TA!;1qJi%kSRD3}&99q5FSW^;#~ikcVVJqS80 z#4CFm9V{-HzYbUMTT2?lx&dqYK-e+JY8E@zNp=eGUwkPhtAwB1B7%AF0C9Z$Uny$r zjO<9nuaAENFkL01gA5F3w=jNLH%M~rfiNljhR1gFpBNwRT_Owh1S+t-D0dG zy(RHBPn^|daD}l8o#5Uy6DM626C)7xX|`ad93A6IpPZ;gm^6x+{2=f}7LfqwF@QZ_ zRCO>ziDWC`Y>PM9jNikT6>6rTFG4~tCTyLC^-aR{R=d1HpY+kau+wS%1;`DI|M$!1z$LSK|@Z$e( zY{g&VxC;|6y2m)>O4I1`6H~_}1k>UJN%3xYi)oHxsZv9P#3A1kc-*^A7 zfB*S5F43%$lXYr}&YczS9v$zWs0&ZmMbFbET^N^oX?*6@aaq^Kjk-B*%aVUyxVB1vbA$f&7Q;O&jSs9d&Dm^R*k{TgHka-+ zSMIeoJWkw`@-NuezT#N_Yv-olIl2X-hyIM>9QdPi@GsKHThhp%rR{G@JD|khVTpM~ zKy7-r!PyU0kQ9m-E02FDKk=dT#E0sWA8Sv3j3vF{Pk*95ix$9V@>8GSqb6Da*r?#+ zGoLEYa$S4&bJS6u`4n5!=f04iV*`S1h!?+7U-(jf;S24>FI+Evr9A&7n-tG~t~`%c z#TRtAzle4QYpO4NExq`y_JR5|cRTjzkSbb0jQMZxT`cIaVFfb9=1Fym zg65;co96JOiKB&`{xm!Ou>m_@8UzhUg=Q4lBMSuoW$R0+%uA=TdeEPlXq7 zM@vFz!`RqAh)T_3Rb#T6{iSTb`+vL@P+7{b!UTqY14z5xZ@}Mq6y!8qV7SYU3kpWGu=)5eCwx zp&Afuq^rayyQ2o-GvN^=pWdSI%GqrId*J6FcvslYm?Ac4up@5S0s+f#Kwc8i1 z1;$F-6^V`=l|$7n5)STUcOu7F$}qzm{{r!@ib5|oD&QJeR4=SDAkN`7;JyQt$CGzj zY!bHfEKZG%6kfL13&V^?6_BkLbMi8nT8o;!DGbWy$B5C*yqa-#uPg%Z9HA_C+IXXz z{ga$$Kn>IVP4Y64CImINXc4R@*gc7|pW|zo=!5=iM!bozZkwOe?}o>m7s#GwRDw2l zl9ldkX6zGLL?Gcgp#iirjs^r{1%QTy5NJ*V#3d+kRDg}q*a>N&zdOkp%#cG_QXoTt zR9Ay(SI+j%Ez8NuxncUaRn>)S+sZ0C8s=}W6ZtQJo!rVgsY4bF4K>_ zM4xk!e)J{!v6t${U6DBMO2cSuyiA{alRo#>#BoH=!x9TU~mN?~(#A$aY zPP;F0`UCoz4<(-Wu>Slx`U~glFPe`P!-bFPFP?9>Y>DBDLj4uR#%q=uuCLPHPy-Mf zZ*4N()@-_?&2VSC@tzf?`&OABT5ow|qv_EtrUgCbMg8U_!>0W0rovs8(mmG7{g&#- ztaVRWnxNC4w=R3hzUoy+*YBlGuRAxt=G^i}sqfEH{~IXs@L!c}@5tL(l%4M>yP=)m zm3O}*?R`%J{9zV_vtNxN!anWyz?z-$D7j5H>B-vIEVgh>wy*dt-a@W z)-AuWZThusBib>)vaEi|y7EQS^5;w|o;S8XV{CcaQ2&^|Zoj^IcVg*4eBS1`{LOJi zTjH1Ync5CmJD>6lz3y-8G9;QzCWmO_yUmOhu>suB(FUk#Hh38&!dOFQ9dTOO`Nq&` zI()?pjlf(qV{+o%een!FI8NT}1u= z@-bH7ztlOmj(rmz+{twu=YgH^_l?-YW2pFKX42r$5^vNUOm(tLE!F^M1PJ@^>iVAki-iTH48H7@%w^|H)!3E%?G5VWDoF9vmeVhDN z_9U3ldhyBLWN_K0`XpLe4}JoiMFNYNZ-g`Q*yRAdJI@gU3%oH>^)=2FDrIg>_lkfa*YyI=`8Cz&OX;Rt6ZGLuv|&gP1{gg-O!>e8=&nt%A8i;n#3-a|j#{^gI?eRlSe4^QTN`jhMJ zQ?_S5&~MqHAKYi$`Mmwf*W?%8RDS(|_S)y}KONEDIOTf(U!D(tc7O1*``w>CZ~yH1 z>(8FIe%Ai-FV~-b)?WLU`iFn3um02h>wmaj{fG9_-<9WnP@Xy^KYl_xa7@{ANZofr ze(Z#D;JCc^dwK6M2bO!jS9Tteb{vwnACh++lDB{B-1d#M{abn4*Yfsnle_7CLY51fPVOWQtBM&6fq zd?@Ysz`32w{QOt)vtKx${zQ7}Q|Xz{>NCf|52VLFa00ks z`tEmZJN|0h_NIN?n^>CrUbpo9!LsEyhSe__R=$w9{Mm%|C*vFU$JOqRtKJb`KCD~3 zSvPO9Zq9n$-1WK#SL*Itrn|eH<$+G!UCp|it93V5>29pjT~?sGaDnd9MG2SAPdM-X z#0wutymEo*vIW+Q=h`lK$a&!d(uMbG7vAH#;9mCyclj>3GjiE|;Y;reU4C!ms{6C9 ze^9>mLBn-(4R8neCIQ(r zQ6e8C&ZzlQa8iSf7sFU}jf0+00Y*Z>Wh?A^^!k#7`{LY80_=xWeJ*z}hFyk53uN1v zPDFL847uSm$CDw=p|Tl64d@#kDq~1+VRlu4DTV!mb|#$}Gy=rq7m>9PkPS%==-b(9 zfsmIK+|;=)N?`@r@1Lh&|_2^!g# z?g(cA^gy;=^6O!Z-4UQRG6F$+6Hw8fR= z3}xEEbbp$bJX#88I~drP?t~Ker^aFd9h}7`Q}(81S8w#)`RG++JoE0j>Z3RR_|3b2 z`TX72P(FL-kDvVY_aDFYn~(nbyRY8-%@==q`NQ8n^ZF}~KmGg@Tb_HS_PLiHdgkS; zUwq?=KYV!2JKtXO@$uQ;{50ptKOQ{tui3}`J^$p-*M0x*S%?2U>Z^YQzxccB(|@b#CqGl3_)G?8ANx$*_mRBk zeR=o$%HH>#6sqq?d)|}wyesc|+cEqnY4CMN@9&)5zj17Q)xPl+>ze0mE1$BoAF#CS zx3umzweB~z?l-jTGc@ir)Q%XcM-nOr5-a)>O1CEDcf~L1O3d4sn71k6krnaxwj|uw zmT+H7;ysOtchx4`UY&4rMdFQ1_16^{uPHEJTVTC5-+I+z$CV4^s}^ckJnFh^w)gUf zLs!fRUp_nO^81r6zc20b`!X)Sd(>5TPq^luDc9aT^ZI)(y5a6CZo2EL8*aPd=G$($ z?e;rvzxAHmZ+h^Ko9Etj)BL+{%Dd;L()(^MpM7)HLpRkta6{cgH#R?fQ|rSwcFei1 zbIx@u=U%^h&b4djUb|u5b(XaJo+V!xHpw&hqJF)EUBl0bi}gZhbc1jf}{MsQE*oEMpR#v!Qjx39NW#ID1eLR zjXJfUCy=UnB0xDqS(rV86WT&)g2HyEh@t_rRKL~EWJ$0M(1}hFKtjqh=$L$=-yejf zQyW5(;V5Q$Ibhg06*Bl}27~C!_TbU6t5D?@m_0UGII@YAQS^A)^ks9-cp6ASaM7UA zh*}ZS=io%+%st=$nw>7R8&q$yE06}Qt#I<(pfFTu0Wc^K5+2V%L34r0(|HZp5$ymv zMi`sBDh40kv_1pf-4o8xfqP%Ns`_mnA*{s9kzOP()XxaEYj>L+3S9wz`31 zt6jlYfHi?Goa1z4Ly{{#%^h+|P}z(G=P^ZA6Yv*jhtg-jNi6h*qjJ~@$ssxXD7r&q zP8G^|m+JEC^l~uXrkS;fJAHyFm;sp#`E2s1TLT$!PQS^M#G|y&tgd09BL6 z$k9>Ywb3i)I`LBy=efk)sqZlE8#37ECgh@LVpV#=-w1C-Q-S!8PFo5B!7k!qq4`zjM8DO!>nR^$&;D z-yc$b^_BF}=eB3xvp(~l^VyG_Pk!Wh@?+=0_f6aWY#e;uIQ&Ob|L={PUNv;R62Iy> z{fg%dE1rvMdosTD30>X3_=;U|CBwS>K3#r~uCQBI(yv+Y!6 z-BG8zqegeD5UMv->#i@?U74r5e4*}&#kwok1}?fK>C#)$FTZunmA8();^xU$-gv=fS6zAi^*7ye)7`h;^w4cL z&AIdDdEn`NH!Xeerm_cbs-Asw(<8TaJbL@81$V4lbnC`NH}vM+G+cP=_Tsy?7vHg? zB{aDR|EcFi_tb6G3hB=QnJba+` z!2@*iL`H^y4&Z{x;*9BK;lE~l9?%SMo6Jsp z1;x#v1@PJqF~}MGOm@XgSVNLadXv-XOZ)!|vUPKwa7M?wTpTO|%?Rc~N<&Vv!%ch? zBHFLIBi>LNAm#EUp{B$nO$;BlQKh;dsIdjoPhm_2hcYsrnsF42V*|2r5E)zWtf(bL z$ON8)4X7e;W4;#~VC^`UgA^>Im)s%TDU1wZE-eUTGti9PL3}ZPrj0HXhMhoe1M4_x zjNRBp^V8BK8XfUQI}|!7hIW7f27?1ZA&prGaY1A{K(Hi;smJjZSMX2e@W`Sq5_4-nO~a%KJIB-|3<0F2^jZmVhJ@n2 z(Ecz&eWMzz6rL*oMI8>OrYJNX^pXTJXE z`%m8b;@#I@d;Pb2fA{OoSN|~Yw|~CpwfC-i^Yi;Y`TmhZKdm|a&s$%7Bfe(9P|}}R zx-GGEB(bnRp`brLuba*MqF!D8R^7slx`kc3M_1_{?$kZlp?hRS+@ova=dO&OvpoLc z_QVGp^$#@Y@2xZ3-(bGK-gFm{|4|OelaBIcv-in9%Djy!KnLAYd$Vly+?X{2WsC{@x%|p9t9^8XcJ9}^4 z!~5!H@5i!cHlVq$e)fU-hxgY$vaf#5zJ|H`8|Lh-e`HTRmUDO4&DmA^h$wS*)I74i z28Wuny?V}$x<|Lw&D&NxZ@A{s!RmPfHS-2*=407k{b+ynT(O+jSM_Lr)uVltb9>9@ z^i<606)X6N(qHjNfB7T5OCLfRsCam=@{vJYaMdG&RdcX1z%skPV)kIg?175e{Ur}R zzpD6>8IyF0R*Q&6fP#jsHkuq_csfT60@lDW-5^Ziq(W#jgbSFUUsX1U+}VuXW^0#y zZtN~oBXJM>-$V8sQU1rq|GhwE&wauc8e_LfV5WhvzHwxD2Zl<{AYygab zW5eGA6Ua~#r;84BEfh0~*vl%D;6|I`VAg3mYAAboMy3Q|RxA!~!XxEWTfjHF^+0y| z$9)X{fWcrhg40$o+FE8H3awNu)tBgp1eytP;kC!b8!b#Q0$DAFv~bj=lWh);4#jO^ zyV0g`_Bf7{qOSw(2DTyS?SbrNkR@~G;k+Ua1S@!M^hzsU8I2X@65;;<9w}zQr zMTw4ahI2UFJOJ9JTf~eCOa&Fq;ariPWC!+@Lw4dj&B9obu!XbFaQZRqV)JKs(#C_` z&VcArcSp5ww%WRD`UBUkxHhhojURTnbY5&K6UKOsne%VpFDHsU;p&d>%ZIb%J1_2`jvatR^3$#?GHBx9&Si|q;d58=CO<0&Rbl6 z)xz>y7cISg(W3kFi{_RronKs%S5{P1UR+sQUR7IGUsKdlQ?#tMcv)@X>c-;rt)-jV zO9wj3hgMV!EHCMAFW9!cc*ly8k@mdZD@yjPD%-oR@<3PB{xzisR+k=JRdR53@e`{{ zo?2D>#EOC^R~A0Cyx_?d1&^=De{98)gPn_>T#^6y^1LTk<~_B1(UZ#;J-ux4Gs_k| zwQSMT9r;hS=RMiJ=n0h0#ZPuFdAv36vG&C%2U{2IZ&|Rvb>ZITh5MQp?`_H3)0(%t zWyy}Fg(G!yN9yMd*UcNQUocdMGJmjket+%!fyz1kl@IqGfBRxj$U zTGU-RuNM`n7xq>!?50DILhtvDQ*E%flJcFNu=5p=Ba>oRy<)K0E|}M=faJ#F3arr zGBXg3;9wLv=S&HR0sZVb$y`o+8jz?I*DzEPBgb(i^nFRpJi`$^3=gLVAMGk5 z;EStua;&)o(_)uZK%Y;Nl9>hxzq{Fq6+8s9{hZUrV3BbnuyC?3N)rMLMC=M%F2Q0k z?wkDq4D;~dcR|5bX})AwGCWdT6?8PN#L9S;042W&+QBu`lF_6w`-0?4MgxN0Z9YR< zBbP6X1L8UbvRz45Ksh>Eij1P8LkvAP2Qrv`gl_0eM<|;UCq_pr$>Z!GEX1-a%G^xe zR7W%i2)21rZ9a}}my*UX5vvlSKO~e6h$p%@#SH4l+r5bnugRShiwsG02Iyu9W-(P0 z)GBXI@jupi_mKTk5=8tq1Zd+EkeOd9g&Z3cy!r`|3 z;nw`&wt}Iy{K3}zq1L>imL(%CONLwWus+zbc(55If4HS!xG8VAX~{?<*9RN(h8mX) zH7p*gUo_aTWT>ThsHG4qgAI!Y>K69bE$FLV&|kN3pl;DXEqDs$JFl;10hT?`yfwi0 zB9wvJ#r-u{S=e8*0M$@p+gX8i7WCIF?5|!jP_v}3dQo4^!oIr2Jyi=>Y8Lm^<@MDr z>8oAbSGx$yUalq^9O1d4hU00LsC6=fCapU zV4pXHf|aVdLv@etX`bJ<_#R18bb1@aj>V~g&UnH29^xgmDbPMdh8VC;kcrU{(06pg z+UU8)$C!G;8;e(+?cTKKG- z|GbpQ+ra;bC9{45rK_srz{J3j?DW*!!sVDToIO31Pg>V@lGTkYR zilMGQ=M@pW#;Kv)u^x-Lc8W+3&{;ev@S2f%V)|XiS>wn?s}gT=B$_z^Kh|;YCeEru zUkyOa{}5p|U_9{jAduO?z+Z>++Mrn`T=@aE>KJZ>i^1)1C=eO}7BS6fY}OtNt)mwg zi6;h>;~vp6u+VkRK2Mrt$*mK!;-;DWXk!vc$~ZIN zt3}=E6Sd4qa_R(YAWN@>fqRoDMG9prDPwHm98bm+XDEv?Cz?oL?N5`EMsY@6dN$Ja zA_~w3OThF}*vMH9Ah$V$otZ$gr9h@dII_WR2R$K4R!n7Kc4;h=YRk3-mAaqc<9CT1uu0KJilh~Gi#PS-Bt9|nu5nyE_rNK-hnkm z2iBJEUt6|kZQ1U1OLqgfD~q?UDBiZBczAi?@bZ#@Wu=45mkxlo%dw?&Xj$>_iju+Q z#Y4+WhF2^dS`O)5IM`V<&|cKvUOd=QJkVa)*P7qkTF~EG(ASdR->R@C28C{_vw zTk;2*^9Gvo23iYyoAY{`mh|IeOMXw|;y$hv4YU>vHWv&wxJSfb>i;43g4 z%dJ(5dr-43AACnm)E9?^QNckL4>c?ru3toxQ@3cacHvO0)GdVk$FjF>;l8%KC3jzE zG+F>(yxt~G7-j{G+`c5fU=9@+La~BJP~2uGqigX|G*rqVb+vb2nW&WqG)vxc@~?C`{Kbu)jBw8 z(MjBc^?sa%Z6JVHWe7G%4F!rr!4jD4%>Ihq=^2lOvIutL9sxUmm4ola?a;KyULme2 zY|(zAZ^tP{a#EG!H>D?pJ&-sfu*h*S>|r)?mLdnlxB;M7d`73H$G(z>qwQ^~(cvLv zaRFdDP^B`1wFxzpt67$td(*_Yyx!o_qKj`a7lSLjrz}hBepK(CNyOO|kC6Z(H zBx^}IHh0t*3q6EsaVKe^EH#vcYHBnmW&8!BN1pXucISnogS$4i9sBB&qo2Qj% zvOhce4SOAr(~AwE{msem51$0DPkeX!4I!0R8* z{`kY$fBpO4?;hN^r{SUfE0-KxnZIwvlKm_5_pU11x4dBQ^1NNk7VhX=v|~llj+G_b zR+bL0EEyq}iw2j0!i57J`F-GTdr@CoVNc7F{;8Hg18nI7m+K4q>k4q9-nxRmx`O@&Ec32W#oKf!2=`EUVjRR z1{sLA&R}w~?+8t7u)x9aUK@Sc|If(2|KODMf6edxlPmw_^ICpoU;OKhuY7hv>nm~h zADFT7j}P|zS$EgL|GCQ@`!DH!uXgB7-F=V!&#(Sd1hVC12KfP|pfeo;PE~Vr9&yMw zfLM~5GlOB$ zFh6vjINVww)g8_RmvMLEs(f@wi@`x6AtK!!5V@cy2p&_c05pU@ebZpH5Vj~(-_)(K zc`e9j5jrAbNJJ(qGo9nS2GkKwYB6q8@&LzryW1cp8v=Zd*hLF)7HQ3I$1R8*%{VwT zGEwdZuVZrR^xVs3{Fy%IKflYQA!f}>|xgPB0E z$rUzxlAVD}3D`{;t3*fHed&5mvd)2*Q00`~o)nWSDu=U_NH+T(IkQZfRm>K~L1HT7 z0=4KUC6F!!={zyYL5C+<31_L;$e6!0Ihf_}rg%~(rmWgO>W-V|U#0He)PCffFAjhH z@sTe+j5$Vx%Kq~B(XX-m{?J#)K<(p41hT&)vVWmA&@5y%czq7pkkugdPgwckG?qX9 z?eG6Qd-9cy<=a{p?Co5zt7GA=Ws7z%U$V1f$&SvvZOaNqI`Rfv7Y}z9jw~-7T()$u zvt+2FXrQB@AH41?>F+G*VOiRX(q7z4SeIg@52d4|x4ophwWznPL@>Izrv>Z9-EBoZ z*wT(_OF?aH>}e^+x7{s8EX_cFQ7={i-=@Nz#=;(KX)fH_Sg@r&e{)^l)_PDI?9T6L zz_&%cO(=yVV`D)-b`;d^Z!Q!SQ1U=?sNL?G#nik){{oc2uGqK;?Cy>UVH7|gw1rFt zqZkkZi0pg9CPh4}!nyBIPVV!0Q(8^>pbm{f-br;zW*I#f0! zeDwkpvEzTfS|YxU0UBlQV60Tl8N#w=?obU@9^tZ<$iCyM3v>x4DrNRD%3uVbY_fsQ z94Cz;M!NyiZV(xDpsexQ16VF!G8*`J&mkmTZVobrdc|I78q0yq`2R!1$o-E^Sp85q^bdpfgkKHLo>q8VIANX0~i2zS}EZO zqSJ$&Z|u4RUwA;QgWxJ-OF&ON1jcuRyb2>URBsdj1^AfnU-+G=sR3*1eKbCpcn{o^ zWDbr$=c`9O0#Qc_a139J%_&*+(QgtOdQ7|0%ZaKoESl z$;|Psh+&psuE|c7t$4!NA_>>|FUS_&YW$SHTmTEMN8~ zC|`!ScoJFMiKHq$Ef&QsXzRtdV7J2)W}-2)9@L=XPqzQUWf=_%hNi%fFk1`9&{|c! zm7(rz1_=iXZ4x~yJPU}70}5|G2Y*6q8-Q#mbXZ&_0r%TobeouDFE2w0z*+$Dy3pw9 zzKlt7(r7hpoHKb0Q0vc{;?9`l$(ZC!8m**`19_uk&kJTx#TF?E8hkX}-`-TH?4*eo zdPYr89(QqI)J$tQD>7=jD{TV9NPHv^J1^LbyR#NNu6DL2Za@0rAs6{qtWx9zXQ-ih>=j3wJMDvZG@W z%d-4!D9ek8>5js_wk7?oRMWj3U~a)cXA##SuA!GZih=Ac?Zw?da7RfG7|X3qV0TGh+ftNXK)j{2x4EdNsQ~+S zLt;1NZK_+mscy+uaJ;#&uZg9nsi?212wJX>aG*Y){q<+ybmW?P2wlyvsX;?6VW#huf zmzUmn$xNLtfxTx=x6$Izo9y%|TAXGZeIN$2gT-jG+tFqxj-jccC_xI%m*NSgI+!$- zeQ~OrgXL^|@nokr_5TzxGUv(oInUfb^8V7@@8%8s#qsEiMSDMdsP_%uyr(l7e{<=I z-|HTD{C`z`o>BD@Sg(8ZzZ~a(6d?PN#~snJK0o8HofDl{jOE2R38Jz?hK#0q3P-5O{^5Yr4b!MSii#=X!6 zh_RGFp%B#g7B@n71lmBX{y9-5+Qz)EK8eql2 zaglaBaK&p8UK)oIAnS1ft`O`xC$SR}o5=|2+NMhy$44DNT=9goKni5Ckvh=%CaQpdT|Cn!l{fO0uyY%ptTXzZ+%$(JNgx)f5~ z;$v^5(VfJ(9NAYnMvCN^-APR4>Q9xUIaYs$Bben3XE8OPmrf6(D`H?QU@DWNhBJ-s zC^mxTsxJ*9TB4@T;J|cO)TTupFaTQAqJ$-!2uHw1j*3iCLs?2N(-}y2C5>_ivXYkX zoA&6v^DeRUu4+DZ=&K`NeRSlT&yTS0F%~QG_3`h%IsVbvrfB*aBSMTm?o4>7P;m*$dT`P*VcY@ai+m;m$FDo8iRti}?&`E~|=-jt# zDWELST-?)9(#>UQcjwZrZA-VdmTqY+-r82QrL}N#OTp&m{7p^yTUrXXwB&=%TU&}Y zH-qv^d)i7jH5F_TWphLR=7zk@^-EalmOw;r;g2C*a8 z^RPbDR5*yzj8ep9L*YOjtKnN52S>v}#5(ulj`d;*j@K<2K?PvCVev4)UB3Wjq<+D+ zy7?ou^S9S8+*UJxTg{^fTk~$ae3nj^NY@7^tl^Lula-l$7&l^e7)=hVT``&+oJvNh zZ>Hu!`&7KBDiOnpNT^;p(vR*G4xn%+|9^q0xn0mlzN$)3so%H@Zj z(3ZZORq@h)05I7$}2Y?u(2FG^>$i}A%CU$W|s2>-IkMdzUsr`{_%8_!aIE9`@X!DAg5) zMKkaNk4~^y$aW#Og%*Z12JsnA4qJk1fEsAa4o@whd7_$^Q z0@*EwSxU?>&QbU=!yusV!|`E7$Yl{Lg6&+9$Ym#<0OdUWFgOk{4V8@*a2Dt^a+JIm z!q(vM7@V#|w7?whM5~&BVs~@UAB4OTFhF(_IepHf%^t`YxUq!R{_%&OfByN~H(%OTKWBSK{*KOq9m|S# zE-z-xMteT=b$@$)Pir0obx&JJw)>m% z2b%M->~F@#MFUNuXR@hasHJqUxn!V`NbPSd?5$&WCHpP0Z`~3Q94zKXQ3e{841us* zC(5CP`)ijBLK+KiNq-E)AU-<}7n8;Ks;Pj;ZY&yVEF6k01q+ooK)k-7zp)4( zafCiP$_sG(frf&i`h14IG%Oiu%-hzu1Z8{U;%!Zfx3}c&Xer>vhQ&{=D8J{r%XIMu zGY46qDb2AVKr_>cnCyCkRTQ(qWCdB!f@ZXz$qw~R*2v6~ENea{a-*PQW@jLhbCkU!3vP=3#9@~prlg?xV%ZYJ7%h5KOtd9moB^M zLYLG)8C6Cp{C=rXeUkSPr>Kp8aC>FU`8GS)#i%XH2 zP>F600NqB%I@%uqJ!CH_FVbG)VFI<_uZF9_d4+AD38Z&|J)bBH0c3-K>8Ln3UJJVX zDGsz1a5`7m8_I}HxTC;Wf^iV_ASN#i)sjU&BxE?JB4XDfE|035sj^~$B{Ah|bZ91a zY`V>0rJeat0B(>PlGZHd``0^MRxJRG>TTq;LGtRIo&=jl!HX5UmgsOBBoClTsS5*u zJ5~L9%3dFKgfIuD%}y`S57q2+hjC#zV}eCaWJhHzQ8)y$3N+hX0bm*g7og{OeNfo$ z0_bs_oTwT{u)^-bf(BEaffT1N3W6IYAFkFUf$ssGoHWW20!f*?REmr;2iV7`CXIHd zjR&2b;T(Kx@iPgZBQnY!&US>e!FMfrj4hDiN}J$KpXAG)>dBr0vOB_~?13z2B-`Lg zF?f;_l#oe_+JYG-#(iV=92{Rw8KWeP2Bu?iBUq6mIXJt8A%n?QZ>rs&W^qNVT11A# z2ElzPcBpArk^_R;4TBRgYa%q;#j)&?KV1oBLWxU(3{u;dt_8Ak>ISkOerUy9YfoFz z(W8fte)So6{oSFj0PF9Mev5MKyFUbuZ({w!Olr3lL3($$6m4yW;uhZm&|*tZOCd^k6U$a|IUi+9F4NLl(^6^!FQ^`PcDahX2P=Iem zS0QlBenM>QBRWY>N?^bgr8aM{sc1lyp{8OW7#|0l$bGB~VZFIzsI_FIwRE_pn5DI3 zs6`ZPM;(4!I@q!lWvH!euyyGW3d}}JDYxUW6ywE1%{J7i04iG%LK~7c)+^``q8QtOX`54(IP^AgM(SFf$1Vh~G|hR|1iMHF*u?Yg6?$4J%?g8z1`{9d5AOfNz0phbsXUaB!LH zi6|1OEu18tm~SM(su|Frafj?MC!E1Dz$g?n&R{lpIyYoHXwEaTdB?9Hy73WW*-XhF z#049L8w4u=w^?HFAC$XU^_zG*j3L3%tgf($l>;~nZb}Cg%u(k4G_!|u8i31=XpWLR zT23Zd4O&Fcxv?XV#(=ep9H%6=Grel2U4-<>kIbSOeW+LvfUoeGIAU_Ge+rM z5!A1}XdFijh-aQZYcPXTG6tFV)t@m@!U0`LPIt0Z3){WPp5)Q4XtpcD1b%jR zR0g%RFupRYVM=dLisYeJ#1$Q-1hY8f45;l+nNYMkvZygTb9{N;ywl%(djt}j`ud9_ z-+p-*D@VUQ&Vi1M?W4FpSH2fPekaeKJ|)EUe~BC6Mvz)~w9jyS4L<(-^S{6N{bT** zcW-N5xV>Z1j^#z$mzQi`QL=N@(vcOVgUd??mMl+KYAh(+eHZ~V*YAM{<%#9nH^EWo-Z)k)hhZrwH+1ygR zrL|;h`_fG<#hV%nHZ|pUK|w=qW3Q%yO^rnS=7u~#d<(rIfO6gzY>6See$mFdC7T=a zv1F-*`p(~4U$C`-J(F1WwUqQW7t>?jEaFd^i>SdNlbZ_%+e-RdO9uo!2U|)8LCn^r zETCuG(th9-*lowh;z5C3C~-2kg`5Rdhk;r!w@vKQ4D9kC0>0S3bX$A*wvMvl_OjtN zE=StSQD0PG&7sz^;nwoumZc~lb!_7>E&vzVRMg*0a1XTLx-i&(^njUHi_$UWjh!E2_( zrbC2Ef)--Fju4@yc-?_yNY`@_Bmcif_OtY5N5;ysDrv4zB;A9Hu`6balR+bDz-Uo$ zsj54yK!A%GU=>#Y4F%!RW)3{S)a8vpLI2_#;p~N+lLd9?bD*n1Al^s2WtD`#o5}6i zJ*&Vr_&MbY6g_(>eLyy6&*Er!MiWB6$EH(Z)(%if@oRx(#g}B|m~xJ$fg*Og0xo~j zxj~hp!;mPa*7l>O!YM9OWN(!5A)u9A;|0icrvT{C+8{XHGB`Nh9SmGC*fcs%+(C=x zx3GuP3z5#AI)Gbrmd3mpP^m_TJJAl#(j@}L3P}rGa&~r9Qv-Ut24&4H0^AAE<3K9$ zO~`VEpjV6zmBDt<^)8%(y4$LS9G)b|WE>fFVqOlM6y&vPK^OyuwJ2VY9oGQLqu_wp z-H7u_KARTgrMg0PPXt7^xq=+!uV6dTkAqv>VFL(`79PHJhjnIODkQKakO65-5go~4 z318tw& z8|Lm@RkmYQ>CV;VJJ(cfUsJJdP37>aih&j7{VU4*mY4S|EA3rg*1c@$md^66%PO`k zuiVsGwz<7zV{6gImZFWVCF`0CQPwvXb~P7nXfEn%D%=2wH{^GL<}si*6=C~Ekh-mO zb6e?#){+e^#i$0Fv*4>H0rZyQ&COhHZ7tc-3=Lkqxv5}tQ{k4TLV$ZyL;mK*qRmZ3 zTd-_|24|<`R>l5?fCw7a<&rMI=DueF5Tn9YU#z;_Fg-Pcmu-%{GwT!Lk6r4OQ; zA4>)VyHUVyV6-2Cns_ZEoxxuszI3pybbzRh$z;J_eAQMq0#dh?f$775HP_3B+RCvP zU>!p?J`RKa*o$WY`h_LHp~RM9puY(g0?3A%E*NPo8fhs6wYN3rZ*Phr8|+>*)R4EY zy?E8qIWARAG&sx-j~Ym(FVZSotW?urx54Bv80`$lwkl9|6yst%B%LP~2^yAQQV1Oo zKhfxLG1+MfghkvVkLecwTDS1!|7&HzODqdf{_A$Jk=tL^E&7#i{`1bH@g7$|)_mSz zDkugnTO6E_TXTmvW?dwxQyFc|cs>AKVHgP~Gy%1-1*mu9y<^O^NP7epGer@|&e1M_ zsg-lqsIUSIc_ihrm)nMqXp~5JkO2wGn!|7c3{;ocZ;6HrF93=dvYG+TbasQM!uuTJ zm`UMGhd_oskYE+qCSVYYl`ad$P~$5*GYE=7H!cp`w)Vjowt~Yk$sESqxtkP|jdZK6lgrRZEveirtsy2r(z0n5-a!gC2t! zoFAPNnWw9%%H_qkIb)d6vv zKh4HLG|ahbVu%QHWJ{3ko@8KJjm^W$&dC%tm@aveBwva%m}bY)o9a#)6Uv^fMzhT} zZ}jGcp7M3q-E>3oqT9as?Bnmg`QpgoFOMGjlDt0h&9S40j(>mTm_YXN<3~@N`2OUH zV}LbCEecgO%6~qdJ#+f(*)tqLgCz-m`plWr|NQx1pTGXpQ0t-{YpS-B+GRVy>$O$e z*3}NJtr=QVJ-Di>Z)Iio%Ie~x>wh3T~oVdb@kSjRht3sIOL)mh%vzO<{gcs)M0mtxDh=At!Ch3i_1H*_rB*j~1=ed)%wrCn`H*SD8-wJzO= z(o(vixp-46P`(spQ>$1umu$pFl%^t43O2Dz6Joq@Lj#n1K7hWZsTc$YzPC1k*QLF! zOR?-0rMGQqUwfG-3_jSl0#d<5aS>E5e6dQY+OJgeo#3)uk;ibfGJHQGk zvvR+{?m#O_**Q`RYC}+izr$pG*-%HtaC^mYTLo$kVcE_VZb9j&JXbm^hdL{VmsJmS zRHFW12dj;AR*s-@OUZC+(Xeo{jI@?)Z!O){T0GJQfnN-o4>d8`WLwkXEwy=Gw=Z6A zvrEjw3E>>$g$Ng+M;j{DWO2}W!r2U*oX}6i)fzdi3=?tC$qVUi;Q)8YNkHETDRX^$ z{LO0GYu#NV`v<;IoRqQ7NL;?3v2O2Ep^tK)B6#g8|y!B?mjcf-o~8&>)$tx33Xr6ZW-^ChdEB!48sX4jymIlsXL$(z(6cjed9s{^+6Mc*vHRCl{73gTFW07D)WDvBwpk9GyI*Vn$N%iZU9=)9r*<3n2 zAUM=6qcvo&-ieJI-hzY2TjT_r%5@Oj!Hs%R6E*`UN)!$gsCejoGwb_cMa+^HJA%a& z{=!iMpwnPLo3jq^?We0+4wz(Wb4qWt18`LeYKBlu*b&Fq!a5~sv?G!QE$j&Ac(Zbq zlyPP;s)ZmH0}i3D!B(@EiTW&oG?O3lIn^G{G>L>zB0pcM$&(@{jkfsGA-&08f4UvJ z`>Cw00ft?J*O0)Xk1=X=g>7OK4D~hV+Q5+^z@f6UESx$$Sq^3x)Q}NcTcq@peCZB% zvID(02-M7rJVZl z>{+n;pFjWn&0k;LvAks0hWefB>$i6`?AX{ivaxA+L(@=K)8P8X{`K`eYioPgHFTq_ zt>3byZu6SDO>1g5t*Y6uqOxm6<@yyBU^I}urnzKYOG#H-+4|1%^&MqvT1(cpVN3Da zrouIi1)w${PExm#$na8>?v}DG&Cu6NdjaM4@}4%Vi1m(gETOm=_YFS_1e!`j*?rSZ_ z`nfG)BfuTQD0vDTliFp2?O3lEY^xZ6b|#UDZ+y#Y?Sj1gSTWRDJ&2F(RoFP(Q8k3p zhL5a+kAq}%r9gQ(;oeaR!!Us3x0emIgZL2dMMG^R!)?E~#hX!zhFbvZ{K1AL19gjf zE9Ul9KD@i5cuYn{T)YW78rU@fK!gY<%`#b?;E@ejv5M4vRt}|MHaLbB&?^FJ$A$u0 z>>O(YO=^THhXe&EHJ{BUi;2EC2bB{A$io)S{-sDxm+W*o?26ODX~t|e$``V>sO+`U09aOombmQ)Ppyut35k;%4un#9@<5irG##DYU0 ztFbgQJ00_r;KnT$*H! z%ZEC+JmL7}3LZG%&YVyj#_0yu8E^t>tIX)lMuR89SZp_^>&1^^$GtF;FGO~$l-qP_ zGe>I>8v(nRzXB?i8Aa%(5CdK$AE)6brnQ*w;+&I21YalGG;r1^dr57F8{jrbK)DYf z=5Z9pP@{2`=+GdIQOyFi?x2Ik;B+Ne75Yq|!2x11Q4RnNltaa%H4yWgTR>znj*;w+ zxvi>)B?DBqH;J>31`|pQOTR) zj%0bF*|I;)3XAGZ^`wqf0CW#@ccwd>BZae+K!)Uwj#@oD@s7C*@1FJct1te1=G4(c z-yAsta3B8e$dT{9JM#VaD2I+8qkH7UiK8b^eg~m_@)Wf8@l!EypJJL3f?LRHO6(ub zoTD}fe&)nK{`JrAKKj%4WyRaq)@&oPo40il)g#IgU60bZWnI(Obq!nB z)OW9K*s`X6)2iA{D?#n54a+OLmRGG`R=KvLVr_f*`u6g59p&pf%h!S9Z6#}3ir2N4 z0N<;zY%g8cQ3e@~uhzFM-O#pl9SL66)mDy=>xKHpMrihpDD7oiIx99&beC=t5Z~BR zvbm*{u9cROO)aHZ2dPuxLSX)o_3vdd6<+bggxAkH$-QPJOCK`wLoOTqfN zQVvq14whhRtPD^=1L#oY*jP2tUV##0H7m76*G5EfV-kQ~?&M7d)c>T5^jXNT2GB05OnwW{1lNS#9S8Q4rUFluhE)d{E^O zmEav%OzBE_>jq?6fLi9J;GB)Jge{!W5d;S=NjIQPgm{Bf^ereL7Zc$#Y(u3Z zSSHlCMTL;3Q<&j;3e+*@S}5KHVRx&-&1CjbMib&IJZ(Id z*zg%f2f`$10Zz~84tayAGN8xictA{(7|9ZEQHX5Ck75??W+2rpFpb?&8PvAAf)>?h zQoUFg!6ZK79)caXx4S@asAdks;YT{hMVF(ShD7H0MmnBuE9X#7f3!%JZ9)r?Q>rK10%>w|6tpt{4drg5&`tyT4LGtEwnCD7ld-SEmkKUJ z;V0U?R$q$Moy-w5V)_E7FHH(%YSC-}fIxr0#gpQ6M;)Fdk?AR23TJ4c3{TQ%=xZ&U z8OoTbL2d^#lxVi*Psaf@AUl+852icOKEmPZwoKUl^pdAKmcRIiKOH^w-H~tpe)QhUyV<%$BK6L`@7RjNgvgyJW$VU0`2Wadw zK=$AM{NrF~m>$F?mU!<$-%Hn$CO**dVPt!HCf&xV$* zqHI~;w0T|Qrqy*DR@JNrua{SX(QDe5u5K?~*;cx`t#obM(lu>Mf$3Pm`kJ=VRV~F> zU*B1=uDyJ1ds$a|8TsB`u^!0os94`o4p?L3hR(_j?G;$!+l{S6c2`UB`sR`@@Vc#R z9c8$1p|qB5ZYjfZQ|r<#tz}!=%ey-&dOFIx+bg=;D|_)VvfkG6 zzP8G~_KH4$xb55$ydLPR#F8?+tqknOcH*@iaHl5($R22~9O$ePh!@|2%h-!VE`v<& z7h?H;6?$NVa)*j;$!hzmaGSFPu)0o%On7_TfH2;Cypt4OCJE?7Qm~D#79|0F)acmGofVIUc{2>mv z?BYy-W*gI!nk-o7=DfXT2S-aXf?G9OWnc(QM}5xcYgaXI6o~N#Qkj|B zA{n9F%?{F5grR;noPNb0 zo8FtogC>DsjSadHP$s4woVt*s)frAl*RvPQg{fc2Hy| zoaNT8x?Ca66;`+}4Gf(j9O#d>1)C|1aA(3&8nDkD|TI1&yx`255bkT@rN^B-DMZ;6YR~&7` z$EYwLH%unX5`J{-!iI=w!SHFjLL#Lir|ZR~;vb23!QUDe;BmS9ZeI{~m$Ts8R7eMQ z%yLqpFf11Az0MNMFo4UP$ec-_fNTKQbv|aXPb)pFDBm%;{67P6FR2NpK)Lrnvv(Cy6;m&Yb07$WuT4^tZpA{O+l(EdyQ6 zgIha?wsa14FB|U0N=HA+rjGv2Shl0|Y-;b`(AvGReQQ^%C@q`THEvu}zhPC~hSiPh zR@SXsQL|=w)#_yxYdS>ftX$PrhO)Y&9A!;s#j5r)Y+u&_zE`g40JSS1%*7V)x{}%) zWN#@2(7V8EZmAGH6M9$Hw=6~JYNb2})}hBYwN-3vuN0+RxWCI#wzQXTX|Djjw{%os zy&FQiqw-t+R=24{8rUZnI7W zwez`}mHnNS1Iw@-1r@MfGq|jFu(OuS<+c6GY6h0q_H|ZaIk1B3{hc+a)7Mee+fmiO zyoMV)=}6&0mRAkpXu@m=uXp9hvZ`%dmZJ=Jlx<&DzPYgw%+u@Q%n1f#yxwS$py^Ot zzNqSn;AJygoRE`7vz;Tk(R8&E*3{SZjl_oAK$!cOREUXK8AbyB8q7|*eMRU3q$^XG zINXXW;tyruHPajIz`fDrG?|?A5}@HvmC8Oqe=r4azR4ovZ3i5^e$KZmgX6@IOMut| zpo8yF(8RIAX}KwWaRhoWT&Unwy>3q!iWOiYR$Kvr9&*j?i?WvwG~rPDkl>LIb^=t2 z;ga%}QF`DeJ@v3&I17LRzTl(+F-&%dr64;rz8G9XE;A#mn0yNcBP=TcigEfz1VceI zo-yqAr((t7WE_s5HlXjvT>zJOVw^nyni}v$y8)74gzLmC6Iv2D7fu?38dh-2fS{rT zT<$0y5$GoNJJl-fC5l)TM zY1qiNg&1}Ztdq9vu*J6`V$#jFh)l~0T(Y$h3uYIW#BWiP#zREG!_o+R6WM61F(fgF z$ATk>>ty>zVdE*_^(Nthe|e;Q&RF8YIFqL*h#$-AkMie$7+(EDZ;C*{uDbX z>`%j2k~a;Y2ZF(9n-+0;k|i;9knBlvdYOe)31|9~M+H;Hx?l!e5jC9Qie|Y&+1`vv z5KXq63!LlryZ-WR;N9ceCuhT7{XF@|&ojUM`=l?<-1^1ojfc*DeEjs`lc!FfJo&ei zCw@Hh{ZD5J?UTSaRQ72m%szAKB({LssDu^BZDwITbCLsUe)!=ZKb`*V&UHf@+Xs7B z_ikO)y><0a&&q+V%X$gx4zbeNw{>Or))n1bmT%p%V)N$Zn>KcC+|aSHt8K&jmJMs0 zHmqx2x4M4a%9?d6tJf|AwX0TjR;}tlsaV}vd9HAKY`qFJC(v8V)<9x+R;_I>U)@So z4#mBuwQOxG)VEOL0JQLNvkw#cx((a8>}oIH&|cZqR?*c~j^&27a;Wc3ZRMNWE4Fl2 zZox`R>6VW2%^ek6LF(nTJ)PCm-R+gVZ51rP@ERL?1#SB}EBcpL_jY2Xx)(6TN?TPg z3hF>Ilj+rc+v<4TGy123I!?t!^Dz+q8X6)3!A&+t;=4T;H*) zt9{po_FWs>_iSw6hhZ(muvV@1ubl~ub|*KA)^ zJF>EBWJTr3^2(9UijmH;p=D*mD=G&&Z~>J=E9zi@x;m>@wpOiM*)nRz`SDq^EEnEt zjiwq+c8gI4FPsca4j37iZDnK|llgJ#1H5T;e48b#P(hp6If+*n?~=u);ROR1*jLH< zd}T&Epm7bF+W~qRG@(1iCUfE&;NEDrfc_TA0bl_T5YaXnnjOd%a@CJ@0F(j~@)oC% zTxbHI8e|{}PK_I|(!6~<2ar)*0|hm}4f8-%3o;Tn^q)X4gB=d1SK)+PekPexeL%CU z206G~_FCBeNJ*|L0eZ}BDylILwM_=20bhrmIOYWBk_Y^vB@kDFy%dOOy0!(!$$ie7 zWwV3zj4o%EtC-AZwjNjuj@A$DGY+7#Uez6Q6>0jb4RpbI$-U96>&vmf2uEev=+{E_>$d` zY;PpX6V3{zkM}2!mIG-@D8rjN-jy=O7tVIb0jC;qj-Kh5ah2nm`yGp$oGXSs+g^$M z`jdan4t#TfRQM{F@WIkDUGU$uoyeo&NF6nZMB|B3vW@_?c6u&j8+x z5@8YXBw#so_dovr;~$^iwsl>@NcZxgp3b4ZRaDtM%Lltx40W#<=v_I`x4N%qWpD4w z{@zvn-79*xF7Mv5tb23kmJKbNyP7wwt>3V=0cHKl+OAbK>jCZ+)oYdk%HTD$cEuX# zZjiczuwL0wj)Il7%WBug>a>>w+)&(*-Voqx+d%3vfO}0_+1mC>tOMLwu4}8nS8H0! z*9!r@zP)OFn<(v7T^-dMI;*=ns<7O+tY*{l+AYg!H!rK%*jcq{S@qTxbz7IC)OW9J z=w4CZv#hRnMMEFT%EsPRO+70bdRI2~t!nC9-O{(Jxqnql|LT_hRZRmc8wbGRHO<@B zw(MBnwxg?kM_22vuC|>U+IM!f>_XYliY?pMw*l6JE9?5#H1(}*>t5T|wX%6_XXC2& z`sJ-PZOzrqjnxf})zu9(W%acsHT4T?>StHi-CJIB$I`l6mp0y9(s)gAtDRqvv{4mc&oOwPc9pDmJiv=2W>SwEiL=Z zEqkSwVQ2Ozy-sg3J5^5@64h+wH0o^aLJiq9XmH`{&_G@T)VIjX8jB>sJ7xzmTtNt7 zXhRELIT1{P7Apj}!7ABhx8@BQtrE7Q^(}_K+x14P#ij-#nJ!;4jtPokM}QJ>btNJhowDWlfn}gPt`JWNN8^Qw7654Fc5@mX)ZsBHGg%*Y3s;L9AvEb*7v=|c z2p1!|Mp2o=niLKp34O9Aapf z;8BM-z?CMD!$gH+geRiA3C$5c7KWmO+PE-WD(;l#RttzrrM+~@v1SC_^n&2L3_Kk0 znw||@Ew-bkxK6ewM0^gOEkru5kn5@+K<5wV!j%L-ZTw!EE3CRBoF|BL%yZ-sPK|b+ z&Kb<4OWMo+Mxz$iYf-x&*o_$6Nk(@#Q4K<6J3>&|;Y2AAb6Xo+(L^PfAO#p$?V^Zw zh@`3Xgs2e<1UUXLeJQ99S)HiT*{w!L!x%^rc21J-K7c-oIu<&_BX%#8b-E{cv;xVm zhV0PMfix+Y&apGNXtX2n5fDf5rK!P8Pb6Cl(nI12rmHxVJ6Q>4x+6JeIbv`IjaFZR z*^?+o;%$DNPR~v!UA#TciYFCLO`mY#6`7A#__sdpdF}JSo8M-BarWwO{yFE+-{*b( zkDI?ZbJG_mHyl25`1F|{&z%0}nNvTUI&t#!Nsg=e;VhIknEk`qGiT18K6UEE-+ub> z!`ENf*3+?TWc{weHG6h!*|UAquI-z5Zr`+HxNF-`*T_)UQ2*+ofi*+DD~Gl&AK2On z>D{xrW6Q?2%^O;_Y-rxJL1^tYjT=@stXoyLc4h6_6;*2i?&Z~MxU3S&x@yfbtkrI=mT-~&FT}$uUmVxzcLtX77T^-vuF59u8WA}#6 zog1Ni+jg#R+0oU!XJhN`4J`*Yv>s$>Ke(ag$qmhqZ)!WZrSss{j(r>3c6PN7tZm!8 zvT4nVrsmFuy4HrWy4r=6<##VFzrLvYq6K9$7gkT0TQO=*WzO8X^f`^`bDN@bntgLR zv_)&3d0o!JO_qW!=Hh-+*$!jn9)0EBgz{bS<@#7cNrR0FFzx;04AAHkOh$_h09Cyaw?D~b<(z@k*FdnHD~wIHt5(ScYBL-VOAt-* zdVEPPZ&Yyy=~}UC5W+D(37BiLDSCq~5X}Nou`ga!qggVVYzBjc2;*EW0k9iyDQB3Z zQ-yVKSjt<4>;qYFa2OJ>0}9b0CjGNGR56Y*s?o3Nb7~>Y7xjnI=$mFIDv3$;Ei^JH z35!DSJiXf#<8E)%?M(uwa4vve_)p0-mn&p*sKk~#2!x^CjkDuAVNvicrMIXbqc--1 zA)&K{!82%l(61t;(eCumMAMNL`ymzKAqc;*2r-!S;j;)=mqmZq9Lzy$C_! z-4=MI;|K&K93|m8=N)MBX4%h=#a|Q7&jF93Ez$^i&SjV#xrxTsY z6!MhqxC|k^spWAOwDhP0lcNQhEdc*Nc$nA@Bh6g6su}-g+yV&?1I8}g7~gSWqOk>o z2m2kw|0h~VSUTykVQv82J}$%Mi|TBF3=#DZt#G9g5LwYS_aD@%-h(Qg- zo3#YVhpzy1NN>Fw1d9_CREU7c0KLhR1XXV0v;$nHBU_6Yl%UC*ghQb+)2>EyoKVLi z9jg`k+Q+c#*o=;{7&RmOA?eNlX9ZLIsj9%V3j#cp;SOheLYXQ6?N3(&>GQGdw=-rTd%zR&Vi4=SoznFAAarqYhHW*g1>w|^S$rS|Lp9|hkktY@ZU-g z{m_2+hpk6{eC5~=U!FSsx3j1J{R6$&g4!ZZ8#Mp%hohgrb8ukA&f%^-!(F?;>uuom zmXVPS!z1grliKTt2G))Ytsfa!H!`qxxPSHFz}msyHT_$c_ib6;+r6T1>x%Bp%eHRn z+`N(Al8x(HLGZ41E$i1duV3BRwYs5;p6=T9Ynr;&Hg8zd48nG;!B@>)t6RF(v}{<@ z#=X`yZCTf{b$wfRS6ko4_C74vw+^mv8C=&mu&!~it7Uk7^T>vlp$#p=8(N1qwhni- zjI3|QvVVPJ-`d8WwT)X>Hv-%nRyD3&*08L-zNNLUzOlBtp}wTPuAsJNVO7<<>bki# z4YO;TW;e9oTi1SDUB}JU9oN)!UQxCD!pha>Rj-*@(>0}L!`QN}jIvG9(#?U=t)9{z zskBcj?zb28nDcuLdA;$AdvpuBbqjiR^SgC(H|ZYf(mk?X_sBZk1FLlptctt0U3Yhb z?w+QE``hF0X^y+2Hvaa?_}j`7ZYeR`RA9Veq50~EZI|6EU2=!}qTBqJ+!ndy#*9m^ zAAk9E(=NT@;>#|%=E_TNyynu|ufFK+YcF{4hV$oMH?!!L8I#B7=w-LV7cx4v1hZ9d zl?+Z*?||lYm`ygl-efY_O=er7-r^0Uhyj5VP$&Q>s13SynyqP?aUExMEBTw*>3qmo7 z@Ep6r0su~8A_l1M-bmF|=KDDIcA+lXT@YLlF(%CHzj_btp0o3qOJRjajOj+|baXQ*I z>R-;0ruxhl2X?{Z!s+k~v17~#ad)9}u?sY^=r(X$oeGOMKCVP4ZaS=4flov1C2kYu z!Df>gor!9~%s_xUVUlAuLl)B(1Kjx4EHo1I-oV0%N!Ib)c$;i$z)s)?Wj1rKKS_Lx z<{Hi};~HY_GS~y24pxLGrE3U35S|a73@ilC$lSl2cLFvKRtgG0^M+*@JWp6><+SDD zL?sZf1b|w)q#={tQD|ff!}ucc4sX2Oo#^l;SltFWlpy&*VE|h1O0q*EdmzT?`YjofBycvH;*5G^ThE#pE&lXgpMC$-=?_ky{P5(-k4~KY;P{D;Pn`Vh z_{p!19sB0g@uSDS|LoA=S3db-+k2muzwzNEuYH{L)}d)%{_~on|0@3O9~DRcIq%!Q zE&k@m^+$hv=k!m1|KW$9e?0pWT_j93^23>vZ~yMegM0c99vFJ;vF!&BZrgug+y4FA z_wO6ow{LjgfsuWChxhLv5gT{x-#5H_fB)`1eS7!z@7dY29eR9tBXGZCXw8nn)jNmQ z?HX9Kqkq-zfi-*kR_*RxvA1u<{+^CKn_KtvwC(BZ*w@>+zh@bid%D|pZfYD}S2wVx zzIT0n_uAS`t7{;uJ6o$7TPkXsDl406N?RJ1v@|VjX`a*2^k7Z%oz<;3R<+(x)p1S5 z^2^JXT~xVxR^__Ml^aJ_ZO*9Nl2X&`->55AxUU%`h+b~%owm@E#n#hIu#sjd)5$B6J@JLH(;)C|IHmxcYJhM?WrvEl7cV)_VsRP_R+HIbagfo_hD3=*zGH;P^NxeXlr(NC1F>E1@G>s7@FL&<%J32SFti;F2B^52FuBRY%N7P{ZQE3X(E4 z6+JoPe)(-|P8`{dd%>0900!dkOO6heVX!)31v?2fs}@$0L8 zoynbKaD|MX2-s>1rdzxzu@R4Y4IB?9Dt?n1Hb?=z6i9G*u}qYFP|apfs@a=r1&A37 z2vUdemC?f;jY?QA2ldW?K?(xgW^XbiHfJyp6QzUBR(G-#$dKrdPBp6$$a!o8sqLY3 zt2@fEk-x3V*>1KOjklVEBYV%-Jf4xHMp_w@jVBA`{Glt z|N7;3-u%rcAHDYFSFeBj?dylX{mYTVZyh=M&e8AQJ@VZ#D9ztJZB^y>ip4j&=Vps{R5xjw5^jhn3i}n3>TsvtwqEEoL6jj7A!1W+V-1 zG)x*EG21fRAt!d?;0BknSh593 z_?T^M)HpJv9vM-NOen^ux(3JE`^Q@P$N1h!j%%XcJzeRZDzcC7b?)ERw||4}&`Rs! zh2|sk%qPO6i8ZoeA4U#;D*!t7UW^efl;6)F7kJN@#-v-XH*6?V=klmzDsgA3Xs_VB|Ccu@u1 zghFm&Av>k0DYKZBR#cx>T$ftblv2q~DXUK_tjZ~=%-p>ns1Dj5|O4R;g`iAshfrNf=2BV85airNWf-E?omejV$G ziT{YT^>J&tndTx`#5zNNlEHWlOI5Yz7JTW;3kOIGe40r-$g>`TTLeED-Tn+_u zDUu7>7>SKQCm}L2ky(jB!2m~}-o$pAWJ1A{Xw((NAfzj55A+ES_l;7LXr&ke4J5*C zfRAyJ6pBfWi%*9z2bcgLU?ln~)9#ihBz0 zg~UF+AHf_&K8BI@Sf`wsx5wZf`7^KjqD+2sjWi!0m4@nyPo{^G=*cOXHN=E3kk9{& z?iX?Wz=CL1N$i=JuU$Z{Pm**3B<( zUjOX+wJ)z-|Kb|pe)*H@*U#U&bM@}s8@FyYAq z=khPY%l~P={EOo9kLIiQk6pX}w_kpJ`HN2sPrcIf%pcpI`eWL7V>(!vX7XlqG&F=f%Y}0cO=$t9;B)27BDE>v2EvF+agRKi;$-YuK;B<5$_| zSD^OWt@PW`;kT9Vw~^zwuEB3jjo<1LzvTsf%l7)MES$ZzG+<*%@VbJ~4Ta%b%cAyF z#g){jRB_U)*?EoJ6&&FzVb^+ze2YxEL!;emGM8EHl@3qUz+m;zV8ifG^Y|EVa-w

btYB4rn_F#)!5U~)WzX;G`4m&NhEc0NwrE; zq7xTe#YHYr;efbcSiF0(yI@~;;dJNTgIxs&y9y6=79Hv?KGa=!u(NQcvuJ-Ob`_0F ziblo7!;<0wQPE&WvA3hd+fnLiFM)a6OR?TBE*t8q8j;nE%4;Wj8uqKX2lf0T7Qw@| z_Q#!FC%w`q2c^%C$%oZk|2ZLOMFDey=L7`#2M}k$XqqTZ52HiiFd^oEkU0UtG?jwl zvxEbBeReR790mn3Baopn5YD~`34}JqI*9BHvZ>=t^A;Fn$6yP6Cm}GLnPWf=l2Onx zr9{>#wjfDQ97y|K~v^)th!Vsa2BIc2? zzQIY97UC-=E(IC-0`Vv?5>NrcqCsTf2J#k(Q69oHqkI`ek^^HdGcGosh6F(eA_#q) zEP=iPOtkgk5)K2df}V5-Td%gkz&QDv^-+a4Hmz@b!%txlM*kj-dg)I64K~1Jk#_3iykZNDvnfZbDzj z!qt-h@C{?aU!q_X4WrCSTvOQ+m{ZU{6^U+&$x!$UMpcCWCB~zpa2MD9VwT1z9~i zDg}%Vh)SCsmgpaw5}24BnlRTtJjp*QWmZIze|X{?SajN)*t7?NW9TDkkk#SIfl+Be z@mV3sP~SNa=@8wZb}--`pB;ehNxAgUV@x_drkFA>G-+;la$Y1o$Cw$KL{qKlWlu5b zG{Bg-n7$d7O5ZmCuj8{9#%C=`$y^+lHa|Ej^`V`$4?lBkSy|QcH7lMP6u9S^{w0A+`9SQ&70@xi|aJk z@4E}XnzZe|+8aw>Pc-e%t>3yPgj}u)p)3=e-XH-hS8q*T0$n^k>zJFRPw?L3Z*9(TRrz z2WR*rgIuS*!K`QN)hvaG+a+jfuV)J?+3dm=_MSG*9uap>chfd4Yomp;(c8RXLa_0W zaMKC#)|0Z`r+fCE(H1|YD?6nvKdG*GxToxds^YM+;()Spzr1pvv|?IXG0|Ny-d#T0 zRW{ODGAJ&Da31O`9~74lN-72(lrj@{upx|&HbJ0qD zff0%(hejv<_I)fUBYMh_8a6P^OvEP2Q{rgoufV`?+8fM7!x`xfxT9VeywVLA%T>7bx}1&AYeh{E_@YsEMZl!5W4)V)Af z*d7y`nv|R!7D)pG*n&EzczQ?#PL12a_>u&QZvQ_ijmjiyljoo_QiYJ)L$QNGA}D|6 z0av<}6qrtpiKf|*@Cvw082%+fQ5ft+&C{ew>K5St3U!NOP>%tZNmIX>$(Jip37 z%%IqGU>#_VOvsJ`sVTrhkE+uPR8!{x;xXy;NP0|4UR2tAIx1s9Le`SR%q3WcM5Zp= zxTTE8+f&u(Qm{V%*Gpf$|Cg^n`13bpZ+!R3-@pCzZ{L3Wmv29O!04f_tow1&)&Ir?#>Tq?|y&&`|oevyLaR6tO6h|oU9(Fh{sp3dJ?$Zd?ZL&Zp#?3`d-w@^xT$+N*(HL!%JxO| zoy%C#m0Z~>o@`TF&knJAcel1s+FK-7m#Ym`8dJ5YuddI*_4Kz4kF-xtN@ixdj~-Dx z{%G%$C$(oz>7F}dd-)~L?_ckK zpMQPm^Dk#U{&e!44@Up>?(jd~9{S7QT(7@wdiHtKnP(M`KGJ>Uuy}H!eRzm(w{lFq zY`v1Lk+PK?91({tsA+Aj6!MG3&3l!+0&UA)J%5+AWtUU1eV}#6m?(c=XTd>f;SpKk z!#$;s_g0?L)jVaadB)QCjD>y1!hYJyJ>ADW)z|!FANO$+>k$L%gs$nBrs0UD{)ndT zkgE2es_uZQet%EhbWhE+vSy#Ee!8cAN?A9lsGCsKjLWOWWYwdP&$61~?y8~gs)5cb zklHP-a7!vYV7H{ogDqWEgGi>Rn^ZOK*K!UTnh%*;j`j&pI7E-QIv;g)LTf)aB(;jF z{rqM82h z8ZA9$l9m@4gEPh?CS|3h%qviAPh9V?sk{ z)&zwb-~*UmKa(Mig3^{SdMq9n?o-py&XJMy%+7DZ5G4oWa0x_GMshL|7)DRu(7Zqz z6^y}E#1N#AIdPfcEY?wYto!_2Ff+LV8z~tfk{K`kUufHxC(eRfMu$+~f~FPvP6sAZ zO)_^7z6UkK3~9g@(hA*iCa8_ehreNb54i!91pgJ-i+Z35luXUwa8mKq$v~07WeU6F zbX3*M&k&RoD-5z3X9FUGvnVYMx>6;ev=l8NXNFAZikR|KKLb}0fvyA92@E%gYL%H? zgZ~hkYlz~-WrTy{xchPR&T&5)T8vBrWTAg)XfY}k5_?um>MR;L%$O6IOg|%%{UZ`* zMFM=A*xT{q7rQKmN!0FW$ZI`P-Mi ze3!9zE`Rmj)o(t!`t2uIzx({+xlb>C`~Jl*|9$q0f1my2uiw7+$1nc&>?e@tFHQXO zjPvCqiqjL4N5{Jl955VuYU+_czHs{QZ@loqJ8yjZ?R!^mes%Bu`TM_I`RV`e{PgP& zzx?;!Prux`_rv+ycVE1GUGd0aUay+ptL`*ebp3;t(J}AgnX!`(?|<>kBY%ATD#tq9_WMiMU%zzY)eBc&{O;1z zUtf6Q^Y0%0=&J+oelq^g_ua4kN%`o>_JhY-4;&Hf+t=uE*P4wDCVit;StIYL?&8&T zu$$WIo7jboHM`i=Te+2M+sjvV*Q_=+ZE~?T4skb3w{AWn*>PHt|D3w`8AH|6`s!y5 zb+SdA{O?b-D{)7|Dj?;G0lUR4O zKWgPaY~ep*;h!+`kDK^Mjoc%8_7MZ;kdAXegJttU9p|8ya{$2AvS-vy`+6IvRSi?h z`f+*fsJwPWRz28N=>e%l6)vAiDqZ4Ax43ekt7fpfW>{7;(c3VsVI2mnt!>9_!ee&H zaaZ?om-vLc^MI}6QEyjg;~qahzX$yT=FAEV3JN1Z9S}Xx1$nJiq}EGeHTo{MbgVjftJCRI+8B|tsgAY_H3d|n4NOzM?+*aRiVt%*Su zL9s$yN5sd{E3;{Q5E3`H_({3x%mqlIk$z79K&}6s+T}k&~cN zM`o&}ZvZf!dOvWhbYFb&7NR!kTzW$QsLe1Pry%$;$Y#0%B(70o_;(_2#C#|j=Y^oA zM}+AAiivJBHHl?J6cdesUnH-FG^mYaq{M$kOdNer16rGjXwf%%Lg-5lsgd~ipwL-T zU|6i*tk5_h8)%*tO7V>VibUrGCFjloi|NH9^s*5eP7F)*k4^=<=fuz(od9^nTzXeud}a*2t8Za^`uzCR`AJ!elX8|MW-JViOkcOBnk^Qt+Pd@5 znDx8Q{|;q+_R}}N`|!`_KK|SJ&;NDdi?=U)_3njlKDhYphnK$l@Y1*MU;6f=D`!8w zcK)+#=V*EL!k5=z7r(rE;fpJ<^Iu#(|M{hF-oNnWzrOkKkDtHw(kE{|`R;26|NhFs zKfQe5^_LI*?&V{@d;QT@-Z=C7f4=_5_y7L)uRnk1!gzxmd+oBzCe^UaIbUj6Rk%U_>8^U3E=zW4Fbf4sf#&A;vc^BYsY|HIHr zFMFSR&ho@b_2I+4hiBx|V;uwTW~-iKP_eYqdU`@}KAfiv>^gwLAeR+uKgrg|H_b9Zxz%r`+PFy`85$lGEO<)1J3q`DNlRDfNr&WdhxjqO@DW?vqqg>kt*r!Z6Yq$z`H+EoSl@gIywM`hRY0aRty1%QkzpKhAsdRK!IlF7@omG8Z)qS1SR!NmfTwxGb_6jSM z!b)jtg`}-o+*aP+Ufm|F6G~V@X>(I2r?!Jr+RiBuwYJ)sev{x%^G>xB5(vxCsip>5IE_Ge-*kn>Dr zJj6Gvk6JzjSSaWTG(c3Md1DK8x1oGvz(HZqR_GSFn^%tg`|7Z6Mwry)dUIF7_4?foqXfGte_ z0L3F`K(iDQaDn&kkClfTNu(uCI&GmL}Ho; z%}kP`*&u*8VJAZcTRkE5Iske5tNu6oSf?)lQBCA`Z~=&DtUH963w}0rutFrJ1&!E??F~a zrv^kOGj9P;fr1W;%?ON04vb0(pifoC1x2TX#-;_+YYFL%f^$M*0%KCb>BXuG!;|tt zlXGLU7pE^+owi_gV#cC~_^jyU+_?04QAycxsd=$jPo0-OZ_V;$>*l7U1qUWIc8J$k z^Jiu3+&6AM_r*WH`}CjZKYruf2fsi2!Jp55@{bFj{qw@7|2Y5Y-!6Rf;f1rGUq1WE zZck|l0Ti4Ftx_;r#jSIJLT)27j;!P~C zpS^kI>+2UjyL|S;i(kKe;q$+K^TF$%{_ENI-gx+*FYo`y8Sh`7^1S}+*ek!AdHpZX z|K)>!{q?J_-#T~w!z*_`zj^=Ldp}?L`9Ifx{?Cn{f4chP{fl>g`0~cB&+q>5){Q%V zx^(sRug|^k$(N_z`{?MK|CoI3^^xaaa6JCF>BP~_vBBm(6UV4&HuN_3bk)n->!mGC z;>M=d@&;~UedCV$x^1kQP5i1gqRQp6x>b7C8dvk$Vg9=P!YxN7J5I{;&!`HY?I}9b zTl|c+^aXvz^TwLzEsf7vnx3&VK5cGz+QK?x;XG~SK4syavT#me#nyVNul1A_TqY<# z3E^xPo_4mMc8N|of#!}=u8ya?lBfH-U{86#=+3A5yPqDAJw?`adZ7EMLHVhE=~HCg zPkFnsJmu{=<>@}{m7Vm8A8~-!!pH1T+^r`pyyIrxF^k}^nSaE{I|5|un-A!@Gdj++ znmyUuG^wf|Q`HVBYX;;sZfTWWTwxTJs|2MY)*fEXj+)X(azhP&Gq(ZN+^$zex##_fHh2#6W_8pW=Om>csbqx+^r}vc#S{|J3 zPl1s+Apt>QKn$aj2-!jOeyGr(5PGBq8=;ZWXcLpO(O_oz2a`-@o+k!w7#$rp2Z=*z z5*W<`nG;N^FfsuO8Y$<@2_k(BNf;b~pGXgZ85f_Hkdz4yg4gj-PmG|8j7&^Q%>nY_ z6VjQv6Y2CoIRsr~TzYz5Vsa*$bWB1D)GjzhgI6RNlj9Pg{-S7ORDyp%II=>sCuv5{ z@)7l*=%LYIkl~SV51xDnKF)$l$QgN33>_(%r%~ux7W6JI1BJ zJJQHxXcS5HaAt-z6S~2HzAgxr78V(gqWU;ag``d!ib~T$=)6qd1wI3%rDK_SCdix# z6T$P*tFLI%NGv^<4~vRRjZMl5rN=%Yw38CjbNxc%Gl{m5NdYlwb7IoM)8_lr1C7an z@fmaCAhGEsA+w^B{i9Q6(+dex{pmHbWH=-^HXYK~KO%8fNNg~Doh&t&Vks#h%%~&1 zc{VIIC^{MI^i~k)@d$d!H@!m^owb;>Smw*<(dqMJG8QJyU6Hx*Aqz4-O@OJ83nWPf+l zhwSSY$ZlM?b@LM0Ei5nIx^a;=p0>3-WfQ9nF%Dch2TQ-6MPT{L8zfJA#XG=idF;tf#DPb2@GR~`)JS~*)sZ? z&f?2CkQkbrnx01tWi%ZrTt-4NFH}lOOvlcM+OcjU}WpTJLw!;&MRCp;+} z#Dr^o0K`B$zZb&L5D7@{(_C_jKlo&CJgN&djME`8X;LPFfzA!nFG24inVw^W_+@Cz z%uOWEL8oJ0&y8xqjlf=9OB55!#s%Uh=*cjV`UIrPneU=8+5Q$tVH^Ne4lWAG=%iE? zs2tyv7-s4;Gkb)jF{9#fI7P;oxj>B4kHJxJhxGYoIwL)5M4cfV!c3O;)jaZN{;4QJ z%>>rTYyL)UMtW17;3pHj#u8G1dCOQ*1bxyog}!tgmlm6t6_=8mkTK6MFfKD7A_;V! zO^-Wfkje(BqY?w6l4+`SR9aAMMrcwtJthOK9hDjwmM{mNGb$yFKAn&jo|ru=Ebf7z z$cRLGTN4}rBz9N~eQ(!4G{HYKE;1>HKI9me5uKD95t|ttnKCClAuu{6JT^TlF&EU1 zO3sZ>UzC)+EIDsw>f9BHS&QQ{X^IFvlAb&_HgjP@QtrG>+tQvp=J(|BfLEVQe(mY@ z$Ik4kSNA#{Z@uxvzyJQ?mmmM-!q@L#{_exe-~993$A3Qi(HrL>v_EGeB(N{vz5MOR zm(PBB<@}dG_O;93Ub}qu`jxZSub#g_IKFVhM{NQ(U`?NeynX8m+3l-$$gbSEefiFv zt9S2QzjycQZ+832y<3;=Tt9pJ%2&58escZ0_pg5Wugjmjaq<0EzkBPRz?MYG1K8z2fA&>}Yz)$$rVneZj_l!P)$RoBy1n`8j*@v(Dx-cJ4EF9_);bcgEgw z#?C~R?QN%Rf-}zcGj0*=S$D@7SBG!?X?Mp{*zOUX@kpL_i=Xv&p7C}47 z)85Y0UJ1584RCwA&h*Ppd%90C39w{L{G?j~d&1rMghz7HC3?amhO&MV2M%<@p6HjH z?3X;^ksNY}#*M9ZC0pNB+sQ9!W$k6x?yf4`Tv)PkPx;o}6+3p;?A^(#C=fQ6NZPA= z6m>dHok3e~Hk252YrDJWb6XP2t7EtA4qd+XfxLx&Svh{`X?{uZevu)5q5gis5BP;W z@L+U6Y)Z`H#hFE$7Y01|pr4=L1Aere{b1m%2ZJ7bFktqqz}d3`9-K92wto;9I%iHW znpq%LnAszMIM_-(U-}jSJ>`1qOxs2LuO)(i9O0Lv(&|AXF9LOMwo0eNQ|v4T()s z8sMflGCf2?aT4YyWj-gEBsRM0F-fEuA<{#lL&8A;s6UD`5XB%EnW!;nPGgDmDk!1` zxSX@#q0HQ6u}PVs6#GsE&5=J^I1T}teVAaLv!H-Xa6~M43eYKTr2?#I17&fC6SD( zIv^C46Q7jngBmDLekFnd93!Q{XxhjGE^ya^f+FDOPypt2-ppJ{a)&f^(g#8OqzOWE zLL#G*m~4Ha5++80s$k+IWXLd*$`A4e2UFMw2Lh?#Owa>2mwEV}Dw#?}D^a-1s4;Y* zXh7mOp-pE*Zh$-bH`EacqbIX)r6_7h2>z+a|3Lwe(_(4>*N*=IDk{@O2u9xmE+_W4 zryoNi6C&f&q7pL0V(0^;^zHfh^eCJ$A>D6wM52F0azK2>gOQ00vUB}oQUepRpt$Em zqy*Cx!1Un6tRP75h~&V??4Y|Hk<*|9#=>cP@YP?v-!fyL$GcE9XDEcJa%bm%hCI?FU!C{(!>S zSH8V*?c8-j_QmVh&)vLn{^pHKw{BcwmRD}wyn2(qesJ~9Eyn1}HP`OmxpwdFjqmT? z_<@$!zrS=S8rea_z&mbd*$5UPyW?Y z`+Hl}pIi-p^fdjUpZA9W-s}C%uk`a?^73DF@m_H9p0xwVJQ(!yvsl^%&p8CxNZW0^ z=NzqPTy4)d1uXp!rFU=n+@P z3A^ZUU+X@LV9dya^=o-<6~`!V(nuTRl3IzVR@hO`ZLe<-HdG24%37PsI+{yF{L;?0 z5=mQ0cSotBtD;v?p;ngl$jjx@La}HEzj-68Zb|W;x!blRu2>$Fp7~&W?1M3(b0PyF zq>@sivvX4xE}6Uhp=BGlZ7wP*YN)B_vYR`_UD_VaK%b+rbg%!c*|VW}37Vn7K@q@8 zKrl2f1TVIP1VKAf9D^7QXac^o=LDh25yTnoOxntaY&t50a7OWv$iTpGv_M8dLj%$h zN(zT#V^DAyJi-5)c7m3S^neaUS^`4n1dz%`M;on|fJ@JyCxrXL&@}%9dN!6`mc+aW zDLEx4DJ6$`!4U~i+40FaQE}-BDcQ+sc_26v&`U)k;$oR6l>tg0#gH@PA$|g6$djnS zykDDns|F2ikt(F2GvJjbpFrP1kP?*`xJT2=Ok#o=ngdT@2g4fl>tn$|0u!!?x*(*i zAu?2ehFLDM-XAdW+PuTlbkN$E4geaH}3ioL`pX66RUKzTBANGJi=8bOZ~ zQhbI&^Q8Jwb#R2JPjnqXG+$SMDH17VoYD8B4^T@U0@ujsT;J6(>YkZ;K}w&(-xL@@ zMbQ9qB^uSx>-~|)E8mm>5Q&tP606l?{*}Lf_`!FhN1r+I-0zQ{e&W!p&mDg4%+Xh0IPtrej=%iM@t1yg z=+TEq4^H*ZjP*~A^iK?V#|HKvm^}H|;pd)u_>I?}d+#5wz5V73AHMy@)k|Mpzf5tG z>sP+JcJ1u->m;|KwQt*xkD~!0vnWA@-X;+`Hwo z``_QZe-C#3{=FMm|DJx{`0@Vt*T4ANpDo3&I2&K`@_y&$zu;XU7wcj+1ub6OOhgox&#=JLznH!XbRpB{~WD?Cm-| z(Dmd%=OZ4`QD?`DwSB@M=+`vcWVL!pmAth=++5tkDdh4>*}}SJSzEKJvq{y(>g}pk zcGjq6H5x^wio|lgQCqF)sqB$g^++pZqQZ8;E-rglW6idT!p+5dHy7^OQm|ut(eB+P z1;u40HIQ16Qc(kYHOgdiKIjs>Rh9x1%`wN28QA%+8A^ecnt%o(R9%~ z`~wKzpfil2Ej4}s*Pjqivr52XVtQZ*$V4oMXQ^!9F z9R(ViqX$obA*>U)839W{iAW~g!Eg`F$&feDv0IgpD* zdU61ar=hz*k?VNmjFQuV%(Tu>_%kp)E;TkWD=acOI6OWwJ~cKuJ0>YBG6AAHBRn=0 zDm#fjgBBbMUeAe0d@v;Lfv|)*AbL!CU~HzpZ%$rBQeaqI0O~Y6HXt-+PEaI$6el)~ z#u(`%J@kpmVEO=M8jUo@rDIokLUv?)PIz1fARZW*6cCn(EkThK4~eAcc}hflR$S_Q zpgDd1>V%AiaaoH}=dF&)H_pLuxtxs%Vo^N)Xi^XVs7FTHc|+dsVj@6&&H z{n+nboId&Z^s(bJCypI|^!Tv@Q-`NU28L}qhxN>hPu;ls?X|0CZ(RHC_Vu&3Z(O{6 zlZ;{`Sl+yJ^X8=+U^lY@1F}hF--gP*4sbI;60rLQ?EAYn8Fu@?O$5LHJ?u7?Ki#|e z%YXiJ?Y$RXx0b)s-}drg`|k#XFZZ|q&fESwB67zIWa1aRWY2p6Xe>Km&v`nYakoG3 zl|1JKqlwhd^h?O_(*r=aQ>??){*<%*G_cFqDM$M$hwuqoD?t3Xt@V_v{j|INDNp-T z-j35y%3jfvUeQUf_;I)B5oh~xTiYQEf1iOjrr~&%jV?u_MafciHi+A6ngtaNyviDG zRVllokX@0_s@TJ?D-g1(dOGV38m`mHA0BGB(xP^O6?gsj=sYi;vYbSW!7mWASe`EMxPf) zAw7^idrlyPIisD!&iNmf3R;R8HKHx$$an=G(Ji1Wu@6^B)zE( zlUO7DPCTVIysX=5 zUXi{RF;gr8;J|^*>}KCI?PT}~M#>Q~uooEeoeR`};U|G3oSs<0dBGz<3N#4-L74tN zoDeQ2lHeX0$PB5`Gbs_VxF`~{VbRP3{qeX2I2g!4fCd|ZHsT%Q6?_+q%mF@zXcU6* zVUYy1<(s?xo5m#AF;0L86TTXJSh?a|GmAps&ax<^d5 zgjc#QCV#pjdOIUMgoWzDfpj~VJ`DkvdEyjV;l9w#f*)d>J!*h1mi`l%qK1=8Ku-l( zp=NxCP#*==f?E?#UsD64}=;WxxOjt}(Hq98B13-ty`9~%N#ijd4Bs@s# z$+PG^Q1QW0L~8V*=zozyJXBfGCissJMp5X)Wl2!b0TD?IsiB%FFhZf~hy?n8CVobx zQvPA_;jw8E30YCexq-+tBrZHYlcr#2ElSQ?nVz>gIcFI~MRHf9&Rdm~w=!w&^2Dqq zAa&NfRq1)FG8U{(&RCqdY2&dMUjOdu-S@w_^3k~)U!1@5$#=Kj{`~4+-}&;n-~V&y z*kdhvW39BiR^Hj9Q3y;L>5$WWU~KToqlaF4_K83L`P7?#dGhc7`2D9}zw-Y3e|hKM zU!K2s`R?5dH?N<&aRqk%+Jy_(FI>8Q>GF+B*TCo-mu}y@L?P_km+#)ba`)C%Lbh+o zfSagI$OgEXAjv&Yo7nxs|1*I5E`j?$zy9*&^FuE>8ebj|y)+m=y4s&{3!iefJ?#`eO*j^ua<?FDo=n`_*}?A; z@x{XCRyM!6zO|Xv#%XNlHgxki@)n-5RiJ4T>e|J|PMJlfva5_vt<__6_M1Hewt)fr z@Q{0az&$bOnI7ziI^O4TPr=;oDVJy3?cL{Fdb~4aNB}f@$@=>bc-;H3;_)7E`xT~iYy2Zb%I4?I8x0b(>uIuWUF65R|X ziJR0=$!++a4yTWY`Gg*YHDZzyQ*#qia}rXrGtm~(<|ZU($0dT@ndotYEU9U8lTvb# z6^M|KmtSeg#ULnT!z;N0UsLXbG_fiNPr*QVbNL{ArQQR~iVu%)lMPYbK1q zya0r`a0=ElyJ&a~*uq}lsTq93h0xO?*hrPYuoW&47ed4g^UYKt2NNEVfa@i1;fug9 zMPhQJ&=8@J=}b_WaXKbFToLMl?i$UNrjb${NLNa+7bXhNjF-kIW<=4;vPs<|E96Pn zODsmVlqcOX@-9@vC?q49nb|DNP%w&trLP*PTF4v4!g11dF~br}8GI2ZxDzS{lNjEJ z9^fP{N6@zvd__gg;1)0&(M3SlhXx*lk!MU&cq~2c7#W`)9+MKEk`oQx9g`Xcl}(Y2 zs1*9dWOTBBWa8|w_<(Tcv+%(*K8}CTU}ns8P9RAPE-LS|HQ zP8h{T=qvG*VRRbvZQw*mZ*UwgApo8rBsQ30Dams};sU}F=uJ;KOB3g=NXuQBI(KDC z?((#`E7Rw#PMNnddG7M~^aUwdOEYp;BxNp1%vq9}wJiFfwFh5&{o<{kKKl0Br{{0N zJ~?~i^9#4Xx_s~J%lAGzfA8ftK0kc&4?{C&tb<3JdyKiI+at?1_;ptMsrj=z8$;VF zBRg2jZI+UQGv?R+bm;H@e(}>U|9Sq(7k7R*fB!$%e*W)`pa1Xb{ri{h-o9|>*0;B= zUbuDb#%&5`(>HwYT)%VY+V^*E+`W4XD|hcgYlGTX@7=!o{hjNuAE32qc?Y7rpJzy2+k#wLa}?r8tIDbjI27l#^o0r|m zm++KJc-q}|+SPi>(T0^%E&(9^groHdd+VcpEypbUW0sb~rk4E%-l&G{RMzObD&)fQ zc3x>yeApP|mG=UPpCn}uUB zHfR;B?l!iF*VtTJUtiW(Q^Kh(=2sQAp z6l#-FV^Qg>8k0rWXVE)sCa=@j@3ag$`-YshQKw_V<(zUmCmr@Nmu<}L8232G`#n=I zFP8oL1_ovZ2M=KB?ceY5?ss{>==}rU8Lt=H4-F0+>>q%*2Crvao*6f`6YD2ko++nu zVr=L@XGiDk*@3fW%>hi4Q!>F3W|nj?gjG~@0#q}RH!OBGy=s-DMj-x;>H9MDJw`Na z-%JuTC+K2o-lU6vd-n)M#?jLL=K~lu8jj5ADBznSB)&)pnjB5+LwgPkj6mz4vjovI z>(rjn=A#qBV-ldj0S*X8U>XfIG=yGh6d9XLVmT%$J~1mTbAD>(yy#eZF;GfcZemJy zaA*vD%^*G_lD=FX7aK?4CnPTT*c6TCO=3SZG&-7Eby9R}S|sy*8UKJVAUh^DIV2(E60 z?+JJug^j*JQT$}Cj$#+c7A2>8An{AoCU7&67TiH5TJqZ$8nG9QCilj?x69}Jm>w8C zVvb$N->24bM#fqGPqtIfgUZa{I|gDG$~rQF=B*9|1%@XCMwLiOPyA*kcBLZZ_{aDv!$W_ETwQqB&Eo*f(= z8kGWS&yGk4iO)>PUXna_1z|d8S$x*wq`Vc-+L;R;N}anrIb%^;&WhxDtCMndDH$^U%znU$B(|d{@I0FpI^KKWPf)4<`G z^$%bA%jbXo_jiAK=j#*y__yb^-*=pPvijtSttY0IkM`xcd(&O=h6yhe*ER?{hzP>aR15=_paW%1DSpK&W)>g zuV24&{nnl9x9|EQ+Sl*hyMF)f^&jqDrvXX)#70Ja6S(i)`1$8wK6=vetd09zKh4~r zC^N;ETTeUMAfKOfv;e`-%Z!3?QI(DX>iJFEnU?bQH4TS zCT=Nd2dRQ9yPIX*lzqmU_qOgQ4S1|QQ;JXp^-+M z7b_H+XD$S831tJhh>{F0|Cdz^BL!CVh{iKNK5^oUqE|5W%2c!hwlIRDTnf1D^bJt96c zBrYR3EUXhl!JR@&;O7`NEyyb-N%*AP0%ab;4 zI`pSMoxgtnV?y@rFD~8v{K74;8@&GJ>b=7?&N6m6M0S^mUi&x@}-^2t|kUb}ta{x9GE`s>fX{`$kOzux`z*K0rh zbm{whm+#!60Ltx~*Y4c7b@%4I@9En$_wU`hfA7W*_k0Au@ymaI{`$4)XB-XB4hTOL6hWg2K)D#anilZQWJ1 zb1$c?P*7VW;T6e*rOM7aLvNE=*U)FI>eDxydU*ypSKZO96tZQl{LU6`OJhq*t$tL1uM*W(iRvmvwPm83GD%%!S3|XwRWD;V%DF5BzggMBm-CxpJ#8&YVM|YYtGYwj z+ac-^NqQwxb*Ee}k!m}!BGq&&jY@;D$7Jp`nKf3E#%$8|nRO16&S}y*Ee3C&dC*Rp zdfe@rgn0pC_q5A3Ny@r!4BH(9?lEX>8`hmuPS>={z0d904?6p7fb0+jK>825DQta! z01eUIe_){hVE=C^4-E`JaTDu7?Xi)Ay*(J9!7eH`uhiCBMndeHfM`Qisl4_K~|#;1N0QQjHLN|*p95Q5eBCF z2#y4dHV+2+Q66mf`3CAulK_gO_-}YD%1Kkxh^^G`hRh5K20G&t6EYwYk$_q(1+OV~ z9G{d$53)lHMiW-(g%uRZC9XxsBxj`OW#%l3PtJjIM1PmO2t^fW-dHRSXXaKDpn;(X z`t}%{0c0Ifk|7Z z^hh7LnFs*Oymkh`pv)6e-uS*n9HF!5-tbO z2Xo<`;XY{>1UutyQ8tQxP*HIS^om#b=HF@$*XVm_ld_^OK%&^pSty=?C7{aO6#9fk zFj7V)#3koMCS)a~&re953w%R#6S8r#VDO$C6uDxmci*@HoDvh}C#?>eM<-Ii{gBq@evmg8WR$g6cUvZ7@ioyJg^>> zGB+`6QBu~Tgsg?YbW-->gv^D>xl2=WmSoLco|>~HDRWV3&eG(x`AI1YQa5iu{9aXcd-2O(jCD1o2z%R{Pg^-_rAXJ_7|7m{^H7e-&|vo-Tdmxoo}z* zJ9qQ``CC6-zVpk~J3rsN{qyx}-=95q{mpkjdGZf$T24M8d-QnAiG9^4_jf&iO#0dh z`5zwPy>zhb%=pg726sL@yz)qY&OYbrL&HUn&vZTY=;W)fKl$(X-u&+32iI<&{pr6~ z|NHBW|NP&zUw*mv<4;$=|Nip#_paW(b?x5m8~1MAym#}?_jmvM>wo|8#^Vknr_UhJ zs+yGwwy3jSAgXI>t*Pc!mN!?GHCLDMYD)!m<*iNS?c53pud0hzB@@*3ikoy&o~E0x zY8Plk0!^ntB^D|~?eaEJw?HiBiQBo|EvznnlZ0E}$*zM^?rf^1YwZ!X!4$$)rLaxeE>yLPdfUal5{XLO+1u5vl`6E-9=){J zAlK?iMC*(yqp{a)(%8*9Cz-)*Hn@yBmr?IA!3D6c2&oJ^-3y7tBqz z-_0N!d5#Vr)T`8if%K%J55xc{N$Fs84GGYY*jV~z_%TSO5H^@gsD+58LC7%XXQ=<| zK!1NE`)!s88X==s!XQBc82OAX_~*yr%rGYMr(`%C4hJ33_P}c#9s)2i@6<-K509h< z0+mDG*@B2;^iU+lMxjhW=L9q^fE8qc%7)xSCed-pG&76|UV~rB$=NvRoFFhF4(Tb@ zNqggCW0GTIQ&TeLC1=cwPtH!sT!6$3YC$EM&`ptU3WflP6!VQw%7~%>19v74eFS}Mn0ehT^BP}VF#i8y(SwUm3ksok@}f_NyO^As z1Fz`gJ66DMib=t-ldGrk7MzFzG;kNOsnLnqvB|m730Y7IiRtr_@Nbur8=sn&m^LpJ z1kYKLn7J?}B{wB&abo6z=;)02bz6@8v)w^GOefDo}zc>BZlj>8?j2*OPZd#taZC&!#H8EROMz2{Aw<;_0p{$6N znJG(hmabZ{dHd$l@;%ixg)*hgJv4Om%(K6H=fi(oxbo?}`)7atKS2B%?C1a9`sM$w ze1CWH)fY8SJlTEZXxG6*!ih2VfTzLbY;f6X`g9F?InO94Zto!L5NX6>jaZ}> zb!a*zDp3cl2RQBkl-tzUE)n;NuvelMOL|4(o_0}BhgdD??3Hw>yJea#S#PJbw^I&S z>l7Nj(x4+FQtMR^)HbMTklJeUnvEWd$!j$a!Yrmit7X^@QadLdjtPfj5{!1brW}B^ z8&ur~b~Co$?IuivJ1u z|2{60#ADv)7Zgh51#99H(_-UOKujb+GT@A9Wq<{}cn^)v*VIu?tkB#8W>$u;mC>7| z!f0l3d;)!I91RMMF)le9;6@8&o@sNFjYy!e$0+K#L-M0+RCrROP}5N%;Zfnt zM*{*w!f~baU zP&5W-gg>JY5PcSsVi!@+>|iUd6ctN1l##$#Vmo0M%9n}JhcTV1$e8%}lnhiacA+Mb zA-oh*tIR{{%(QDNEz`B4Y?-JpcF|QZ;St{{!jY1RJ>VxgBC$#7Q3vjZdNghbB@jP&yl z^ACxod4cr0sKnriL@Yz2QzPOsf+A^_H}e=yT10$iczkAPYEB=%B=+?m2-!Ej zzi{J+i?EybFWtI-`Sy=jZhe3G_WetDe!hI~r&~Y%=Rg1b^@n>upZoU0(NSl~jx7zP zrQF&&VG~=%Yt@RxR=Luq(mS-40jq1kY;`KSO&vTLySA&TPA1@MdlV+C*)ujaef0R_ zFaGY?Kfm$&_ul{K*WbSV`G*#7cejEq(+TD3HdT*6scexe1wE>El~Sly2=$6~lU%6p z66m_y)m`mckx(ZRYDFTwL;_QHiZv3kwnL&7Nwi&EWZhD2cQ;m45(#v1ucT8A=5}@y zc{{uC6Wdi{F|!n@M4}#my94+Z_li3qqE#ZYUNH{uQi;3O5~;dNp_VGu-91{FS}WJ+ zd-QshN#ASLtF5|Ti&0}UXzT`!1EjW^`>o~yt7WjyGGy-?wf2ql*~aX47{S`dYhW6L zbpojbR%T`%!)T|QsEwrq;PyaY(+m*Cz~Y099qJ!E;vGChIRNqf2R&f=z(FW(H?%f* zO^E*u*)GpMhZ~Mza$x9y*<|q#41VB&zz6+Y;D`&cWe< z5p-Z+xPLI3Pb5%_qmY2qSxibecp9CE?r>-Xi6Cry=@^37C3@|Zsc5tMB zAk=Xj5FDG785x%r7##KB?2v$G z{yp%YfNS(w_-{o;V(gj|HYYR&9pV*G+*{X*hqMJCS*PYjGo@sCOlic1fOP7RDs3r)!Oo12lAn~^pz zJ1Z|MYkp2{URHK)dgi>WoO#(fxfz+c85wgkGH98ZIWH$?epc3k?5xFka~J2$L*jXv zS$UaR^Rlw%WoGAPX5^)(<)o!A%A2=z!NMi;<}F_^e^E~M;+*UyIa!NyvKC}!EXvMW znwPgM54#pD%E?`roxKE!=Pz8Go3}J?KGqlI&c$-c+&nCoFIc#8$4}+%iJ7sX zeS_X{uWMw$IXd7P8}d%{yM{eBN5949HW=+{b)QmcRVa)ysaDpllgW%Kl~t#A^jZ6j zJr0f1q3?BQd;8SAHm#;l)7#gJbuG-Q(pY=6W|hvY(wdYSqoUWSP?@omtMu|7gF*$< z%alf$(jZf6rE;}Yrj{x+QiV>c)O0H}-EwWWLJRD6$$KQ-J>o8(YH^ciMZ$<()0xyfC~pB!{ei3 z6QW~C+k}RpFG+8~h>eSmh=Tl%WO~R@K~Pyxddy4Pg3*D8`ChaPZTy=-TS8$*Mk5(I zr&x~+{mr01NuGs;Lv&G?BRVcQE-@iGmNZyQEPBF8F>x^bq$o*jLP~sE0>pA;4Epe~ zC|hhod~{qQ(!?gvmdKdc2-=ktn+S;rONfb2N=S~6iO)#OOiD#=P{jdFiQ(vNINBq`?+rB{OYNPUh0NIm_nGT|PH^X-?*{x!H@eGM43Jt(=#; zEGKh$ZuUb9=B=Kew;IcNxyy4iR^?@_&dYviUhYclnm2d-q6M3mF4^(WLz@;a+OQ~Z z!{T}C7R_6?c;UK*3)U`Nuzty+b+APX*DhMHcJaLRi|21#vS7oKg;-e!TQq+?QZ8D6 zQ>b&9KHsJ`%biQ-Wr?>mqRvp?SgqI43mH-C4 z7cW|~Xd!+gll6;H{)M=N^-CAy^4Bax{_~gQW-Xly`eiPeo3k`GXAvF98*E zvzFvyZ}ws==jJZV%3PS8wJ_#rFI%)^$^3=O7cGS?UAWk9 zsH1wYqk33WH`rb?&|W(vZX6Le4tCTJw8QGWf@-&*(%V)w*iq|ktM&>i2ivO$gf$Lc zrHxze;FY`hl^#JAlJ&P$d0Q*pf|`C|y@!@{{X#6syloZkmNFN=+|94>v{qq@M^IsJ z#ujWx=5_t8*iz*dR5^K-E`BwZ_U1|#uhP+6Vda$Cc;y4lB`vIq!B_uw@zzhDU%dI{ zl{;Sm*_ZEred+F3m+wMoLr{N>pO^1`dFeK!H)xJ^Nbj@PzCX{zLm;#-+yJS61gtN@ z0PfqQwXfbGyLR^{pWVFw%d5{nXH@Fk7PrUdaoN0H=YZEWX^k%ieqBdHzMzhvv?A4i6I-^o+Ak!Fow8kEtp+{@#(Ha!JT3L@)uF}XfdSObvT4mIz%sRDI4_U2s7WH*B0|2^tHu0Y_$=ut$m|5`(&SO z(rO#G+9oXaNsD9B0)o4y?Z7m+?81_W>~ImR9VD^AXfm5?rq8k829y)W54gNQFt~ik zO)H1(-UD_}yZ^9j;4n5i2M#&01h4TE_$E8-=s#fd?6bM2oI?klHfPKFg_2DR+cz$3 zUYo~Rzkt1N0ek(T`ZWuxR^-*LUD&*NDR0X%!M5eR&C9qOmo#r$%GtQ2as49BrltIC zEBRZO^S3N%+p(f`=c=ZSi|f}dtY5c?wP{7;hGlhY7BnHBbqkv|E@E$3+`MTyYvaFXI)qEW^us=Nx=qb@#e0gjh%(-y9+mVmuwRkZk7~ok`!&~z}})w^70+ZiXEz| z9h#cmva;>nrQ4+CI}{Z=dMb7*8SBEv@?Elu-7@^F$(L1ZS61y*R`2Sq-P2REx2I~a zvT}EC%^r1qfv%~jx2`}{gYEg+#$s(lk-n+O%qcOlicRby3%kfzpKoCmTAB(ijfH0H zYAUohqg7U;>0!H#TY~2AXfC&N%c#K$DjeKWPYWPW=WeNR@nC4MmF|`*n5V6pns!U& z09IOog|fl6@_s>Czo5d~Qtp8Xss`I@acqApNKyricv`8Mdj&NBh=))El2rD$5=jPx zl>_a_q+&ow+0rgyZGSr`RO4-}^S0G`T5E7>l)>8ybX0hS)tH)b7#N?a|cj)zt1) z<95`-_TnCySfwbBom*mM7g;&QMs|sjU20~R8X8Nq^+ozd+?rAgr&L$J*U(g=Z!AH2 z3#ZK3RE*3m+!7!gfNmNRvxi0OArWgx+%zO=927MUiCIIUreQH_u)W@gH@0}xRLufOBY#1c=*K*OM006%dNklwroKL7pA9Ppt668Z=q$9c! z(wK}`_5$1nL$5)v((8M4`X0Sbq1BQBvTC(l-78lUb7g9ktXC!NWhkstb}D7TbiCU_E7ZPQw6ht7F>cA{^V? z`)%$S(AnlXXm=m9xet(m*Peqm??J5C8N<4rh}lHFY~4;_rN@W5>#_-K%ALHb@IL2zRe--My}} zXmiKz^`iWB0A**v#_poc^5QL$J?rJA+mvP7WyPD6Wm{z>Tf_zHJNB%T6m9@LyNkDU z6>nmwx=~rVU0%9XT(D6B;1+J^ELh)Nv`M^YgQ#$mxNwuGU_*DwRzOx!zFk|J-&?&) zTE1OYu}fJ6+pVbDrK--?)a?O+m6f}CDtBvY_MkoMYWM2v3XBa!#)iGdra~jD$jmA- zH5NI+N?xUvQ*LCTtri&?i;Rs0X5h7{$O268Dr`Uow;T=F%B^q-YLLFKxzfxo>*H3~ zd6m>^h*Q*XZ1^dt>T51@qR|PEtjxp$AWHf;zzt+jnG-zXLwi;A@v3b6>OO9jfmNn& zDlxE1O@xMW6T8gXTxn#LnKRKIYNT%}S2vYvnu>L-Vz?zGnJ07zIEM z+QuSe+gn$psw?WPFUCm?+)6#CLWevXQJ8Y%)>E@bRSVmztj>r3>#Z+9VNBc#1G`Mq zi2RF?jLJ#*6#BAK)fZtqE?L`9LR)GJ<<)!SRry$vGOo0zrchB^h?G6mdwXgM@UyqB zxTm%N3A)SST=(`=7sxB~v5T_8g|kZatg_!SuPuO=g=y*wabDCC&a1_J;gspwrM(S> zeuEOON62ys8(pmp9$~$!t=1{1q5Iuh>u9NR2&!DIHBNpt{X@VRb~KH2HxG!KTx|_* zVdH?9?QW}gw${NM0vy}mz)`LBUJ2JL=6E|;{jl~XJDJ#*$ymw))==FgXJ|L5|JA1_?F z_Z35DLiUw=-(CA2vYL_G;P@SY+lTD4*Y2Ia{sWmWFmn4xQrQfzp}4Q!x$o20R~ckq zx%bQKP}yBFhpx|McDc-MC(Pt_7@Q7+%YhZM$7%IC`Uai0VYhSC8+%~JT&+OJ2astlSQy;iBy(o(NhXnSFD4alpabsgZ_0|SVq8o8uLDpp7(3VA1Ztx`yP z$-2}^sRpK!>v|M=r9zLTN@-N9%oLST+cYqZU88XT);g_Ar}G#LL~6aEAExt}aZqm> zHdsbX)={Wws|`|m(qx-5!)RsFY@aearcI71Gm!1tXL0R^nH^KUb(3SC*@-PP7Uzt` zF=KHZu(-*rp8Xd0jM2W&jKuC4vunocKG5eq2s1hNS&{y?WUzyMo&!Du%5jv{jlDQz z+U%Ng4;<(pnvPz#{(%*%{2y8uv~GRe`ZY_puHUtNy|8$rtaytoe`8PSW@XuC+3rp9 z;*C93+Y}XB(VWtIjVsC5yI#I!9QQ-zr(MI9k4Z=OhVGDLa_DV{&Dyw(*RPXLA-3DaKD|SoE zA%}NJ;25g+Xc~$;%Xf)NwkvD*=o(9Obw$P|NT+f$rxN%e4Am7XtM;nviCLhhm0N9S zs<3ct44g_MrxJ}>-vkI&fjinJ!k>u)dR7CqpqrUn1#}u&<;JEm6T95fTxsRifH>fn zt)X0 zFzCKMUWKQ<5xFs(EdkkqV~`Qog_O7=tWy~P%EodXi|}gXR-1UWI#!vL2b7nC`zWfO z3SXfom=+U~;J4UiI2?Pif=e)ggQy>3bcK~)tHU4d_^)ZJ7pc z17N8ygxesaYAI4y<%8Fj<_gq_8XU*H4$Kvl1>5#+VERJ&Wz@2G>?C1uTM-T~6T4aC#7Iu|(G z-Z<1=KiEzJ8C{$Hwi;)1g@?3o#XwsPG&mCXcQg%%*dR4TI(`laNoa$`$Pj%Q7_`|IjDoc;bqQtVdPo;LKHO^j*Q>k_IXdNn@ zOQUmZv>vUYU!(6=YdmV57b_a$pw2v^vyAGkqx!xvGTS&=-vmr&#TKkj>TQ#H`?StJ zrH47Dv5pmkW1qn>ZLm*c2{aoW`}NpjC)3%cjLvBzCD?Ct!DbA=w|mCqW_~*Nn?Y*t zA#49(>%dXl;8EMqG28HQvXK+k;S;9869(^LoqeL$GOV?Y>dl_SwQB-buMB-?b@)ST z!d5>Nyk>3in)MOuH^yz;uweVfjeEA16>bq!0HfP`OV_K*H><0+YpS-XDz`%y%geSZ zD~aQ>(yg6^n?-xqca>~bR_>ISZBvwOg8)YY?1CxEwn_>%bmXt?E(OXrL$E6=cJ@F! zS8VSr+9WC3qNv!Zs@Sfs-l=QI*VpIwRBZ35+}>Ng8!Z;?4b)KA?p9T9Gt}>aWQK6I zu#2IrZQN2*BUXy7kihH`Lt`OCH?~_?#RdrQ#sUkw)Wj-5PaM)49b~j;i1fZ@$meQZ zV<|{y=9WQVK@yojr3M^cgr${RW^637ut}JMwpI`mnNWAT%*ugIuf!G-?9JsiUKKD6 z`V*b8tGN;z4Uqqkx*%O+p_#hmC;(Gn4!HpcSS_o}j56@58TE~g%=V^YU=HloH0{r8O1J=GF zGTX4lHf*+!*jy8Rj#0CH*zBO62K$i7F>JCAYOP+i#iOx!^nG59*`+o)wI-L|;L_OPHzOs%%|sx7_H!YT{4W2x#f^(c+19y3;yN~5C3s8AS`as!|& z?bb@AS}bKUy;QF62CU@Zkn9+h#h*EFQ^nR&R!JOTq8vEFMLg=wr~TI-m`I;ysesIiOoj`dn6)YfrL z-?-W~sj*LLZ4+46*v55^DUE%)*FL2N#O;&1zDc!hpUSac<=U@t?$>(`=v)U){m0FN zC(I)c8%9nT2VqAw14lLe$5q~A9p)LHdbGORUfibJ&gx!Y-L|}xld-)lW%ahCh0CL| za>G;8LSrIh=BEa(TJpfMwqbqD=FO?Q@-vD`@~Z0=HMcw@k?zrGYn*PW z*&walsVv_tE!)stx=~ub1%QU8rie%JW>N7LVd2I$Xzh|M9fg}j#hW?`*S8n0my~RQ ztQHrp!%s=c=JvhoyGu4J-~)jB@@@LM-KNI9X4YO4t3Xq;tG8;0s(PoQayx}DYxiP{ zu4WequBzJBQ@u@BzpJNeJH)%HVi(|Ul9RY+9))P^*(;3 zyQ9G?W_dcA-0h73q7`6*9)c8Wtu|9Qwakr4M+SMCs0p+3P)_z5J24?vd%7jETO z_X+Cza7S><;BQ)LabI9AVV$$J2E`*Mg#7t6$QDkbPf%y()mq8#qNh@Xn*wm7<6^}H z^2+=8=%b)JRbWAea8xa|=sYIeWjHi^KQJo2R5~ zWHqDY9@VrS>J=PR31)g)4ys!ZYuXN|T4q!&2YUF}yHCd6ui)&Hv-c@DD8_ha<5*YI zh`5O~etW&ArMkZjVjl{zrOO_ z)w8$%d;9iJ7p~m{xG6Al?R!XU-;C^YzeTi}2_!yVGvknu-af5;_0CV%zW>iV|9Z>Z zt+J~7`gDC(z0IPvS%7S!w$o~KGqaKhEY=}&A9y`twvCz`V`k?B%;X$1Iq`EGW^jz^ z93vXrpr&t7Ya7y92h?UStk>x2HMn3Zy;G%gsI>MTtxc)1^#Gi6i-w7Pc4Bb)#mR)jVm)y{;FkwX^Gf1#kVd$0_JEca6)YvIA zbt%mfxw%te=~DJ}_1L=94yoEHS36}ejZ3O=%e0O&LvquI%rvYpjVi%$3znlw({K-M8IhaDWtMT7bwb%UsRESk`_--k zD))gN*Fm}CfXsQY+jX$peMICu#Ix+<7{*z>{dIC@S*NwAL%*9V-B#PSwy1vT&a&K1 z`57xWCNEtTJ$GJIc5YBwMqo->Kw4^WR(eo&M##LZh(+_GS1gZTyEb*(_RPKcxfP{Z z)fEdk>?N%o%S4h5-LkDx#f~oNu1-mjOj;_F)=ImYIz=3rxKZ5BmdnaJJ8KI!vo|hc zZCkE&N=l&LcWA12 zYisk3jfI-JJy6X?R*|-TkG`>hQF*{3lp{1RBYXK(o{k1IZ%;?Px1+uvoE6rgq9jw0{oUQfmDG$dgS zcX9j0>;VZI1sfDKKyNW=YN%8+?pK9O2HI-}nH&a1=%d%dAGidRkGH+b(?(-`L)hC^ zGa#(N%3ueI4T4u8E1LL#)3wpyq^Grtd_ybBQ-dWq>us-v^>@H&Q6cH1kav`M6}*C@ zr2;EX0n{-Q!bM#P>l_T_kq@@pTPjdj4nc*TUk;rPSLEQ6V*prD)y_6-EOoY2SeuJ& zeDp$!`kG7nnoI31P~4>i_vR8TU4lxN03NZ}CV;vxw;+Llvh8cBur$NnmY7JbR{-J$ zc8RX3SkFSIp~%Q8*3=jDRPCZ+i6&o+9=l2`=$bT_!#AT(U}P6rcxASh3Y62rD>dWn zE$}EMCljgL+YggK2mTANGZY2e!Z4)-)arf)rIYJbewcD$GOn6B*+UCR*_`?$8{ zn5N~ZntxQ&azxF0*eE=%7amr(99B1&52<*Edt3I&n)b_^rn(!(JL^F0 zX&K*~+|;jfxWP4Ha8K%B zo=Kf|QsbV`yC(GRajk1y;~Y~vMm3HxwQWS*H=^nrQkn;POkRb-4U_Ag3O%%~Q?7N$ z)OLl|Ay?bFReh2kYbQ);>11dtQJ5qOBCkYl63dJoQe%hAC{~zZ5`|SPH;d(#cA23= z3e&Yo_1N1XGquYt9ZE}w!qOo(i;%3xCRW+odu$y&4vESo?sc`Rob4)Chsud{5iOma zYEPGLK%yTM>juPnvQFbjmuXaL8JAkex-DbfR;*0O`lb~2X{BSo%swTyj(7A;ik*jq zw!_Wl15JjhD$Qtt%)PzCvWlx(R3n~S(3rWUBzgIUguLaE*^7cwbLPY(%?=Hp6&C(L zWaNXf(GSGOJdlzwCnr5{-rT^I%OW?dN!YnHqqrcqx@s{`uuRmsMy1}QH*GW9cG;Y} ztd1>u%T|>ZXx=Pr-^t??aGNSvHSDHx0jEODEmv?$HQXXybCIRF*xFKNZz-LUaa(pj zR5(9%@8Ybzi?fSYEG%3xzk2ljlI>o)iwFO)jM^yd-U~tZOtVPKKl6JNV&VM8Y}31n^+|z zFnN`}kv9{&6n*)gDv0+27r&H-f6!dHCEoUWJCG!(a^qM5AX4FNul53bLa6C-kFdgn zWlQ;psCHCTH__REm4Wu^v2JLf1}rD!>=8-bq!iuUdTjT$RgFrTM$k(ZH30XZzpJ&1 zQJ|=_G9O{VZtxdK9qVow>1u=<80xad4a0ze>!yPpf@Cp)i!5gM! ztbH=pWOw6WM=dgOw^aenIO&L_alDH)itf0Gf~zQli(lT~S~=8#K6>3~C(^^^R1daS z4hXBjbmR#e>8K+Uq1fmdP|8810q8sMvuZ>_+mRKy9KgM`$|I=6839~J3!xVE>{Ilh ze1AJU92^X@LZF8>uV(rs<;<*#DmVr>B;X!>3tLO2nOzK*fI7!rgImJV4ham6%q_KY z09`;6Wp_*saRJJKV1y01N4ym*5)cBdQPlDBa0bW z=9E#~gJy$J=!xjeDYo&-9DFK2(!;x0DE|@^mFe8n`T?B}Yg+)#BP#A;Vkmb;&e|_) zm{GD1skr;)EUX+*LV7pODA+IndRoewk#nYSZ@L?CZ?KEm*fic*Ki<_iDJ5#}lQ&Ov zL!NUX%qL~sQAzz|cM~$ifisHcL%l6C%9d$H(a*@6XXM<25ZyRLf;-wY&{pT-SJ4oq zu%TbrIMBiB7qJFAc>`kZfQU07Y8vQhFg2Fh*k!|Fp22HbCpGcigG0K`7ay6ix;6C{ z6}R7Qc=F66Z-4T|?O$&F@ay&4Kb^mJ?;N!DEs*+0T9Us0|1%1Y-1+h9z5jgn*=JC# zTDifbv6$2rBO%*q(z)p2Y$JF*U@#9FtRn{7n87h&a8Bu6(>l*Sjb~cjzhC8@R=KBo zJ<}@u^h~K;lPc$Ak8@Jx80)c(DEfvK)*+>3P+=aBn+IejkJRXq8rG z+$OiQ$;_=-D*D=#wiZR7K-ni$0^IKQUXM`i6{-70+J2F)AB-01huckKBFmJ>G}&gF zXfaLljpNORF^+DevA4fk?ko|T3fk1WInphSl66(BtI9ab3hEYaE6!QJD{Jkx^wnGA zmadCjxH5e1;-K{Gfb@(x>6!lNnGa^92c)G0rzeNzWJE1m5Wi|=(uNI5J9eZN6y;P_ z&#kXt*xI^8Bv~nuukPwurBJQY=(eb}+Z4Uqq_SNS(T?`k!uFPmHf}Yqv5D8j;nwh3 z|MEN+oIg<3v&yW&o5iExN5_S+D)tKH?OQ&zod4<(x$De*jra} zcC2aIy1Hf0#`fZ^qT;Qc#oL&vc-yCxO~(SQylqf9NKixC z6I-CfAyM0F21S4o3>>eqaZ8aEW!q4g*Ait*$K^#bJY%E zrL$>Jf}c%;I0PIA`a2s3M0H3o+|@K7p)JFma13bgwS(fi0Z}b9JIQ~hAK-4SVCME! z!DGS5C5Y-!5;!yXIc92dC2c4AGu;T9=LTtC!^rkJZwERqWa!xd=%nsjD&e%8jLZip ze+#Dbt1T4fu7FtVgF0rHVrl1BQ!u2t%!Oj0Kha)~QsF94brAkwy{)C%%q=%^%5AN+ zHXPVeV_=m4<$aVPN&W#*J<5P?feW`%SZi;o1e9?I(l7%9Wl-W)evP524C39wtF-XS zAj`7W5jAAB;9-OCAn>h$B5pmX1W#E9l-$E=0aWl2Sa0)jt>CZ< zkYycGatS9kw8mFbrGm6$J8Gojy?T|)%u(xBMs%=6cm{E(S z6)0Z&A$99ft?-bNduGzru2EJ@p4lc+oP7B3m!Ew2`8#iY_SfJ4>G{VG>>IF+JA}i| zo|C6u`tIuWUw*xF?`NR-{EhqPZvJ%XCY1I4OSgXf4cWfuA#dNma_5(C&s}izYBX}A zNnkzGN z6K>%1H?r!taT<5A8;jZXm8`1zrm|*sWm{9JlwB%oD(>NwsGCa++(KJ(se@kzUD+?J zWQ17#1Z1O(J0a&y$_3*+!qFbV2u#&Bq-q=PZ6E3F7*>l$VLH*MUUI}^=ww$f&q!J~ zFKgrcOdxn|ZpPZV84u;8uAQ6yP;TlvEOXM<=XR)tlGUZdp^eWp&ez4Ru@BRcu&MzjbYM z{wD73jje^-MP<8%rMo&xcM3~(O6!Z&ta2T@LeHzVwAPyib=KB8X9s(ryTvWyxH{PV z5}rrIHF7G=&DGAfCa18;*$S>T4|Q?}#B66P1xEVY8wMduMRlWHO;d{I2{~s%&K;L= zrsQ1k5ds<1^MdAWplWS@M-x~8WP`%s0wB`gRs(rE0-y*mh2IR`n6 zOPeMY9FTfK!5Qslk4ia{N0TG_I%w{5z&ZL&u&sT550wC-28 zP4)1{u}ekk(<=VBqIn#*SkW>j#l7YrTl5d0@J6Y$4U;k!Bk*fc+KFz~5V;2kJ4PnA z6QIYKvcbDR{*&_%*FwmXY!_p_ZlI$Iu8TYq`G6`I$#!8Cv7TQB`1bKio#Yp>tJ+15 zss^6V#w!Qb;Ut{oCMoO=E$ui=3zq3&sxjszsY%HI8$spAoY@JKK3DA26tJ!%qS`=K7r zAqD$5e(D53HdYR+xJYnZ(*mp`F=RUo$&RX;PpF#@fZ8(n0L}p=Z%W#9P{li-Y{ok5 zu&U)yPs<@y3luj5_)#rL-F`qNoKXsns6_{Qgwx8lgKF_XZRa7a_>iXksHXjpjP=yG zskB#9F#T*TpY{6hUp@QP7oUFe!3XdE`-6Ai{_yR8efG~cUpzi(bZc71`_0dudE(#i zzjNjO^&ft{clSS+Zvost_^3_bX5!jV*;j7=bm_*eA+uH0Z7}PcMy2B9Pse3<}=RlWdrqi=u?3(UyPPW@8#g0h{mW;Jq z$Ap$qp?O4T8g4ZX3H1GBTCYIkY3+5js2t5bwq~V`3mnU>WHJj^YGHL6n>r1wE(5pA z#O*dWOD$Zvl_T%t%55Bltx49`B(t$(wkCzWL1C+vTdSq!3bCQMO;gySf+*hBDBfJ% zy0)Zg<=(o5JIiyo6s4`*m9%_A^nzvKbMqo{=LV-|%}Pv}6%#uvGUCCoz&VkjfpM{c zN%6sHN#S!dq8H>Qu3DM0eqF})ZJGJ`xy7Z~l@$x>8W%KimNaozvU$sS{AGfcRc&pn zgu>-~{%U^9IzijIR^GNY{%)aQH;=QI$1349ls8pX)Rxp%6*iXd7F6yKS8i3+>@YUw z+gN*DyyAXA*?4=^q@-@Tt8t>6J%+|9=Z+`^BTC_rqIEza80rxYt2%~y+QH>PRr`p# z9b6vKh(~qe5v^!UD;d#A#thPNgKR=iHf5GiS$d8QSgUt$T9^{IHZN^$UdD!nIqTZeiYcXzdJzZ6M zrL{nIm6lzlM=>}C?u_@ZbHfeTL*&NSo2Qlh{VDl*UaHM_L+`I@?XedC_qnjJ7BYp;b{V&W8=a3HtXz$&nE ziz(y+*7M5XEhyxL(}`+a=*`do239KELLi=^^Y+#%zp3tqN!%*9BXQk6S<_@!-ITO( zzk+q3hkKxh13Dk><<2Nr)7T|t9qMg4LdfPH*F)zDj%!#(NvkXmp|*LGarepCa-=}~-uQ{M#A5d@(D7c4I z6dr---Y4S^wbzYFSX14Q;oPZi_C5uFTFx8qWRFQ24=9@Vb+Zn3);&68Z0sN1IeKh+ zV>MWP{_MA3ef{NEUw-!Gm!E(7>Bk>@^ub3Te)#FTZ~yJJ7fwDhV;<>~9GuWScjov9 zUwnA&r~7yRd;QK&^dLL)l+Be}KV7-=)79HQ-Ms&w!^0yoq0*!Wubny_sca+7Q}$|& z18Vb7uVtjCZ(Qk^l-sAI&ixYCjMzORb{&wo4|IADio6FU-a}%~L6Q4_$Tid9oNlv? z3vCl^eG`1kn7}+LFb=gC2l@IzuGYiVx;bhmyVuEu^*A{_c8=1{Rye@lM!Bs?ZmW}8 zE4xe;oyOvJ?Os98_U7(QO&uF+Th~|f*Oqga7u15nIUDw5J+vi#>6+vvs{!K3xr@TH za>CNnLo(8XGc$s-(t|Tn!_t!@GE<{+vtk$I#VwqluxLTjvL$J&R%WbQleKYu_T~*4 z+qPuy+?iKcIKQNLNoB>d`ugQ8)+#Q46<@HXO}MJ1bqSlZlEZzdxp@_bwXU&#OGC|; znzEfWC582+6%D0z^<_#ZJ$w|h> zO$#zNFMvGH+`1@x8(G$tg&EtIWbaxwclXj<*q&u`3s=oAT0Otyp#`OD7F4WTRJDF_ z-KJ#?Tb8r8uVU|5-L!2bcjxN1z3bceZWI@75f^RlDA>?lx}}Gnve~V!&DS>+^fi~$ z#{i|tGg1G>-7E4A@TAhl@BtreYj$gc7MUkCz>mNfQv)DA-+L+3&% z1L7T!%&ajPX9RHX<_veT0K}2*rlC&Oa3>qM9G8Kokm|f~DQC2cMkdF*35Zb8KHUlw zj(0UeR-;cd0Y-z8U}Yz?c_YNWi(=pUdr0F?^S+Q%vB-uawlG9v zMmuX@(7X;FZNv(Q4~UOfJpxCGlC~Js-A)3iXl&4sYgq{{ez0rSTCtL-4 zw43Ag4g9v(V`V_p;G}p(ou{L*U);!qFKR&ZK7Lsrcq*!Q;4TPjuynN2Togl7p_K_- zFf$iR44mRVL8X}o_grq_RT$HRGL46J5CAdN?$2 zd`w(>um=K}J0_|g7FLXlYi4AuqiVrHW%HpPvZE^ABU-`38vY>#>!6Zzw6|qO%0AN5 z{HRd?d>>LGWed_DQ@0&dwH@khJE|3qbvBK5a`r3vGd(<f=zQyP~)Qd zaS=QRccPPpuF6P9EqHxUB{-mJp`}uApr?fz7|o9X=oxNOfAfoa2texAkc5ctzwL5qBuDN@5&D*;>Z*TtGg1z$!it>s} z@=8k=Ks8ra&Tnd1#^tUP2p-}$Z{Rm?;&HdM@;7tXTR4qd8!ER|749t9T(EO(ZQ&+% z$wooRdRf^fb=4MY-A-pyzK2)n6;z-DJ}5*_xxQc0IMCVD-^uYxINolaSJvW|wz#A% z9=X7)Xzf=DJ#u37AoMcDF~mcpmn9?W&Jk_*sE(BKm|hArPnhHrmYy+_eB2}lm$42s zgUFNC-YHtDr)-)jyLJkIwlPbGe#)-f=hTDOQ+EBd%XDzizHP<)d2yjD(&AR6$E^gl z)8nyRnI5+~D{)n30>f*f^Sa#RwK>V_=ca6&m-bLr;>rw4@KAOlwr|KwU7ttWw=Brm zx-erKY*E&ZB{@45XK%;K;%s8~vfRBZ^9onbD}88w*+cUxH!i6LwYRQh?O0Q{c?ECx zI$^;^VZkO*$yQ0(c1h_rS=Fwdy1j~;{N9GW>V^VMV_^@myU@ZdH?WGW&E>8(dbq5w zrOGQpWwIS@)%F(f8h!bC01M#m7d5)k9~UPNa*G&8TI0{8~hK$*c#Hcc;U zt3%3u97V%x^^WEWzze({6tUmH$s~olQawntI(D~Kn8-oXmuT&3g{2%JtV4k@=HA}<;-K~ z^ll7DV*nKYDm3{7Kc(!Uj#`2#wg_v6JJ3(YhN)(?RmQtogUYe3vE zrQqYLnTh9c9yE~apjmWPaDFZUipMM zg}SCs#@3{S;bDQ_tfO8>kHKNw6UjVkEWr> z#3?nf3Uv(-<9h*pBdZ7m$5~(onpRW@n!_{=#afzlSd3HPT0m{TV`>t}$DoUuAjUDh z@UWJI@WY0VsBh0VQutTt6VJ$A1;-rN6DdUkI_^`Sa>qoThkC-J78`_U)+fL{@4k;ne+YSP_GR}Bslbw zQWi}slr&7Eztc%)1ey=hT)>t|DR-h9<{QjxflXoA({@n7e|)^Jc4Yq=({L%9_1(Ge zE?&HR@xq1kAUFM;JA3ZjcR={J-+uYUm!Ez1#RngL^!B^|e*dk1z59n(o_^|K!z0t& znbD4?&J6wi-M@Ts>C%<^x9|Sv^1UCg|M=^lUw&0BR%m){MuSJEb8B>NwZW@44fL7@ zm6l;;-*~ruN&{X1lq z?Go)qfoxqv`eW0%ZNSg|O1^@^0WYtlEY%iOdsbMyMFZJV>9j<;{i-mxuv z=e8W6dFPJY-8*yk?4FyyXF);1g5rYt#f1yYOBYsGEUKwoTwS@crfO|n)vEf+O^r3% z>nnHEl+k6pP>Bb6#RF;yY)IQR ztdkDux`*}B5xsQGARjX*$c)Nyvx>~3ny`S#nhC3V(x#p0(@ff6x`{sBl+7?@hv_G5 zx=FhpHs#PyI`va7_r#d$W=NacuFekmV+?o13~WH)Z|Yw2gV`fcVC|v`zD~puRWH z&)76Ced~fuuseVG+`Y@^7Oh%9wt7Lq%6X-07FVoaQnqG6<+_FSTb4n0H*Hfy{i|!X>_F<3g}t(CM*k#tO5h1Sz}QjL>Z^h1p<y?fCHksaXAk% z(;=vW>;)ESs9TQG*wN$qGG3}j*4O7mXYS=mO}R0noDW$Q&8F8 z0hv$yh2kC*(IXcl;`&jF#?(Wbk3#}Ows$v8$>10`Oyq<$*3BO6;*NE5A@(PkjZ;`s zxCRcR4u?}u0%}rROPac!vV|u={w@HTR|Zv%B?@5YSKwb1b)~7NXA5-=1yHE~oUyTp zs9L`l{S~+|XnE8I6NZLktEU)9Yn8i=Dg=U;rUUYz^oy*VLNj}>m0PR_NgL4bDN;A= z)i)J7_>=>MM0jPM)+z@%iAoEn#DrbEa+>S`;IfN!^}9876b#Wf0Ofmi_4$T|d{fh2 zWZTE3sUXY zfy+l!%>ehqy0&AQmJ>$NQGLe=qvWJbcGA}Uh*5mfB6(QXdR*NCS-lSeT){bnWX#mP z89D2)viXRL2bFzL!QLmW2j3?;8}`dN2YPtZGS*==?@_b(F_Y*Kz3^x+ABp!%Su;39 z)3#61JSpeG!H!GnCL!%R8*nVKTi!e&jU=+=YvmE?vHO>Efl!moHwtc;Vv3^Mr3&es}J|H{X5t z^;cg(bbtKmXYYOR-uv&o^WGbO{@1H79Xc{mFrrHFnpe3;Xa4Z^<=a30{L8QBKmN$u zYq01&9>-|EYr@NXX2s#2GTX+q_DPj zuG<*6a`mja3;a^k{9+>g!o&O`BK)Ev{365s!bANcL;VtCW@V+$UNJvt)4Gryn`4Xf zlPikSYAZ4uYUeg_=Ce5q*sMhy?t&)v+{U`RhS~*nb@OZL=2lkEttiVaEy*b^$}TR- zD=f@~;b&<{URA}S>dK`Jwey>57qaSCaM{Z_td%vD>uX9MD%rlSaLbP3t;Hofs!DgV zN_Pm#cSx&t^w#b+H|()C?RIhtT--t@r_j+{jQ>0vzY2XiTYI$w$_U*a^>4zE(==@Ae1cEJXEI|tNVgIejZ zPClZS4;kbmM#YFpF>2}=HTRB@sm4sINsDIOtcHzY*{2<|YR3Cu+Oa;(gk3*wH()vC zG)_85Xv>KRuskgu#%zyYNmx%Hj%Os|CumM-GLu$NI3*tVUY!YuC$F8G0dTL& zOIwqhwmvUoJqSK8ecPg(tqY;Jb9OGy-LriD-j(z7m(Sa?64YK$zII9Znnfk6=a;Wt zP_t=i{pMx$o0hV-trG0r$cOqa+$1U8-d(;^TDDVOl`pRZuk#t`5CW{65(~QkO&!oN zvkLo~OTno=PI14mdQ8F^qB#;ZkfQx<6@%?iuhrvS^}`*tgTATILVAPSkf_GnTG218 z8kW?J!o)RbZdlS}TseD;#vAKsBAp0UJh&B$iSGoBm=mZS3mAhNYXkrNo{HlRAtUzv7(2ME>Aa9wct=uc5 z+Cwe5T2Q?JYY}SL&MkKGO3Y39hWedWR-uDi>|htV`KA5BO5Z3hO?ed6B2VV1V)T1x zPGM_hAFo8;xX0E^Q&wDpa#ssQhg_``%fe4vGh9o)iNe`MaKlD+fu>=%wrQ`rE}xn9 zSJ=lZb)b{fR%LG~g$tq35EBz~qFd8a4zu&i{2nujpR{(Jv~)gh7C&kfJ<-?wM4$9g zQ|IHBuBV)eCvCEa_3g*CtswhjW--WnLMwRG*#4MNcwECfuHhf+C`%?sQk}jI`m1ihHn!3z|>M*!ce#?x-H4+fTgS zFJm9k2=_yYD+LGC!by4SUQ?C4G0@uE%fH8fp&WK-OIe|%iUDCuisoVbz+%i zqP(^B!i6hWE?)t)fov>jNdyPJFJHKH`TT`TXU|>y?(F%mzy0=$ufG2Dv(G>H=)-s3 zefzz?|MlO0c?Rad>WSP*&!wob(5Cvi$S%0v0Wtvvi^V+LdA3H>Z>qXV%r`2wE0)cCOH9 zR$44;oUToSBO6D@cTCRg+X5fO6+%z1$fFYV zt2+lZ-2)owpjJMlQx55ShV+UNgJM{(7&0n{j6E=5dc>?6vG$Hy)!_2~OgnA`rnTcX z-Iz@`?l6o&K|2hSV6@9;W&$)ZnpP$lUW3JxZp#D=TPURo>*H?o1Y_ea^BBx&!pc;? zt#s#x`SIba(h~sURT)VuGZR*2CK7)M&4geWboAQX6i94R**PSrA7bP-#kg}*S3`a0 zra)q2xh5xN-Q2Vd^D=z4Xss>Hw-#&ywL6NoNJ_TJDt9ZY^OaS*Rn@zDYx6aA zyU~WN%_V)jau6JH5+H!01hw6*l_WL=XH23}N0>ZC2gq>+bxa}Fue z0kbG=7Ntz0q)`ypabW1DEW)%!oV7`ZJ(`?Tk+zD`RxwIq27baQ9JI>@EaJEUjdK%5 zLDDQ7FpHBWQB=?EQ!{&2jD9^Qsw2{`WA$s95e*CF-Evxwk`~c0JD>xk^=*>cc4>XP zxUOANhfJ%OjO~Pl)v!wf{3>eUVwn$6!zDh2K`2FWZM&?I8u=lk;lzzcSk)pXlb-<| zb|J&iUT(RcSK%Y8fy&4vC+di5LV_wkk2s&85FFnR1;(rJbISv~DnGXpTSNRxY6i6e zrcax+p#w*epg%B!&^VC*zcR?L3K27?=8?5t_t`$rc09Pz>pm9?Y{mksUAE;`!$yzu zT%TvX+p*SZ-;8+h7wJwsc(&WI+-9B*sF&Kz*t*{3Sn0GaciL9E>`NWixfa7rNITnX zm<{VEeac~nBxPi0%v|DdV&X((H8B;LX^bcu`s59u+nwSXm_j74Y)arE(6R?CqO4Uq z=uo6_1GK!TUfi!0cFP!@Qd*~^sa04PQL*A`R-dGyUsy2_3Drf0pKnVXU@|`X_~Wl0 zeE!8(559W%;Hw7@zI*@x{|bM<{OSQxY}k{}KKtU6Pl4T^{QjdqeE7TH-GBGJJNVtW ze(&O?s~gMn1Q52`26#vGct@I`4jHx_no>ak*}4wPawtuq$ya)c&^3b;xAfFO|Q}=fBRN?W?bOySnU1 zP4UU9f|808wUs9smB;y2NA(TIolVC)v=aeFL5NuxW*0THirP76+PG)HJHTt&gf(C# zEyCKcxG5lR@QdnwqDGIf!7FNTiyAzVCIB%~H&Q8MZ#08KXOeM?u!-iCv%CtPSIPG( zxL!HOujKncpEbgeP884zgF0zICk^UlA%iTWm$jNz%_e2oq-ZuFqlUCvG_6(*h15#q zTddkvyAIN3H?%tptxiL`%h>KRLpnXyF0ZxAWBCzwfxmu0tpyn%a;FcNYwZN`dTpH^ zTNkMeIJS0rEToPf^zW<3|fM_3h@|Opn`4u4h)XPs6 zzy56Lo6nX(-g>rj|MPVRU#flQ#l|DAGEcn4DcCP4d|Oz!PgV+~KBz1|tgk(3s6An- zKV_>Y_BAjXHaG!j#u*QYCwZUC!-7f*S!(b~ThS3Ty}jR*9T zVG}ZAe(glaINf5I2j-sF3%lMt#~*p9U?UsS%HQBB)0R zS{n%(az1U=qaAQ6Gfrj7F3-4BF|#CLl?^yl8K*kq(xe@#luZ%0DWeuew^rC|5cTQ> z{YG)jBuUv7Nvk|*lMgtQS(kFasYs!p9(C5P$U5a&2Rg4Da;eZUbc1xjr5y8-&f}y~ zMtN{5te%(51+^m3gl^=Thap+MG+BbtrNubSj2W&8r=9sq-EU6a)SaI+Zv( zGz+bR>(--U#*D(4o)2XJL_!PbL*Ap#*k!mNBRGT)4XUs^_D$QQQ6r!DCMp;aEhnO7 zL&x9}kz={gvI3eWs^iCv!jx5-vWQbwNya9}5wi|?#v#u-m1rEzrfsqzk7m$~izCI+ zGf-DfB`#geBF(rpkVl4G8l3G!&^Q^w?J>``I;H}~S=_CVVJc{t4jX5}rj<_DT#E&n ztefoxx+r+Vp?pq%r~1Lb73R$vmyOL*tifj&4&$Be)UX9Ki6!S zZ#GPL6=3ctnGNZNozkpDn6rrnEy7WkY}g?kbt?u;{G^_ju}B8YlC(t{*YVRvQCufT z8YMZWDr-|jwcH%;qFt4;C{sqsLbj*O?SD17deRa4{ck^f@bJNx4EHb!@%|r?>ALgVw(IY;Tzl8Gebu(HV_iNko0#Kghnsr)>zZ3jE#@Mn?6ib?g4=ky zsiLyJsIInvSyv!vD3mo6C>u{{X(uhr0vGGFpHmd%6txRVyG3OYaYaN@)i0~=msa;l zVJg;;AwTc}aXp#nqtMweZuE(p{E{Z0q|qyBaEpm}#7(47%7FO5mnrc|nSMFjOPDgp zrvPy#;+6rdIX;!puMzt+0BC7YCkbjL!05119yG`T26@n=2pAPXqY`Pzqzaob*aq1_3aq#J19enziV9-avpkH|G*mI8^e;(;?PQ3W| zsaKvXc=^fGFF$qqm8T(R-h94v-;1UDUZ~vvV$Fe<>JPrsbo7nJqpvegyahtd23VhX zi(hy^bmp+E?5MWpq^W@fStVFHv2M)3{gZS+RcmVFoHc3MZ zaZMxZP};~6M6&uEnRW4zmlU7B>p~By|QIxhRkck>ZQKKlL<3|m` ze!Vb4Nv}@Orx$jsINd64r;^j9;`V8U9SU}fgdP&nnsInQ<(y7A8+AIB z?4Y0_ENTq$YeRziRw=zh$!U`@+oX(kDILBoZh2m_iE5X7C^a2&FYXt z^EGzKX`Mv*F>sMVbvtD!Y{Fh0DrSd*-Y#nbxyGgLkTtbS2odgtQbe0dW{-;1jXHAF zp&>K69k7!B0PeY_r z!9e>^0O({NQ3E{m`H{4a9oLXGFG)Q=u3@KioTQH1uV%$G?6i@e!yPpVQU*cVD9BpG zIlDY(R{&DeW=YB-Lz*=3vlhvqO@^ld)u>Hkg1Htc6w81OnuL_#IRItDamFMV zF!2VAWPTEOJ!F#%JLMURV1RG|369;L?J{PV+y4}scWe*N{s2j4t+`1O|$zy1Os{(wOC zmq;Ie^W|3$33h+^;PWpZeD?WQpL`1J{_OXE`1rTK|Kt0={oS4S-o16_?#){_uHU?N z;r!Y4rP+n?-1J~#D%C%o>YLB>EoA$r2cvVdGYgwrtM9&l;fsfNAAZ}P&vRSaneITD z!&PK7o>WLqa~cbp$_r|XDr*Ys8cy@-j>_wgn(4>fjN>6rK_~xozqmLlD^DpaGn$&5 zu3<=5pVKzvbWJ%uJ)@(iwM}VVQ(V&&RW;_1y!`R|5wmLzgjje=Go7hme&(z??PeHB;m45Um zV9jqo`Ex>?pCZrg+1GINE!y$7X~*_4PrS`9Jjg3PBq=*8uQ)EICKYwnCpDEv zm8I{eo%9!4SYwBwS=#%8ikqzd-Ck6qd#sBWX;yLHMMdsVPa8`}Uh z;yOSKH7vmB0^Z30D*!$K4Zw~I-~*^31;mgFaymc+e}QgYN(On}#El&?8rcefQ!%?_ zWVWeO)&NG|EpI~OB({m5woO<^Lc;A09gqc(KdycZ^D0|Kb=?X&Fp-Qx2r7G|wPXpj zh8fo~V`@f^w7yeV(=Dm%RW_l|ErQw*uew#V7jB4*-T*5Bb}fRcR$&c^L&vKkky50@ z^&5vH4vS>P4bH0(VA?9KZ-zdT(L0sQZZ#7aM*vq2gl)oE0Q+!K9YmPz3Kld9(oS3i zt)NT8Yg01Y6s$HmvsKP)SF%wjBqYNc0bV&7A>ow=xTSt>sh3gcWuNhJ%ZQ&Jvy}K~ zvrC-JLN~kA%dH?Or^3Z9ce2Vzm?y>=C#%%XD0VVS9Q0yq<7r1z5ez8@{j`H#NJ0-b z7E*Bn&bSy<=n@Wg$1OfXKDK~+O)vIwtD7Z_VG*=-W1E!rNRFTg8aV?7R>sWBn0Q(0Z^p<@>X~=soL30>lX^VKsAs=(f^EPqT#LF1DWYF9#8+OWuY*MP4FoDKlzS(8{N+=>;#-@%N z#c`7)=h0`K>X=@XFiE0%VZT8L+aYBkgI@u9(b(+#=qH~@@P=p7pM3u5=MTR9=9}-n z{_eYPzyAK~hu=MT_zgw6_aGbjZ-L``@V$rKpML@1{_>Mg!MH#D=#L=XfB4|T-`*#{ zedp@cE4w?}o9jy}^ON&qxyfv7BHcR{@1BUZ&Zm0L%}=avuAjYnWAoO{hNg=8ro!sN zH>-=^5>~&XX*%ZQ6a@H%ee&|Gu6D%KFl}edyV%Pf{*qTP?-5KpdE++DsFgEh;S5^1 zX)`-XJlR>eq){C^qGk1I7`-Z5pPJFF0>z+rsu-;bdYgjYsz8R(ET=as7-0o7D5r-M zjF1u;W>CTOE7<`R9}-ma14>>%$q#`ntI3pLP$LTIfYGubHLO9zAP*T8faZWf=GV*o z202JHpgBM=S`{>@0+fU-KxcK>LKrkq8yS*XwLof0jA5H0Y&SGJjF1+GDU3n~O7vk0 z!GYIdr!nX>gj|NO%hc?$w18rJ?5zZvZLMBgXVBRZaJBm#?Eyzyz}XV8hy7NM+hnsF z&1S9Mpi*ii5`~Z_7dA<_wL*5efGlBuhuQdgW6jGAwJ$c*y+o^fgUx({!`UYk?Gs5~ z=ZW9qir%1e-e_RFT3+$$iIZ=hIR3_4Z@l&FV+S7nhXYUi?4757arC+09DDB3lP~?I z;N{1PUVZZPtH9;wO5S*`?5!8d_q|ws;FY?=uht%Vx%SYj^@m?=IPx0p_?xU#Z*vOX z<`y2{oCYWp5fr~8D&8+R{T9FAZ8FMH{EndL9ZAU%W#vh2eX+K#$k14#uPahlpVHPA zXlhPss!v+!WyZ!5;^S3y+|qd3+)!k0Dgmu_GDv(l&}t{GnD`YiOWZ7=bD5u87T}kI zTn9L1WW_eWBETsP^U5JWYNV|~GHpm!#7JvG^%wsw0uzq8dh2!|YQvMbxw|c^&oa(ff6behs}-Mix4@iDA{% zb;;^cj;#?bvkx_;^}R|!IqHCTHnxlEIw_{#r2v#Sl1=gkWI8E$1&t++UMk|1us0}5 z4TO@_(Y`0BIH*}KqGGHxWsW`8?4k@@T9S7Z8fYYbJDUesD zSIvOI(IF-4Xu9OkSane?Bch>0a7I0fx;`b?Ph+179c$=Sf$c(?VxXsbZq&d>O6ax% zZyXbxy;n^d?36b&3oBsGb}2xv>w487-3_f0sFU)rpd5BjfL}qvk_c-8{K|l!icA|4 z%q@cum}Z^ z+6kX}*d-rv$;Z5^VW)Hm2lA=&E?M3spA4ENf`-w6dOW0`Y_U$Yx$-{ipvy4gHRWBp zA%|wrq0Tr}Lq2oXYs|Q{12#p%C`xExWHICU;qklg-g@}(+9#i1|K#%f+zhu@Ynes?R-Qr=Vc*riy*#ucDH)G+YExeSOmojnFCVtY$ zi<@{c6R+RI?=$dv_55BPzemgKf@K8J@;kM>b`7UZ!);Y_+qL{w4Owr}qUE<}c&!?K zt5(>o5r#D2&V)XPv@$Sg0?k^81SA>~)Jucl(R;W|pm|Re0h2OlRt3%KfLRT64uDES zEZU$|8~U@5LaWYi)&!_>21Ej=jM;wV!!vKc@iD{0_hP5dX|kcEKS|;bCs^QBKhj z=IO(%q9d&0W1KT5*hq_x3CKDQ57Up5p|FjNqw`Z9(Foe`~vKg z)2OBDkOs02kXks?Bd_gM)c2_x;yMNte@shH8QC#Fl@d7El+Xc-Y5i&l2_F>I&=Wdl z+RRIvAlxKa0=6ni5TS&YmNal;T1HaOq+(Ps`qfPUR)XUiU^-*4PHq8DpAM) zYWK-e4ZzyauWsm;)^q1wBqbVx%$)-3 z8wk!y_ri-pb>T#sK;cmbHY<8ULS?AP?l^a3`iPJ<@u=S=B`YndHJo)Fl3Hj%?1+m% z0@sj*@-^*Jl*51^5v-s=12A-WRY5`Z-Yshu*W>p2c-3BhorhQJ;Z_GljV|0`UY&`>mpCq`1YV!m@H^| zWXR0T8Ue4oF&iK7Jz^6Mn>Z6r(S$=VV&RV2`O_Zhv{yFi6i>OtV@}bCT`=wx&UnQW zPC?$n9(RfGchte3@`@)tLO^`Z#?M%|KL>*(cjv<6+xm$UYTzOor`q z9j=8w|4OWNv9EcyCpgpYoeCMltm<%k$IPvFH{Sd3+Lzzl`R1RlfAMhZ55M32=y&gZ z{>8_@)giL!u0z5+^t*C3lF~h=G%wge*Itn&;R@W z>ga@>KJODxyCsuu@u))t?FD@{1O-NU;}Cxvn}Ap$PsDp^GLoaOC3)^(UHodq-Cu$~68scW12s}DWU|K?k zHFP2hnibUG21FV(${}R**+hf@G!aG6OvX2Y7In}HI93NOnjrAkqVt)x9-|uQ?6+wB zKyWKW3-MzUN^Ckvz^eB_Y)g>?1SH8w$zRc&mA(8HrYu}XWUStYh zXk+%3uCX{efqhr(Wj* zG%JoNs!ynE3sjK0)5_XHU1JgF%%R#tuhk!Zx$elT4F_MMAAPm)ofm5lJl}W-`Ij3G zzDPU#GUwzQypwN=3iq>*zs5aDLZ`Bizr{TICg`qn54~FZ&MW2nUa5HJ&66)Z zd*F#*z4iES4!`i+@fV*v_QJCTufAM;XkWwe1HgA#`B7!XVMXZyMacn8#SvZAF>TdR zeeDTzL!p&cY^N1FU?Ve2o$M;S%p}s8upVza_31tm#G_qOPh1g1O&xM(o0Q%nrMJpR z^vX5~N(eQ9?cb%Kk&y=>@!0E>)buIq!5o2KeTv42q8?ZYL{1slc+!B#z^RC$kqWm- zPwN@Pze`Wgn%Hp-35g858OH8_kqe`lEO{dk%#5l@Y&a5DQ`Oi<$Z~y;qZ#(AgMQ($ZQ+6g9=Q{ou>;h8Pe~3EU)ZCji6<;8NBAghgk1kWn*Y zWJrXS&_RIp?5K)PjwP*&C(tuxF3@~&H3>oo4oL> z!6}QfMMtZ5~iV$(i ztPB#zLEWDI(7?@Ggu^xfjbzv= z%3B0OHo<_Aoz^pP%QFVnuw4k2jS9ro&&(UPp$>1@%FP*B2}ONUO~>tzYZySNF_#3- zN6y5_Tlhm3JRfWlvBb*HS^0ycS>QW}rzi_7!?B#wQEEDS)T12_8mF7B)6M3okZHEv zIoIi&X?GxiyuUz$p-kEN!P-N|T2G(RwU{`}eB ze{%WDZ?1pw#nn$fz4p-`Z+-H~`(Hlz?BUlBzWw%_?||UnJ^c1N0^fvy6UI%YWE2J1 zO@_I@_>!8R{PcH!_~Qq^`~CaB{qWwq@7=k3@8->$moM*Ly0m-u-FH9!^s|SA$p7gd z|Hpsdjyi@+tYN2+h)a}riH97byj?Wt5N91?oM6^29-wA;QWjytEQ*`O39CG6kwnbm zev1@o#4L$eqokmHgN!nqQwi_jFMoFtd+^Uzh=%srebz!|UL`2qX zRD=w2GDB#R2M9E)0L^>oObv7>0%n!pr0|&(ezPiIQ3p);tMZ%Gev{g7Apq?K9D_$w zkWIv*^;vZui^gZcCV;ikZ!>!AI-gzdcNlyGrY%9I)#ETZY-XFqs55E^94jPTsgNe% z)bp5?tomYFO(CuRSX14hhU)zd)o(V|y-sU*h1T#Yt?4xe;}r(|r6&4wwM|dgHat~X z{dDn}r%s-F>hO`LUwi%O7hibcrDtA$`I-GMJ#p}*Cr-WgblJY=YTkLF>F6u$Q*Q{0 z_e;tSE2~dx8;T6H5(E8=fp*4BD>Ks0SeT_YX1SAH>Eu>AITao}==^GZeWA4Eu(;%) z6jJ=Q^vnTy=|OebVQu9RUF8u)$vaXqzI;GiaY$c%#87=)UwuMXdDPliXd>&`PT3j? ztaYbsji(*-Vmq}g&D>Z>jXM`XT=XI*tpG2ck5%fTopIAj$TB>OC7aUJUTc~v3e zCDPC$1Q8>FqC(Un8o){zEwIT4ZEI$eOb_JH&Q_hCd z9$I0LRT5^GG_y;(B-MavU@I`Ooj_Gh7g-)rPvYh)n!s(rSg{HDJ{6rXK5Bt<3lI1R z#02*Q>aqGsv=Dl)l1_mvtxwJF*Kwm-ZbZo-5%$%@DG>RX21Wn{(*z=zNgW$3n?h|u zw~|2Q`LDgAM?jMkfLE9V9Xobz!OCQ0=1XK1BnJkC>L0GC;#IqN)aH0zh_~prV;u z+RP^b`N;PrnhLG8C!Gz21dJH42E(13Bq#XRG}t!IzOv^M6+Y2#k$mLS?+Kyx7in( ztxG`a7TZdfd$ljH)a_mAcF(st*5YkDGo#znBfAsn_qUfnxV(P%-0bDi{=83R(MqhH z-Gf)}o%_R=x4-?Z;`{0{z zzWRoYmJs&+^|xfw@~elReeo3m?mrK6fB5^4e*59?-v8jY_wK)Y_ul>A{`PmDeD=iy z!2A#Y^us@XyV9Z_G_!LKLC!9O4BACGfVEwmu}e}mF(hq6Mw+ln;x=i_CW~5S5t{-4 z-EWgYA~t!SP0?#rben+J@-B;_%c5*I$vRAmc9WvjC~GyzDN(eVl)z{JbPF=X!49IL zQbMAE#Q_sQS?xDc&}@|ZK(_(bMupc1$kzBwY9E1Y4H2{6Z#4ug2CvOP!hzcX$EH02 zarQgS0hi6^wz{20w_R^{=q*;A(X5kcuia{@Es6J47`t`!&ubn>rO5yRB%TB*m zSNS@W!LzdvyFKR)x~fB5Ooe){vD{_^Ml z@Z`_`_LX1$=L3)ZZQ%>QEPvz4x_6!jE;CQQ$t&6~Dm@}9J0>nYE~_d~))uSkinL8Y z=Q1NT&R}DfIXGn=&=6j^Usw(C0RBXELE=AC7n0UfQWq3e+8IUKn&Y~fBc{3&Ait`z zcZ@a1O*O~K`n1}U*7}q7h7-2><47G1r`+^H7wt4M&V~XXng1#Fktv{3ABm%1;%A}c zG*Ta<*blrDkhRo7Zb_I|*1|6*bAW=Xps*$+s&5w6btq^pV9gQ|-=mp?nyUv!`?wV$ zK(M5~P1e*VqXqcY0DTgRgIPpetvRJZb}?D*!6|{o?FB{626^ zRgGZHcwrN&hM2k`qNt0iKxWA}Z$#NZ;tMGo$@qh^3Dpu{vXbgvNmZY$jts2;qZK5y zGU#wz%ZyWDI|snsDj%ncgP%Yr{gvC>I z9#{|9ZReHs$!hk(L?_7fCaqUiL*gc>8lxJ}`T90~DgH)Pw78a$29LDzvKAg#Df)@6 z;OU*RIuZmN(2SeHDhaVm0Q%%FSwVx_QB9n+K(qzbwz^ZM@*}p2L!R0rzJ?QCI$1U2 z=al+6C1j007a6j|W-q2W?lQK5m_u#**k{6m3Tk0$Wt#+2-A)1})=*!Ssqd85bx7;F z$#N$${@z1usRrB~m_D!r9s&Oywu?sWqEWkO%psm|NhW}*4#BuxIPM0#N~S%sIlpq! zEg3R#b7pSF$VzFN;<&Z)x|Euhg3YC+XZ1{y8kkuFE1_y6;YUn_Q=@*~Dj2m3CY(Yd zF43e%G8a(I`c+c_^=yk_xy!cJ=UnS`taUpVJ6&@fL{_8CE76vjPVY*8c%{E(smr_2 z>0a*juk;01`h%;Hz)}w>S?u+k%XV!|4sK2jogauP`~6F2Z>)^3 z<@yGDy^#)AN31tCJw0>t-lYdW-2D2xE1!OH`QwkTee%iO&p-bonDsY5JpBHLhu{71 z@Z0YJwK>$U2AcB7AcXvc)qVKZ7x2E9QmSIfl;F;~oE@R$v3 zdKs;*u(9e?edWozszdcv2ODb-G}i8Gs(lq?nZbCK$$W*ue1XPzzOLzo+Qz3!${#;j z@Z_=MkG*r~(YFsg_VO!FzVO^LFFfCjPf+U< z)cA#f=EktBsYO9=k<(h0MB0_KP8FSa2xu5RT1KCa35n?0ZSqDRiLze~T7(w{?+)0Ym3xu?L68B>s1Gm=@k&E{GCdWh<_ysk2?|QqTcdFxJBesY0vM6yf>mvTN)p&d zy5}8H(aJAx7goYr@0Qd6fI7w101-e;x2UocI|?hPh<#Pv(%K#pOri!QouVpah={BE z6xC+SI7*o_o6}1Uu*YY4!B1^1I75hfAjl~m&d7U@YHnLke&z@V8iEiDg%7HPt8PS5|$a~qGm=^ zjF_ICB7ro($I&bU7>z@d!Er?cPz<1q5(?l5l*iNzl=Lg=$@mNz*s1NrbtadTx=pu}aWR3zP)4FAmYhuV@wE39Nc#+##NHOQ$@t#h_+Bq?r$E zraaP7JAcT+9x}3WM)rt9IN=uNES$WJ2ZB5bd*8wxv2gQ7cHY1qvxAIoftM-My0NScx_R(>GFGYq8d|@s{(WiH-5} zRxWaPb^5)X<#%`1?(eL=yR-iO?z#7`Y`%YKZnxzkm46H$VL8`yc-F@H+tacMrb#_KR=6`GSm-kjcr< zzI^!Emk&Pq{L7C&`{ECudM+0nxP_~wEC{KCus<;f?0`m3Kk`U{Zd|NPu9 z|L)Bvf4TqZUmkg$Ec`2a?MdPWcj(pnV{gz-zRfB;z&-Phxcr#7;<&W>l(McsQF~I` zP^@b#*3*i0O@$`<88f|vaA)EgRqBPw2~q==Dr;(%HnzwbTjh=I^2Tm8y?f7Hfqc!5 z88dKWMjlz-2D~uxk|uss&q-ND2@^kI=BKSfWO}sBR%u-`k5E(~vWHdbW{}Z|0Nx)# zCD4A zQoPj>d3`V7QdAw0*1;Z)Dhb%dH8A0ux}{_q4Rnu+IZVJVrld!xX}S&(fS5Q=L=<4b zHDOK}`H-HZx>Zn45JXhjEv)Vp*K|v2+XW<|Ll1GruLhdn(EV}}tv*S<<LZdGP2yuv%F?I+g&sfq@bbuLI|e$ZO-8#;B6)9z`MPRb5nB*Chh(SMN?T5qM=9G1mfQ#M~05VZW%FyI?$lJv5ShNgiYOwrcPOX*N>Bm^~AG<__5S?%W8Vb zqk{WF2G${DT|T!2PavL2bf#TUi3T6Zn|Z?)?xafs>;}sQA_He9>>|R5?ffx<&VXIc zDC#))GcMt*n+P^dxrEao&NlA2l{0DQ&A0^PHqN+>JLMFh=A2iu;Fr#L#Is)MQdm9X zlg|fLOU;_47VTn-ZlTq<+-6#7Gp%*n*1PN*-OlwM_eR8bHWogYY~38_+8pTKOm_mE zH_}~a2YR-0{hNc4?R@Nfu5T;fe}1U{>|o?hVm0P-`#om z{gtmCUijnhFMagUt&czZ@XLo^e*44M-~aFpq2Awr`SmxSfBns855M{BtFH-gfAQs~ zpMUZ3XP+be;;V;WJpj=E^LJnValFNlaA}fmP0FQ8xzs@Fgi9TBDx*$S)T#cFSvxd+ zHi(+Q^q-Ns%T59zb=WlRHeH)lOO|(=$r2TSb=ac%^K7BY2bk6?d`6`Y6x*QigGU>c z0gF0h)dp>3BpNX7GOKJxwNbCqs3lUVKqTTZIkZ}OT{W$?sJ8TEP05k+;)CVIZ&nn) zUQzs7W$6o5r7zZ0JyTQtY<=DH_4QBH)V^3(|4e1|<3(jpoGSd)p~Js=d;f3V+V{*G zZ$0($%TGT0d#i*4Gyr8jDS|VjKO8omuK&l~Iu= zK~BkcQd-1h8F3r%OG!e_bWyALdH{2Jc2vs(;fm^5Bts^zI0HsP*^&lc%E(V4W8@B4 z$m-_-i+I2+OzOGBRf|Nep?Aya?b3!2m&C1X2SUMuCSwJaRD6soke3cgHF>=WK;Tuc zr+6r!ts$vyjLPdGc%Nlpqkuw?vKqY4c=KU^Lx6)_AjRTJy!JrbK1BlnE3T!30HP*J zs5r(=2?L9`SdbX;jU*1GmH|SVHuDB7{Fsi}A*t;nv3J-R6BU(S&jO7l!xuUR3C=_I zA_xd%1k|F3)MxovIWwV3IU{Sx#LAPDJ!EF*j3{A_+PGs7D|gt;9PCjCV>&ZZyxV8Xg9C1&GG5}s{7)daFP)49L(PvE% z+zv8pin9QG6U9c96D$mJ7Gz(d@KVtCipE}fO%yf#;2x3D8(NP9dV<8f>z0yHojvv3s{mv-0JzBt z@V!OgN-}4#_rQ<|WJ)O#!9zkux0;BFqalT87Jna^wDCtxoG~+R!YUlI2!~Dl5et9R zCctw5yq>ZPr(NP%pKRJIoAE1WJn|`raLOqfv+{{+ghM!L0a%Mi&FoRYx|ua*W=+|6 z3m(a|OEBk?EC!V`UfFy=H6K*Z1=LF|#*J>rMz{TJpJO}jJ>T!$jt4FzLYon?V*Xse zf2G^A773nBw4F4;$&`T zX6*cU7F_%0^61_5>3iqqA$QNs-``xke}3uC**VC)v-5X07jB+gy0?Ay-i7r$>$8`~ z6Ep4R0V^l0qFD`!&WX9z&;IewKmE5G4<77(^6Ad+KZ4x;WGa{raR=7xzH) zF_$*#()K$w5vQilsqJxSyY1R8DqdZOUE6LaVK-W>>QN}oyP12mg8%@)F%eRhN0tkGy?Qi*`WX4E#-7FCv>JX3J+^wIsNkG^&K=<7wt z-Y7o#N=5ODHKi|Am%mU|{(M8-^Nsb-)0>`WvYu&VJYHG%tK#yX96j~Z{YU=pwKxCv z>8F4C*l&LI_^%&*>{rh{{;QXt_~jc<{_@Z>dx0{3bNb~cOUR187pe}vT6g4)#$#_a z9Ea?yKems4`Vgb=FuV8&xA-vk%n@G65kcuuaoJH>`7wFLadq`cOO zGE3d8QZh!tuLx3$BgoVc!D2e`3)a%3I^yjB6a(o<8aOF3$jBeC@X}^(+QQAim~%?9 zHl*UbLo(`?k9ibh9_6T8F&)s%HXEkHx*4P)!(>o56;x07Rg*zY-Yrd;IcTt3O~ZkD z)C>?D;;4&P1$0ltCevbSI`Kx3)pp6N`&IQ(bwi)BA);>VQ8sh|f)(|>crB^m{e6o1 zb|D#>AWT+T+bOQ-lU2o3;H~v39atWax;CK!*=!gv(DD}6n3F$Z=Vc6xq^>E63VJ%w z5Rx@Ab0#(!MWn3Q6cAii(=V;*6_)o)Yl+7Nz)M`2R5v6Q^+{zt05q*`+WUmafR;9( zX-eT`2E@n#KtO>8XoX%`O)Ia&P3A&L%tbq`#8g+Pt3E9)J0U7P#x2+{E`t z3USJV%rh;Vl1?y3K^d?tscc9nU>Vo;l5rJcDD;V{Q)&jZ7w|4kfm%WZ>Pp-~V&ckP zQFQ`a)$~3IAgrNFP)U46RP=694J-rnzgGgb-T(wl0_+rZJ;L%XL3tOyqMcjO!LJ06 z?csGo$0kGAT6R*)jz}9jc$Mv(vQB<^2e+)7Umlk?B!TQQ*a!99g32yF%!~3)m?qNt z7EXC9tE7`()y63Y){~DNl8;+8b&2b`#dYoE5Vhn>hp=yeq{8YBUIkcl2fw0IP}M0c z?+}#sfWUIf{It^nda}2R)0UM_I&}F0DyP>oUs5jG8v2XAYa#c_W*A%vaCM;^|S-h7GJ?1NLH#7`b^pdq~Heu=1xI zf?2nC$uFPvil;o{rDiS2^|Vhh?Nv_uRMURVe6wk#)4C4Sj<}aPtSepi)o$lnuWO^< zx7zDljRe;ELuZriVA&UkV>|iSb}n*ZD0X2ud3h?o3$UIXzBDs>VJd%NYUun}=EB4v zHT{^sFrB-(G6|%Y`N7p|7^!+a%e*EwoK=#+) zegE}$KRo#Edy02|4fy^Nkp101{_}tT9~%R0QHLhwHz$Lpq~DYvVvKo>{T@S~Ti@%_ zcR943fN7hi&8BUogoH`j6KaKbi`^Ku8-f-sxUzIQ~@Oi6={oo~W*Trmptc`ub<;X;0PDo~UVf zqO|()!ji`e3Liau@WZB^O!ESyP~^D>lc5e47+7RPU)aS445AA$VS}qQIBHW ztDFiD2mcYbV#KSQ3~46=nlYbx*sB`$ss~;2j9rqkisA-d(jtl*`TaUphqR$ZRMSZ! z-`9kx=y%;DoPSk2sIj!BT~G$(>JpZA@Xz#$%VR3yDo1AIfS80}GJsiwW?s(1A8|-P zPICqh`ErwyGeBl>fMs=QbtBBstd16!*Tm#CaU}_bme!J>X(=*P2!e_C7Qg`{DvL^M z6N-k2xT>398kJPVWz|V#^?;^s$VkuV37L&ipLt5C8o+`_EbN>CZ)GC{uVh-?5QmbG zRP>9=BjSoyc2S64=&d{HZ8+&~DzMia*Ownw79TK_A5jP`aIIQJ^F z)+??`XzG)i2B_O+R#6M*3@oi)DY3o4$H|<57U$APzT856f{{E4GGI6K8JTtH5>|GL zDsj1b@N5Vx+M%n^XHjL3j0~e8#i4tM-9~0I@V8gq06O0#se5F?As({{r^qy;c*ZMT z45}6bsyUBn-Yc2+$rt>J<)CWTEd!OFcJQa{+;IyN>8wjIVFgS#jlcv0v$pf+-J*Gq zaLy~5_erqtoL4#v@yRCL(g~MjCa9SU8z#K!nV@c=#k|yRTW+^3wp&)Z9LrtK)n3oJ zMDu2{b!(vWLbhjjBz|!?zB`t_I+eRIJA8F|=-S-K^@WKWOEcG&XRa$6w@n5{?rkmI-kiI;wRC4|_4fAa z?XBh8+bhW2*|1$+1tBk?`$t#S;(zrJ8~`7Uca%sD;yadoV@w&#fN{o^Zh?v z`RwxxfB5*qM}N5T@h9(o@zuunjyWPf4x1qyhXm)CYHnqp3wCm(rg+L}|^Lb5;jGCH; zit^gB;;J(z$_o#bp4wk>>eaGSFP9a(R95(6Y2gdi<{q?C= zpDKIfsj9c1YdrLF(~(!3j=kP^{Eeo91GLizL6d2P2kTDlZzy<&R&a!I`Vgo1F#8PQ z&dk#X`DczuD^7?@kH{;Jt7;20^@W;}SZ>-u52E5Mhl zx`buG{Q=ni%DNOZfefmmzF%4m@amU0g6?$-%lpI?&@l-GHq{Jh8Zz1@q)-w#K`?#5 zH0W(oRS%XnXkw>zG}s4Oa61zx1Bzx7jJu^HBr-F1z`z(Zb4KifjF|`GoYJv@wn;KV z!b$152@P?D_^BYHxRpyj4jE*U3BxeA zqE$cw!0tH?wg{@4xfOl}HkAh1l^%LYh+7p=G2&WQOijMc(j}+$saaiex}RMg;NhjH z@^LCdR7BD+uewE07h;!%Sf#BnBghBl$)|Sw)I22Rh*|1wDsa`G45I>>=PX6{9+?6b zd!@q`-nbo4t!&&W88osoI$GYuCLVYp?R-ErV&P6YMbm(Fuapwmq)RjbqfgV2)izB! z1aof5qF=V;lP>sWfcVvrW;v*y^+@MHxBbd7r(&_qHXAlAgbZiFsXOgUZI-nz`(m4U zrOP?rW?$-Xor^Y~kGGyrcW!6l>&ufjR;I46PG4P}y1FubeSPlA>ddu`g&SLIH!iH-ys&ob+}y>X&a7SNFsWV9 z*!Y#}Yajga(!)R9{o$Xkefj0tkA8dhcOTsNDEc@YKdMcRLc268HdJetfEz(tS&rQTJUPYk>`#d zeD?S|kDqw^+0%z#t0;QCuKZPc{c9}dYi#awbmr5I^rvbYA1$r^SwYb+j~x5yYj6C` z^RN7;XP*BrzxmDI{Qckk{onr0qksE1ul(JAeCucb>Bv+6Q2gSr>h?d&IPp5S;C24# z{k+11yrKjAGl!*>r({(pWivW30l1z-4~vaemneapg&I#R>3be(6y`$q7|m zp}Ow0vZ?^0swvbr6q#setc+q8@u;ixaDm0Oei90@ihLYTRNJkj^{D9mS{68R!UW+A zSovu)H)|IR+WCW4-iQa-BpbuK?N#TUk`c11RzB(wjp3;aXr{gDF^_WCB^$9zM_tq= zr!r@ijJj0|&F1-#e#WmI_b8Kk-c-;q*J561x2*O!q2_0sjdRV0QI{0$EQGbQVcmpB zHtkbR_*4@f1!w`aj7v5XP))cMfMy_d-pZ$zgGncx!Z9nJc0QirNtbxmF9%;C^X+C9 zpe?FwXcts1SZl8k0h3^zMG;=Ci zSzx}WK@~j>r_GfoT#aYk^ipdB`QEFaU*~33`PemKeq)QUp@m-`=2o@xs=7pV9im$7 z8(@?)GeLOEy9L!yB+cw1AFUwFf)!sHkyH_zUDXH^A*E&ZN@^2o28b#^Kc%HdU`gv( zBQUjXg1m`8Y~~|BWMpOa%zkMdA=*-y`7q%b17===T3rc8K?SH^6>*Ce z)koFD?HX2mQp*_7F=3iac$GLxN=u`@Dag-RMZ*s1pj8OS9<-7WLn#9^s1UavMoh-U z&Kg;$KcHt%dKGCsi-g&shKwPd;yUtWcTRaTucAXlLU?ye$d|)9g;m`oly+s8w60s) z0Q_wiRJQWU+XWTamoR;0;{dd;j%b<;)V2Xyfey-#t+*N;f~sB_8E4NJIaIg~MqEXY zNNPe%z-380js?quUj+#>OMJ8m7iO(qWGs?Y;au2Pn(>Y`rqrb7MGiEg!iy9KAdo-^s_f zbJ5Lg^n5O{HIzJ;jV&en*0PDsk--a-BNu1KcV;JcrpM2Z51*eL+ngLbJ2AFCF>-!t z2| z)590$$9I>2`%{m-B{Q?w|xEl+U3>hjgbL@Hhsx>KGNLP>J4{w#>OYd zcW-We`t{WZKV19r;l+TTlP`;IqFv_QJ1=Uj0qgzNcu1U*w&9Lsay( zpy+_4^oXqTxVY@7sO&fyrl>hBuPu^SpO#k_%4^T48Y{H)N&}wR697e4m>@aD!;Ja#jSSnYJ7saps2n@+SDRxYLhWq zB($Kgsa4MGP>>jAQBWrXuUAFykkfm$+^B&UHFBeRe!?tDSV?$EYQ>Ojz#+>4I(^!a zfR04w^l66unvsBh*smWC87G3q39=g2FcH+ww3w$uhS{)TuGI=%zR+r!2^z+|n%S^r zzSTAz)Q@|$b1fFY_q0zpN+KU9M_md4Yud<98TfgdbjTtcaY*wv5%K!>C_y_$oZ=+7 zn1Ks3JZ~2Q+=rc#ai3~BpqvXTX9Eh5+_|6{7%^;v!OrVf(f|iQ!%>HH)Giyb@$(io zV0zfX0dXPDuTH?dV9>;f%4$1+iQ-D~npk*a*d1I?0lL~aW@Uq1kJ))+Fic5?KW5{B zhYs6>c>-IKLBcKpPb`pnK--{E0PYW38dEc)WDt|nB51_h-Yx_v*Y`+hJ(9*ASyLOg zx>r&UnjBL$C3T#*ju%&h%`swR{DGFzKqc^pEdXD^s8y7KDpkqUU%FwvJ})P2+^BD+OZeWJ>!ya7}_ zO4A0kj3oKSA&{DyJB79YLsx@$qqX{8aXnNNnvKdE2Mintv;vtVFt7(LuS4rktQwAPP6H3^bTwb5m(SXA99%?Y!Et$kKYU9ngq~kar4Lzgh3>tU?8dg*W zy92ieikhBOvy*BTHR=!hqPj~;3-M~h!p2@LKW35k8)Ye*GVjq2x>QqP>rAtCzQeiF z<2xH|UWtTO`oo*)j*CN)3)$YQW2vhX0~d19-Qm=Ync*9=qt|A~uFZ{Ko1eHcJAQp( z>gxRD)rF~REAzVxGglVpF3e2s%unwu%x=%mUR;>FI5&NDW&Xx-8+SFUcaUOKz9IWsob7w9qwEG~EV)ZFriA7A?7+xPzT-{1eI|MuaZ z{&Dict|XCTq;s^PNzv4*aBhP)z0{D-oowmd@9%ia>U&Wje~u-1y1L=9(#l^RJ^9nu z_WkV>&;0-X{%8N;?|-~}@{0&HGZAwm9N^h34TUFc^)n4=xeuq}jrWKG_B^q9jNgA^$`^}PW9f@-i zH;YnMD%hq)lCg^OZbjNG1X2u`MM)BwQowKN+xPx*~w zF6D?#0;_k@BcBWF=0du;fMy(8#3q12OvMEfPr6luWXSCM@~a^og4&ph-6a7X zV~~aH()unzRgCi6gY}#<(fWjyt@N@MdT~Tl+b^jn;}U=dm`VULX-%)Vs!v=ETn18) zSotsuB8vK6^2zqP9x3tq=#$qcb25+AmD6MLCZdxx?5Kj# zBW>ss*R}Dh!JYf%4GG}8yeT57?-AARZEYpX{p*18P(N9d04fSPqmvJ7qXvx+LYHgU zF(sp0P}9yX>l0Naonko3{&ar-saesDi8> z0tasw)}Rk9obpaVWegWVP0JX$-~pg4eQH*}mYXmNQzl^?tc85!L6k7^Bj|~q8`JXu z#}PFvWfaB%&3ZwKe2oElUayi7Mc>c|gP>o<3iGNuBn<%WHgO$UB`>HYYd&#jh1Ak{ zd1D7oR#^MUluL%5K{=1xC8JQqX5J(i3Nl8{xJ58(5e(`%P}gZK3w1`UqO_I?+X3)B zWa3SG6w_`QT9|O+NfH6jlUiO>i!Sm~MsdGZ(52)@^pXLaD(BXWdiB#m%Y2(-xy!rM z>0RjbEOvQUdIL+n!L>;ET)h24ruWiF;@U*!=FHIbnf%T9v1_xVmuE(<&W>G~8M(GJ z1r)x$v2tsD<@)Lpk+tRP>&sWymM$+ZUS68Ny0UO-W#Q`D;JPrmIQ+8s{3i3=;uRJON2ue*-6F72q+7;fc|(dlU?yPfW+|Q`3>g^qho=pR|Y*KwgVzz#-0g zl!GpL)(Ooj9k9!?4jGBI?vRgo)kAJo&Z!s+=tlva0mFz-JM7nuhk%=galdxdubBwx z=i4oF9rpPy*J77zrN^}l>Ben!Ep*ryJ8Vl`PQr*=Eeq|o`F1F5GyblkLZ@pElsROY z0RDz8v&e_dv(1+IX7iX^H5Vcw*XP2f#a7$6Pd5of3+iTqcz8^}GL+A^nCF_!lL7rq z$T$y(BP<>bMO4J=aM!pj+mhY46PSr}oW zR!$h0gE|^251H60brZVX2QDRV=$F7=s2{&cp;c>*1C43abI8 zUHqCJVNFzAmsB(k8UR@IerbJ5O&>IHvj*;vnKx+WCW%{g6BNUcO`OoMx+S%3{HhLN zO`ohGp`ynWjbPJBFnu!UOqQXePM5g8UqJ&;OzXL6JxYk9UfRGVUfX)&D3a2%@pk~C zWoL98z{`M+4OBrpusk3n&Yybo`?y)~7*Gn=_RGk9})@Yc-GwaLM&liBOjLsuqq zS0;z9Oyzechp)^{UR#{IzC3?@WdTI{>dGQe`^xgd?!w&Vg}F=f)7MuPLBlW4Pw&o6 zUYH&~KQX#FF?x1vcx@!VK03TOI53}0PY)!Is*>zm70HWsg)U%9b9e{p_zHQhdw z=$IXg2~WPoI`p)r_zhRhk#=^`pso>y@Pu2s;Fqt46e~gbf?v9bOsj4#s9k6_f?h3# zQ~;X!kan?IyVhx5C1P1^H*HYqdWU7L!?MzDo(+NqO2^$YWGG`_G3nLJ1auQ#*{DM_ z?vYRUl%sAracd)MN>wDViCF-fH)n;~7v${XF^_!IK?v!nOE&6J43W@@vb;kw?2=;Z zh)X`~5KnmIIK;3G%v3z?QBQi%6b_*vzI0wCaij}@25QC$LzGW>Wm8_oOh7vq)Gf9c z=7O5JfOgui8FtFRQm2C2`4;11n{B?;I!iu$VWdVmtOUE;Y(U$^HtS-md9lT~(q>-o zvafeT9P8b#wN3{$!(mJ>yY;PYjvB895V9@K$M_3RjsmvWd^K znLT7+4eEj2#32ebL7+OgrFe(I-;-L7pHUiQm3x?Fs`8_Tno|yXsfS(eXezeUp7t@y z+IVCP7YsC_V77~zYz<}dGbgnbr#UAM(N7$zI`BsAq5Z{gzEO4baOvCoXeW<1ojh4_ zZs+BWM*1tvk>TeXudX(cTs&SiEmDQxmeoNB`3jbyXABc zY7&%6NWOXBA!+QAHW3_GG9Ov?D^~)_vn{%{kY>>&S+&2|gYv+ZVp_1SLwxgN(xhwXf?3t)Y=+qoSJ zTuy~ArJ65iTCWavUK#AVlL+~0IVmnS0@LN?v7;u*_Wn9F3*l#Tb#MEG7r?gwmg3cFugFlyD+;oJ-IzIacO?) z%Hr&mrC9>mGvm86V>^?>7bfyMQzJW*Ll-CVoB8y{U}7~JU(UoJ>pA3OoB8DCaB^#G z;KF$3(sb_f^w8z${4S0@GmOlosod4s;cN3_H&>=_tm~$sx-Dz%z##M4PRqGY6R!MnP(>znn{}%#+Ladd zQdqMb)-HzCi>=0m7Q=j4Ki{ldZZlG1nh9#bJ*Rydfa!9ZWwFh;M3pZz8x~qn-vs=f z32LAK=2~>)UL}n5DZm^+w$%g}UBWJ{=A{VCswbq3P!?l5G z?a)cq^)AOokLz5Yd%HhC_G-6-VnfzYPS#l2SE0Aspt{hAeXZNI)L~m}Go9^o<3KY( z-Gom)8#c^@bTa|Xv|l;xQ_Ka`Gk)b2A~XSqSVuaLRzz+4$KQ=yiZO~>A*vI zF*4o?oNWLNPw6;-A@r66lduYgt-`!TFbu6@5o8P;fESJh(4>Z*K?Y&(0+%^CJqzdz z00sJFbj%?mH%mq`S->wC#Ch^1KQ8g~FymY}p!sA+3m=?4scHnK6U5gu$6R6{@`x3% z4m*H1ViSzm_(-uAnnE=ki$oZBjnwQCP81 zT0}E(VHs0%t-KVh7P8=re2su;EE5kFMnVTWgBK@(!uMjvvOu4^fyESw2FnI9kARPB z*xhnkuM*{C@C2Nl1UJ`^2wacM`Q((Fk$ldtAW>4o##tD=VdEkwObAw|VgXjCU%BX4 zt^?Mab+caCv`4lW(yX)^fGL|jwzHkqvz@lH-2fx^*f+l;oEch+jGM= zXYw~@@&vUfb62N;n-jNI=5MVnKyIuq-dJ0@zP5CAb?L^&%8iY+n;Wa(*H@P3uCFcL z#HN*ntAOvt*^9FiJF{aKXGV9XhPK9YTcg?YBkA+QX(094TzqpVu>-IkN$yT&E>C4I zO=T`kq_0gQpSd(Sa21+kJ`cG$2N}7&JaKz@>dxxS-LrG|H<#{ht-QN)_PvXn?_b-w ze}47OLhfoha5d$>6!%?Chc3mvyHVG*bm00x@cKaLW;T2sl0n*XBiDXC+k9=ne?8^D zobX;t1+J(4S7Po<5yzFN`+D4SCFSJZJkLzV&WA8=mb%a4YIRhfF-U z6$_s2^PcN?gjCC56=C&!Kr!nh-lem|TM4OR8nyz=2q&l?ci76Fa0;hA zl7*mhF{H%SahG^5s9bK<&G=;FF6oq4KJAr`*@;gc8A;GFM=Y!{vZhxuY88w-MKiEO ziQlSp(j%V=XeRu+F_#L~amvWYOPeur(88EYLV2o)LFb39A~GcHQI0r-Pz=x+b3w(V zOFTek9eIOhzz}x~){k8>>QbO7f>RbiAqnjO=p1vCu<|7MC5f6T20V?qWzaw)B!VWN z5@0$ibH|(#QW;Qah>PnNmO@iINYU0iXnErm2tQW~|Zyix@C8V3rPAq#27i zq34k(eL8l=$j_LBNdspPcx~bX{=l-+D5SnlmBZPE! zjJyODh8rM-2GbUC+ANCc`28Ag(!ftqUrI}x1W6q?p&}Lu6c`Bd-jezx@%dwsNL4Bl z&yNHQkkxie>Yx`1m>Su@+yU4wz;y6;XfG>2XBQ?6Kuj`~n$R+0s9+?P0htli>aX^cGQIaG3S5&2SpZ3UWZWg6^e87iis_(! zE~J|eny|Hw2WBJDVGJ))sMWFWO zrG+cY3s+Yct^>{2f#!?X0pCk=SC;0lE`fJXUz(fPogLkt%wL!o-Wtnnk7X`S<}MLJ z4FQkNBeOf1y*!=0G?~6Qp4^>C1GTSC4PKcYx(3LeAHD$#LJbHINa;GPcLO#81Vebr&Kp zIp*4pICgriyM1Bd)C;=Vp)nLZ6F_P4zgo2z&LOkGRkG zgYSDTM7KRI66T4u?Zs%siztQVi>2R+1c(>x=?PT+XWXpCkw3P^+i-tF&q4WKLttenRbOBrA zq1}NN=yC$P$?%1A%TBr#+Wm4md@0j%G2M&`=cA#WMDtD}1Z3YqYbmrAJ|7EiMgv=k z=Iuln-PlP4wxhoD1lhsaZ5v(I^$zn!hiSD%w}NL9z#UXB5a5>0`Q-}%BBA@9Pvk6D>G83mM?zoLN zYT-^e#8YnhxLq`25sVQZ4F0%NjK759fd=Zqe3_#*9*N9j;RD)8{7V3qft|OKNSV}t zjCkBB0pMnIjGTc5s~k)amC5pBr!;Suf!^lL>>(p##KJ~q*ai+OK%Fe{^~NS1QphlN zu?z7R^#_d%a7kzdSW7@;G!Ebf&JJ4mqb}ew;2Ur+93kN-WaAz=bi;@X`bmaDGM)}b z3|bBNHuA{IZ(xd!87EN1*`u*Q?IEiGjSRx(z&S!d;X!hZJOY};u>mZS2jI?{MQNKT ziE^W0&*5RfBuG$890yRMJz~0c$c90p$cm0&E3$CPOzM$QpK3MV!H7WWtl3 zHgPHbiz@@l&(A^;+ND`254)6n)X*-;yX4Sn1LXUeqO4U!bOtqP-CP{MzBGArb@ul9;;r??o9jzA*O#xY0;%UO z6PdfZIuEeEz7Eu$zq&eibp;fA=JLYy<%OwB^T6xzixgyUjpw%}hquXSN&ez=o~(DD z7~BTY9?M)HX?kloem)=D9Eu{{8i}7Dj_r)4E=^`Yz^~5cZo&ds9>23Pb$fjlMEl+C zwfh$~-rGI*!G+b^lgX`!^J3I}1;lwE07Sl-2_n5iaJl(b4oKa8I~%^03Es^3Z)ZZc z212*9q1%JuyEzE*Ve&WQyE)*wHQ>LM4&F?KuO++y=*#_%Oa0EvG0&x#8_fN3)P=tn zLBpf29UyhwdvzdqIqAC;_wUC1JN@1ZeeR3>?n^Q6ZVVXh2J7GL_gs#WeJ>@vCzZXCc zf`7itdA^6#ztE3Ec(;kR0F>jPKCpN&{j;5pjdmNj{7%HP8w;S?W{-QT&vz-+yb}*x zjCn65Lzh#{m(s15GaVOE5)bagf~a;8m81R(u>e|w7J;hRig-8seB06Bxo#IZbdU2~ z7a4-Xv%1n^JlAPmYcVYaHOnFOdaG`=MYGnTUJ5Bz!YVSL7gDaZ>HyI5Fc6)>CBJ;F zSq)ex>jr$XrLbbbFGXb_{$fBq?H13YFsLBmamX~LaNI#+Gk}ki6=5Fvj7vK0mQE8g zE}!xc7C+^dOgKan4&j7DFy#_WIQgSC{-~LYbS|VqH838s62~i_4G^Eg*?@|C=E+Ug zKur4-vtH$lUp*dBjd_$~VEP`}xLZDI7oaB~$xj0vO4d}t30drEIB-rQxkWRF@T^=nzKm;0xT$S|kHDdD2Q|!qZj) zn8OE=6o@_K%s3d|Jh1o{KL z0^UJ${1`zH-Od3SsrGYrSruBXZ-*^{ZbKoF z@BiiY;!dlZQaZB2h*|_h&l*YiQb0NW4w_(>KONT^S|D>F9fBg-xN`G9WHtsJ$97h0?& z&b3Q66C|@_b1kNskYUoTmAafnyFMDdHJQ9Qp13lWzCM|`Ihnda4OqXsIDBt@2rT>E#ry}W ziu2h=7jXvPUr&yU?$oV>9(bz^Dz=IY$7wT0^|bJtcDZmca` zTbV}&TpL31?j^wY6~H&4*t3@wXCTCHWR{F{@63&FO^u$P7&|vHa(*ID!FTrjC}G^2 z!>Ns2d}AIY=P@n!v8@Lbq+V&#~QYJKtg5>A}8kfa!LxW4q6}8}|dO_YMu*-|2H*h`6_V zozM!~L@{_T$8l)?)l_gd<^!oe-(v@PzZ4H)-?di5O0)i4m+f4q4Ui4l?scE*a&C6J zfcxir-RHYqVDYdLC}k7Gj?fvKU3Rc|@OnxUc+W$TP^JKt`p!rE>m82O7Q@*N3l4|I zSHilrR^uizEe4o_D`EY5yJ;z`U8R6~(Jx!{Nmhc&b>sued7ol2pjrxPR-1K;LCs=F zw;Vzp`Mg`a;FSQxQD-rrpqB57W?X_Pps2r0e$`^L4!cYN_kF4fr)4&^J?0QiI)szZ1XkXZTSzp4O)zZYjN1idxw1o?r@TkT zouKW+5qs1Q>=uD{WB18`YTPHE@XE)$@*#^LZ{|<9iMITU$2xVCZ( zZ@p6v3OQ&7Sc?-n@M3_4Y``pzYIt#-C}UNm%+i<+kS9#)_*n};M3OQA=0J@FQ7so+ zvo?9wDog5xQ57ASGGLN`3=R+vOYtBXIT2(X(jgc5#y26$WIkL5)CTyXwUkku)Nsi- ziCvZ=#GD{+&MD1U#VHb$75FG5Y}&vdbgHs8SwzW5==d3{1jv;zieh?x7Eo@JB#iuo zMI1Lv;(Aa~VcZ}buq)$6ai5wS)A4cEAocw!WJ~b>u^bPePa&$@DuVD2^ z8UV-S`?O|0Ob2uxIwND^W~nc<0EMZbU1YH(h%<$}G+0-#qNqW0F35h?L+_zE24MD{@Atvx-A%PzOoT5Dv|rA2T^{VdI@EhD-*;m)2E4vCnYulhx;d4(Gn)gU zzP~X1-ty@CD))+w(Kqb2D4B$V_iePppjOS4W38M)RBFBioas=f-m9Mh7=X2hR?~7stt%$&JO)TPu@yHWu!0ufD&t z@&4A*t*PYYftD)+;p^$pwRHH#VC$XXuDkg*ux#+_J43Cvb1hWbdUvSf_F&tsO!#`r z59Ga*ZMluZ@BX=fIA(!JJ@!2xa(%7`Dz>$LN~K5H`1saxSj^G1J*&+iQF6j zRS(=42;Rsvqp7P2-{pQXJhB`0Ky84PU+#Bbj(V>o0@u=^8w1VP2EyRWWT<@rJq!YZ zFZ2M!p$35dAqqEryQmLB9ry1@H{WJkTbaRRJ65ibF52sMfVI=n*|G%{X7 z$rJt^C=WCafbMnz*|)&EBfc#H(|}#qZX$dk7Tk^ow)z8ja*)UFyNS?lDhxzE*9};A zZ1wuLBmT`kKOVE)BpGMB5D#w01KWwvc7lwnoQwD%TmAmce&0q98Qa;Iv6+L1?(!q{R+!2(JH8SM$eq%QNq)R&CkxjTIPz)2O zMb8}%7y`;Ad+?>qYfGQ_!RjBm1x)|9&v(qONloj8gxqXRv|T2D;aT0 z$*?$?vE%}?(gt2y$AOs-2pb?ny6lvm4D6DjSTz%z7vvP?eA0l*fL+0mT{=V-I*I_w zV9HsG7%e0;Wcf)^EtI41?8i}e| zJu(`!OV%VxYB(_!aR-cQ`Tc56uZq{N1=ANLOwy=98r1^9#W9^Qs^!HEBIu!h4Yyyz z0kS8}(u6@0QF1}X_k3i39O*VNfu~6oiBm|%udO0<9`*_uL~@8nT+$Jzc-Srkn?{8k z=&+dwT1~ukh({)O$ikymkCRcXK@)30M<2HH^EQ6o%0*_x&KtJzN35`Q$k)EGBbht3 z3c%cRRz6|z$eVaL9GR0K6A7>(gwP)VZd~xVik{Z89-;iMObe}`%$_N~e%gme$~f=W zf@RMJw2N)TVPGk2S?h3Z^x*aItarK3_4#%Z&3J`&QsFCu?N@VM*M>T;4R&15_uLqX zKyHpju8#n+qu|%Krc(E2GB>Bvw`Vf<7KYwm8U0{wg2=|?hv%j~SfBjexvAf6O#T*l zy*>%L{qD->duvm77RPTbjNM$CzO^<_W*t|_AoZ<{H>y_mz>#LWk^y13W#pR_7kc9?r*K$-(0>mo4Z2RaQ5C9>Ag7`xiis!cPf5owD;b4|DDPB-O1R! z$=KcTzI)@5yQ96=2itGpat(Ie9gp0f?7utOcYh*!enI-=_8E~_uj!##-otiWBoTrdasYiuI9V1=DKf=L~dc<;oj@H zuG=HMw?}(#40qoe@4r6Wb1m12n{{)v|9ZanN~Ys#s_j~~@l#T2Tc3;eN><;!^9*XYfdhr)| zq?ds|^=U@j>LI6c*ryxu8z6&D#h^_- z?9mOn)L`6M&{dma(4kD2rD>OX(5cKg6a!$>HtDcOGZrw6hYTYD!;s%N>-;7youKvrWxzLZUjk(Y z4N9~E`I4e65Ay=N-Xt8hBQJ*$Fklpd{$p#}2wlZXn+32x9w|O~{7k`#GpC3YBP}>t zQg9Oa5=g;`lGCT~xAgSM(!x_^MFpirr%MY9AZ3LGlG6d^4uE=2lcm(XEy^dE(E7$;avog>bdS>f~uBg(uIPK8gCIgsNYB;wV)CHIEjf z{)wYSC_#GsNa3-=MaK{C<%#?ygH6X#?HDPcq;RkDi6ccPsY3LJdZ&s{;aH~%QIjg6 zcKLCyyiI6}$MLj^~%*I|^OrljEL zL8RE1YKJs(`WV_Il}{bUj)zD!{6)2+hYGQ2Z%4Fq1o^-EON6vf^2ZLJ`tc}7NC&74 z=@Rw#6xD}Q#}1!7e2~bIL#K`$K5_UEgepPi;E6*APm%INq@80&P#GEQ2tl0_hu(qg zWytO*KeD&)!INauf#U}c9DC>Ofke&`@tL!CV#)sB$%$-aB#Kel$@B;@cr)b8Xj zNe>@H3&#%bKl;uA($qneqvYVRgD5<3oZ3ou`Jd$!t{V=4-4E_3&7zR1cIpU8slL5^ z{NR4bUWFf1l6jkw{U_de`{W@MQWf4IB~&A*LrO?LkD%x1|Bu}!>E2ODBWVA}29Li( zj`E|Bl6M|?`q}56e)idaBY!S@=FcU_{FOZQFY?U)LZ1GAmZzV5`e~$lnZL+h$zFy3 zCwYpJf1CgJ1iydx@6%5|1NonO`@a)v$Gr}aK2U}K>fHZ#fA_A^zuNk*WN+(V*ZEiV z|LrEE&ph+wQ&0aWdl&X!{oN}enP({ZtMVU9sKURl|1a{d>iF7!e=UEh{O`zK2lg_5UA|XBI!4KpPyLJR9fD;3yp@#vCG%JLzpnq+g@4)f zzmy;A|F{c!^5=d3TBxm0KK1w$Pd<+H|AqX&t^dCja`b7$Q5{+q`h-%J0sJofniAD>=pCXR~+_g9*xE6N}TA*l=B0+<@Q{17@7AwjTPam31caJ+Ot=Ng%Q3o(f`K~%0^rj>pI56k)ZPdPCkl!(Qrh08 zN9`zqIrILzkH$8+qN9A|0KOuQx;Fy}y^1rXipjiwMox_@^{s!MW}NC&e=Y_RFu8)6 z;>fIwer8w{PuXSM@$v;cU#yCPhv=4SKS8c5o4ImsPCw&B?@r|9QIL^I@#4#KruT%0 zL_C#+^lZ2YQR0MOB-YuCkvpz+yrGMgOMb}ed~(Q^_)OUS4gnBZe>yl8+*_;=oUJYO zJ3d+xC;a82@5H)J5bs#t>?JZ{ujvDRD_$~oVocBD<;d}IwInOB>+w9~ah``j4@ROY z3>2s$lC?B)7$a=}yFJ{(UxUsIoM4Js{Y%3cC5eq|93W$>`l zt0bS$Hf{yLPBL1GLf0I@I~+MLt?OwfR$)x0aRU`hsuGDRl>o?N<+$Hwst|u)6{^bS zBaaOhvb0%KsTmH9Rw`*Z@a!Nk-{^wvJUyHYthW13&Ca4E%CSuN?}blnI{P^A=YDK3#I*gVH5E7(Zn18 z9&~Qg6snyNH!^CPcS^MwiH}Sy4Z^GGd5iaJaTRmIdWp z#iYppu6ApEP+~=_FtxV0cHj=FJG^|B4=JC_d&IZbJr{y%q8nKFJcbV)35B^oY)N8S zxe0H(k-7i&pp9WO_iPV+MH0u#H$=fnkr7!xDt z@!x~KPZd=(pm+!n;aO`&^bx?2Nrh9-M$)-RWa!u=CvwO*6O|dv0&ZvCn}=(Kzmqdb z2;M6fx@XZ-P4;SqqlN!|jiKjEskK4}Z|rT>QGtgm!Q{bziKBXdQu1@+7irb}SmX?2QPO$^B_q|ue9r$z6TkzwSx=AriI-Oj2O1@`A{!-5g8S@wS=EBPkg$2lE%7C8b|iZx;VWif>$+x_RE)=S za`@DIXJqGnv}Bk8{=0{#6`?_yweauvfnSIy&K4dirfP2dDYF#T>&))O<~Xvnnta_8 znCrdQ>pEit?pq~;6e|Nk4j_YOd>du_4tT?lZZM4$q%J{wGdj--hUr)&OU5xL9w(9bed|xGHl_rDiadifni9KU=Jgq&Wa6N5*fM16k zVt6@YHJ6|U+&DkuwtAlQU*C9crjkHH$3~1Wy@b<)Ig)3Vm)Rp682$JT2xT-GeiJ8< zX3rz!=wgN}MwL{~TRNGLO#?A9Pi-c6HwIR%W7X@x@L>*!N^fG?Ooo-d0bTf7a_=iW z3=bRO!XO|{>vTEqa6)wP*|7^@9CABT>$^J>>FB(1^WL-v>fV;wk@alS-edYQ=;24U z~^RIZjr!!sTN-`khW3#1kI_*Y-d{Ujj=CsT}5~8-DtDFLTO(!D464 zT&+m5T>fx8jDE6#fRO*~DKLZS7Bo8xNRE5;I1s&FLX z=2tqiI(E5Bq4&QrtOz8K>F>U5)Lvz&{~+9;c)sj(sjkE%NaoWX8HJg%_JqYAPX7KK z)3Ph9jx1kuI4MN_XJq}thcq&pO#^j90n6S8GGda&(^&FKqZ50IaMn)u+dysK zMMCubI(F3Q{$2nXLGT2@yI_0Ky)d20L#YU4yU*4P!$Vwq_2WI8 zckX!DsDrCK-K+lq0L4vvBY4NT?Q=xubERZ&RG+ej-dAbc0rZ9CZrDonT^F$=E6l-Y zcWY=O06p*V*Q1@2UEq)*T?)F+tcSvDMjo3BA}WcI*`K%m8xv3H0ncTf(Bu<1hBGx~ z|6`sHl@pasN&bp`WNNKG zsF3V431b(@afPFxCxp+Bh8Q}838u=)Ui94FJU^B(&$ICeNCXPR`xA9OE1IXtG1QbabeC{Zp5 zV2^%2H|q>~KA(M!f30F}=Z)YL(D9+#dWyHoPzYDcQaa(_GUCCHTX&*o?RiVm;t{Tt zGTUHr_*L-o%@Ve4@vDHxvUu=A*2z0-*8Vkkk0e4ji#M+ge8L%ynZ~czZD<-+?TfHm z+j^QAK3~{W_$tr$NMa$ZpT~BH+|jrd*g-4Mv>{cj{N?ohGu*7Eyn|A} zeSUq)SI=@?TQqI;neb^|5{}KP>chTtPxF)gL$Aw?q7dBp1x;qZC)T5fZ@0+3bjh7% zRfZ9h_EDvBvBea=^1F*gj)m5d8*br0hy`1?eRp2m$ch9*PF1V3h75%^Bc~!5(=$jtBnDE z87-}3ZijTJ9;ZAxTRJ{@HM_NShG<#oDKJ5;cXDkuC1z}uuPIdv>1;0}eQp^K^@tUL6FoxioiKMRfOnBpB>No>QgnJr7#LfV z$0nqnwx{clUPVdvWYOfY-W$;Q1iT8G)Zqf!M6lqOYR^M@eVwv?$>*8p-p0<0fU~*8 zWbU+CQ0Dp8(wZ-78J)l_jNWT2)wUx%;Cc7$ne$ozg%On>^5Oiqu9j5HjT|aifZxT^ zK9$>6BV_M}*4<-E^!bVFb}s<#9N2+wG@n**@r(0F!iDgp?TQz2TKU$c@KESy=Oeif zDra8x_tZ~fq4RlnI8WCB5+ORc0c4%Wc>3)63`|mVc8w!*&`Bj{t2|3X-)lvXA;V;U%$W^=; zYQu?8uK$xY&{9HWvja#Xqd&yGZldGSNt&}Gc#;#i-9Ox#(9GC5(igGR|o0y zuW0cB5omYp!|HN$_H?LK6Rz3wo^#KyHsXM1+fMn-3L*w;pHD{;q1R97G4a<0&I_pR znV)sB3S6)_%aCw>ltCT<-p)V}L>09!IEO_MRiI>Hwk0m$@Jbl^t!7m3EnI zOtrqk8?dSVk<)BV-nzCJRzHp4-b~a{!$ax&Oj>G8rGGf0xOiCYGsejNRiLP>4%5`j z;(;;>VakPYNQRQ{nv5`OxI*Nhug21sM_e3wgG(J0ojq%;gPYe*!6b46?%$9NM!!d7 zg;FM$#l1|OdsV*^CQ0dZ`mnGTn}z=0Jp3YYxg8SOF-Nf$u%3LOVzM_{dyZDF=Y5-N$|1wAk41A!t^Wp~Ki^pUe zL;oo8shvoM75Nin;Hz9{TEjA!nPAE zfOwR>Qa*dODXs*-FQkZ%n@ojShv96TjjPC+HLP$GoT4kRuKZpc>j0bZN~#l=vysH? zVWtzdmG$LpBH(J^_V~g%?@dy#Fzy_9!0>*-jB%Ow(g>&pK4@umxoNS^_#+y(2f20^ zyMbQ_NwrvCr9D(bb`UMz{={nU38l=s>@ifbHM01@4kzWskIWV7Xk80`KEf)Rpc;se zzdwCe3!k!%-ZHp<{P9;RhG`$k(a%iE+7x$GgFFYHToyH_Of-?3tE=o}El@Au3A4B$ z%v2f{pQ}+Zi0ze$x>?rT>WzJn#9Dn%N8@Nwro>c+J8@yyj0r{5B1y-%c7${HsftKu)YAtYMJG z(UF5h*Aa`@ATY4zXaA(TfD6^raV|rRyyJM zk2lymkD9}xJ74HtvejqtpWjVl*B-J0x(Tw3&K{kgMNJo*sWT~<_bwDRa>)AL2b`*k zJ^xukt1D2*R))z?EEVbRr%fcHjYds1nF~u?9E8_=*phQxZNhOUx7RRP3+3=ylQsln zQu*BCSD7q_I*Q09v4<=0M=5MOzP(Q!xUG={?%Nw--S)T3-lpgTM`n|Dw$25=PgmF= zR6HZPf1D*3j*IQ(CIj|ycIFqihw(rRi_kf~sh+CEo1Z)-t5<`>BqC4Xw>lZoM%;}< z5$&&Wx(r+KlpYWu4Gy@Y9++pnMe%43v*krn$Vv79Tc@LCf5fLumRnwOzdwoc)fQWf zRfhUOd5`NxLLxLU>c^oI@I@FA-hjXNA(Z6ww{Lj0`HXmz^P%pt`@BsPD$ZuvL`OtS z2jZ9qgOL9wvYgMu2yk=GiH8Hk>JVlkAy1ZAae-bXX>;GWW0{W;B;Jilj2SC_6>j}hXclXa@gRxwig zL_JY2bYc$Uz!K&3cR5%^UUsBYppQzdjo`i{9~Io2_0x?W1%*!wZC9pZr|bS1de$%_ zt|zRMJQs_hP2uYIxuA!NI^_oLVf$V4nK@r>=QG6Rhc5qe&F$)~c9ZH+qmT*lTCxkn zJ6(h>V8BU8Lk1l3iOA+-`GB=gQdUhuoCEglcbW;if_JDMnj>#v1#D_Ul`d! zKS|`{b9*PvJD9dL?~g+IZy5?{>!}xFoqW;E?s9%uKuYj2l!ZqN5uP^QKcg+hoB7CM z&oR3TSi+HkKJf8?JNl{*oZU-Ho)-Q7)*oG%;?FF(-)LxQA*E`*;yHlo9KJ1RF2w@3 ze4qQHp=%m_|12vzo3Q^jl3(fb@q^@NssR5M zECO^)g3aKsV$x#Ke{{v4T)*LK>Jdtks%;L*`q%}#iizgJ=r26V-xr^GiHZsBlqkqR zpUCu^D#xnT+Cr9pc7`l@c0@GcWrEP7`(i%PVKfeK#q7*f0;`3^)W6158~$=>F;PGK zrk;>r^AN&Km|F0?6p-Xd9#^3lnha3l{;=@IRC8F^q9Ua~Ok`g`sTU@Jg@r|%Ig`+p zjnuA-lQ$D~cE$p%6Hd{dEi7z`sCP!y+M=)4veN#5%}pV2>gx}>`Cih5D3HqFGOA+! z8?sY_Uq2zkWQ z`<~*FhVpOU2$o6DTDZkT!t@P;&UyK)5hT1hNgXQ%GC~(ksz&tWJg-ELNGbC|D+-A{ zc8GyR_!eOw`M04x1i>Z6l+%H0Dxdfd=wqnTt)$8IlgOL=<4(&9{W6S5M08H>cdXnQqQgN9-_E4oygkqW zZsH?LPbp(aGBPg$sH=!r$YY7Wo5s|%z3RLxndq7iAbe9Kp`Dsh^U!{S-x6~Swwzq3 zrB}(gdxS_Km=Y&q1l-3zBVBN?z<&hXG2ZvTfl{Q)mCc}E+jz$H9k&hnIQp&j$5K@L z9k?-HS$iMVy|;i^x^5hooW1=$XOw84Pwl(m=hkFpg;>{oLh$}KU z_wb61d^X4?PbfbD@FO|z6&RK8&x5~rI}kz|DfHOj|MJhm=`Z=$9xP0urtk6%&ctFY zE@#gyh9o|^Fp7h<1U=InZb}e$%{AewY-j?#0{zCfHi+1@6&u5xP&({;fLl=BCq9zux-Vny+tr> zfk?J7kTN%yDQ92y5UV(vi8+(d;zuFDwzg#A|Hg>A8dk)JM*I`rFR7%(0e z;GZqVnNHz*ebn81OH+G53hJg=b~=|%KWyvSIz!uBI6m7@c%60Rtz=hk3G*W^=sS5W z`H1rLweGT(1A?gXYpg#IGk}kiNOVD9b#uVz-ypcF8Y@SyHMlfzK<0-Ve%_j3w)LH` z?+~RfG<_i0oycNSK@cYq98bFITyYwxu^gC$z?tDecvz_PRDP$gj@CLQ*ER?04R}3> z9z1i{jyU1|$HIG9?0Dlki~mvlLh~b|mxPeJ<%zR^jyqNOHj`xc&yP#h?t5x&&rc8D zcRT54D<=?=wWsUGm;2*LUGgYIWy@Rah~sCSb~g`Ie^F#kx$*vw`p>3dP!5h&1t0D2 zcXjwbAa69jq$-pmpV0jM{r5Ol+*m?)nJZ+%DBmP7FCcQgy;G-QOAE$+)iz^3wr_m< zkG`|#)3lky{1$=lric5Xhd2Gq;>)8V)Z?&rXH%cVo13%^{PwmP!ZgiH)O_-MyLX$V z#@4^Zm>@^*l)Ja9?HIG>x&8B*etBjKrb7GQJEe!mo>^{fFL(>w3u?^{Qz9_3;6jBn%e`*W5AWuRh6=U)E z$8XK}8NziBKY87qcZ>1+t8%y+xG%3@qsc>7!PVI-EivvM+(Dzn?KT9K#~lw&ZD;)y zLjL#s=#mX0H=}%#Fx<`y4wd(+?+Tg{O`bSqaSUoy7L3$@Noafjbs^_ORaf&O0di&n z_%#8_+t!_!#k(GEueou*+U*7&Hh2cjTH9wnQ@^vmwo|PN?dB8zlUDQ12|>#c(C0en z8hhJ^w3lV&pWqjn>)zIIocwfL3{E%oQN)9QODDro!xbvD#y~LCTb`h63(Efuo9y^x zzt#^0AFgfQPPqL$U7H^>{z7&JzWEztBx+WSK3+&Z^R0Ssc`W?JDd5WZ-xD;e<>&-A zg54cpu<%F;!O!7i!HhXx5Irv6cV#o@Qpx|_T>`I^Vu9UAP&nJxT6^=frZ^~?+UQfFYx9%&e?3n*{taoyd49&6 z39WN;6I@_$s*4AiKg1hYr& zD;J0Ip4#K1UNa=Wbx!?z2sIE+R-+|7r6VPy2rqOwm}YPRENJ+Kwn=Z)>Qi;+j0(cC;?&L#+-#V&)Tg?BrZ%$8!o zbW)7${&KVeyX;M0m7M!-Yn`W%L;OhIgsI32-w`+pHlg28S68S?v;(0Psq7wszS>GK z!N;c_^(|1~d}+gy>5`&7P*3saY={=+pv{azk{S9Q^kGlDXWVuo)E7$d5{zb4w`MqL z-Qfp003)#4i)#u^z!#dCGiI7~(5ULnXgw-CJYuj|z{NUn&*5d!^E=wG51B;=NZF;-O898o(%2 z1_je9pY(;gm~UYuMIxJ6ASw4L^cG$k2aghKk=EoGIi*n6T1keK5DGL1;AzpJL8T|B zKTAtvr)*;R0joe8XyS^9VF16R#nhwj%?y3I0`HXkCMvlvZ7;3HIJTlN85mkUdLuZ& z0eLD>si-9^JB+l_JhkLO@3-TRv0|lP5KUI2Ay=Gk zBvNz~YOp<#;K*!2MH^e?X%vzwK zq=40*FQBh(V1V8Lis42FwJ%~sE5@@&q7yILvnnUhbf*j}sB4;r(bYxLWs&OEh6p9U z<0cF#X`*bHB~nOUHy@iidWuafsaD%M4(|w-yxZdH&hXq=AA*S8Qgnt$-u+2WK#w(_ zCVpq&Azr))OiD?>P6MZ;rh_VzFhRPuEK(+_0zhD}KSYwyP~6_(P{ZmMIw%UgV|v)| zT$%{6n+DyaB7w!2i=9tVYqL)K?fTjK70e=~AQyIo1|_IBcW{-yRB$zUO4tTAa{e^A zy6ooT_tu{Y3fSOJj>zB&at3Q6W;P!BdZMk`lPvT)I3UP)?>!_(Q z$Yzun4aB>J;L)5;atA$*pa}ulGnt_CD7SJex`M2CQU_m4TcZ9TUqWY#%4-!D zF&&J}+bMZVFl>_Xg@?l}wTFnVugms;ZqVv`v>7JyZ#Zrh5v+SWHuxJ7$pM!>t16mM z72x#y79}G6W=grD#A7Xn%yUm#$s&4Rx%%2+3DJp(P;q)@=NiZOMN!$$oyHFR)2R;m z6Q67T=KLki^6WAHCaa~2kBW+#7^J;_b}xe_*}NLnU?f;%oYS@B{4reed)FV2!%1}q zP)!LUZ(D#mM5h|OhXnjDv$7af zi+;E-GGRaL?wd>VM|E!niypCKP7Bw`8E1TS@bdechNOIi-=K2 zFS*OS#o~EtIY&c+IXkSdPr1f>14N4LLzwwVzy1>oYt*N~L4N%@C#2n9x{3O{i9%fc zD>olyRZWD6+4WU|s{uMYHb7oY$F@UG{)EA=KUjl4x?v^Cgu$5d7JkID!!{@dSFVI| zy+6HCsYUZ)lJ>r=GwW*Ud(kT)r06v$@%~S5YuZY%+yKg6l9xgf7wbs+KfNWaGD&rK zqt1RgLr|2B$Z3Wms$)XW(b|%K0LfDAmyWJf8n5M5Sc6^WeDM7=U2&aTJ%_2vlLWQuRVpbpMc4W| zH@XXb<0GxS(LRnsq4ib9lteu& zRUNQ&StzAVa!}kiph+$-n62OunZ&6nMRXu$hiX&yi=MQhxEdhMaeN3hDC&*$Ke14< zf<>W}>>nRVMIq{z>nyXVH-veZ7}}FqjQnn1cvx*k>n~ByQdYcdpdrEreM^&8MweAY zuPCl1X8nvKq9nyY6w5rXToW)aN_sxxves^tuN4SzM06)-&6gz)$DxvCF6(MPOp~U< z?cTlY(l$lP48Rb@$?I<`F;e)HLYEo^c5w`&(-T+AlL%^&b)VAJi@6=;|M^!q?2b*4 zmZZ_rahRk2-XtJ+n2w66=I19O1_T0NO0`jzQGWW@{1m9`z4qHaTJf|WOQ9%Zvv@@5 ziTNy25gnDkbn;7>RH0Q3_~2u)ohtXkV1@xnax%h}PEq>YUq56T7!EZnYq*b7;)l4fVrs!D$ z*HN-L^e~hGy_yD85uMKgAS(O)L*jip*xCg@LM&}icWcS3j2o~r*ZDcdWWkBAJBO?=~_%(WF{Nib{@y*eyPABZ;C% z1s$U|*@%%+QcDY^m&mY?$cQ_5+5~f~)#o){#CG*N5E7-sB<4aa@{lP6zk|ALdbUIJ zLYH|R7n=ZmatyTqVQXFng)%xJw|b;@B+mL#lb}{XCz;5!hV>nDmZ{`?`m^j&bucb1 zxiUs3x{mDR{8B9Ec{n>mF$KPV-5|4NQnVH+1sSYy$w49&o>L(nX&(mtqbCi`A_=W= z3`2tLJMm*w)w(Gn61@4}{m`J50oAnrctiCgob|m;6jR`u$heiPj;wH`fN&wOFq?DugwVb`HKk4y!jR5ZzC1)nilt#% zhSy>t?)0|sjBw|K%v+o)lpfupEl-9HfNVoYOdpg+El-8v%@U9CPOT*nT~@F;zJa$N zpa>8K6fpJ3BdW9Ofr^U7_{pWB_z{=7=|)$t!kHx*EfhgK0CZaEojee$T-RO@7hc;{ zSQB@S%o8k(wq|ak_MDDXiOuCCB!08oS5TS_V|}u~Qem(Bs3|J!M|@{rJY|Yv2~8n_ zV`e8Qhd_zTxQe--A7X(5VRv;pRU+&yAC9kP6j3zEJHXYZl`R+f-glXj5;P10;sIRB z{+Mvt!nWadOPWSrS7PjYW>Ch|@99v@N}QFlIIs&CRW65WQ5!2Kr>tU5rXi;umr10x zJgubn@>XbB5ucdT2t$!Kf+ai}xro>T@G3|KHFoS`N?$J|a4nMRD@!PW!Gdim&rWQ9 z%}3fV_E9|I)8S9u=(WCl(V1ASN6QGG(&~UU3-1sqB{-+drX&6cVc0|Kl&BbLdhF3?D0>zb;Z^s+ z6+M%hW#}>WVk>UZ420dZ2FD?tvrFaK0)Eu@w%}LhMh59XV$T4##1_4V|KkBDA|B|Y zqrH@}2U=+Lm9+75#bCljT*ZS`;ORImPin<_f-AbT@;lMf-Ls)t82S=vAXseXl2N3bX1A3 zfNmz76xLOy!`cllS}k8L!!4#9)?I}+PLXK~FNK`y>ayYEO3E)d@~inBteFD>Bb96^ zoh2*Kstm0es1P#Bp=aVB<+ez}AA;5d03rz^y&=;yS#Xl~HBM%4>a|&{H#LTlt@s%u zBs5IrV*QGij0j@S&3B%zoA$e5dZ5ZGCN5CoHTnipSu;0jBP?F#?a$*RtaU?${nkDY@>G6XP+r6Z= zDf)jldeJ70cAtEa8W_SEZIXVeS%mH>E}Iney_bm_6MwwKJ?)`>!kd}l+iSm_>i+Uk zc9LwgI^z@Cow18nPKoVb;`0KU)g1QKDLHW+4@@7Mwzq4&of^KB(6E_zsI@HdlX4o>PlPv4L(-8^soPB7Z(l@A3Ix&FL0eQq~pKEqkfAjS$ z4YtU)$p$=2zRw5W__KDD&}rp8Ex+~3CBL%hq;ShY@mje-5d3Bm4GzKLdOFRz?T&8M z;44G%DUrdG-q7FtYOkReEFh=ct2s!dO<_IKlt7_h$l6f9=`u$ogn<-v=}z`&58-eR$JSDRu{ z>&nG)&i}@G*#7Hm?I8NTg0SRJ4DA~G>bB)D|te51>JqX!lV?ScAUtpZ^0PmQC599MXWg{`*HnvEF=r@;XC zsz|<(mYjum?@N1Gsz+sI%Q&T+w&(QiIUZ4I91mG zCfe?P9q#9$q=4P5#R|`q@o2sl=Fwa*zPwyv0)y30LIrD8Y$Yu67#!T5yg`gDwuNECSQ2$ehd(0DGlJjngV&xf zk$v%zCz4DMCz!(-X7A4%b$b-8DM%T({H1^(O*F!r3169yJ7@RsVrw6yC_+N%IDB@pIc2mg@*}zdUMr$5Dx09FMJ!-YlM6 zK#a+4#tbS)VWWcy`QS_v9H!0?i<%|6yFoIGNx=)HtAKsk_$oH86Tg%9>e9 zyjfRj=-M}W2eNIv-HbXMk;7{EkGdO!k09D~Oq^R9+$Q&?$>(#3`^FtK`vL1=1R2lB zH?rXq&$D&m`z9uM*50z$c$v$`>-QVY%Hp5tv+thBE-(YQ+_^DLykncSBIHw;7e={% z#sn&j8=@Mhx?aB^sb-tqfN8J&PWQ~mYv@|%ZHt1!GVj5nM=dFdWcr@wJTj;E6X2hB z#@Vw34Q46AYc^Eg7QO!S0)OWRn>i@5v#=acM9LWUJ>^_%X*vC;WhRliSBvQn#)|&r^J@p=gI$|9MM#nyD6aedUpuiApGmKc}cu+9ZA^wtI{l6#`i8Z z-18nNe=jZ3CJk9NlR)m2m;G;6CjWebNoU8uW_;53;`&!4qZ}UtJ36XNejbRYp5WSp zY11yvg~W3`+?qe02EEI7>Hn`K?jO0uNuvAKZyr!gNFrsBKc=fNPShjhelXpfsg;Cy zlm63tFH1arMq0*S@%lx_{euH3F)GO-9`8=N|2^mr*5Dw{D`p7j;z?SW8Ac$4}|CsS8v`r{mEV;rc+35^sVc!@k` zx$n7-x%aZbP>U2p!FQR8Z?R;rL4KX=22qt2GJwn@fu-v(g;GF@+U}}9%ua6=-clvBu>b53A;|mBpHK}tDp?_N z@d=!%2;8Eg5K?j~=n{3;&R6QpPlnY2j5kv;bt>G6nFY>a!3spBtM31V+P%*F8^m#w zIctHZwHH$w5%wnxWqCF9Q=PvN#T<@F!CI%vZSLpSXs931^EM37!h(W9 zDKbckBB7S@@#cR0C=GK6IdTTvx7SdPra?rxiZ)@V6?Z?x6KvE;ZEKnS!#=)nM`qs2 z0%B{PHwsd6-AA~++?z2VVB$L^e5++5scil!aAlfAi621{-m9L|K2W(Y& zt$T!9#X$T#*Lk}@1Yld6b!+Kk8GUc8NK8gGO*aR(jaJADwp zbP8M@lZv8j-=pVYk>fuKA0P?V=9K3p4@&<&u*n1Pq_yhPRMIRQk1|}93dy|(k!l!7??Ujgl9&l`mY-2&XSR9K2VjLtW*LMflP?s zP0pA~}nwnL#@>|CUUKJv{`NCFk3j3=@v? z7DJ~-uVDc|w1DF_`;SN=62Lk-Z4w8Uf@3A7Etgi41bY?k!&zvhFtTF#l~!AYAZq~) zgN-|~iz9z18Ngd20Ba=<%{Uj$FHuND4!++g8#*Uq#2xz^OymYkLM@dZWKmSPV~Ja! zpWIJjo*w1|h7EG?3AXHZ@$0Y#cSls)2_8CK z2`wuy)}jr-Ps8bG{IPKRt_l))LN{3mQ&VV?W6aH)FsBG3>jIN|ok)MOyzK=9F*t%%(Fu^Qaejf;oY-Kf zCd7mXwD^N*9V$CJyAAngfpPgB_EG_%H#=K7J;>wbggq_z`nvs!YV~A4yka`4g&gz6 zX-6V?=Teo7PnWM ziHcabvC@{z1&8h$CN`X;!_CBm+k0$#848oPiD?QvopbLXS?}m%>Eh{-2|Q7gi4TpU zX%v~b_ha6%5YvO`99a`U{uQq<+4#|37gft^avSk8zh&Wc`b!@)Foz!1?_N!uL!nEj zz~Z!BYw*=%J0ZHvf}Xa5uUx|h=q@8X`jHt1*JS87kwON%YtV^32XpM|9!%P$&}O0< z4u8@&E|8T?j5}#DRc&rtHS%W#eu82Y0=&J4L%SDix&9*s@2QP!Hz{>gWD4~LIY*|>)%svg`j`#Z3gRTFE8Vz zm;JgnIS-lx1^_3=nYwB^QxHnXzV^}brD!@_pon_dG`oF9CZtlDF;uo!f zGYRnl8o9`kESj2C9?oJZVRDs(EvE68qNl$VUr+N2vy*2|uCNukfLFTql2jS+(8Fo8 z4)Z0-SQ5mEMiNGc5ob2|VT7|Ps0@WQK;UJz45JkHm*6bqyw!ZD6pLI26)|5c({%7{ zOcJdIz;K`+PI^_gZwUBqzFCM)nyHPo;f-M*OU`~>WSpyk7mWEoS9&%$4oMrhL6EO-wFo&5fTTgzgh97~Y1=)D^IS=JQIAomK6p3PSj zaSe?4F3{Y4UB_sk*yL&^Jy>HXAR7hf82j;teRBAKud zPdLc&l7cjWP*9RAdoIHitt@|HU>vgYe57Y@3F@dBH#KT%z4_^1Op3rE#un1pepu=u zQ||cYemV6MX{5j$kgZ;KCzM!7P)ksrgdcdU&qthfM^7u&V`Cz}Nmj1I3$%32COxA| zz_TR7M7w zMXV#o<$Msvn+J(*AZ49pc4%6BN}(bfy>C+czQ}`~N+&%qE$PL+*S@FoXHxgOu(R<8 zUg9uG%5dGX&T=FE^dU3?=2|e>rO!9@8AZlSvw?!?KQ#0gP?k<8qwBSE%(qXRiHQc9 zq0+Q~AyzwuL0L38wrGwxF)38-k-ly@19jep!rope`0;62La z_9^WF7Hiva%!5>ib5|y;hp>E#PZx+RTA+#o*HrY1V1D_|ouoE>uqQxb{CLLsrLJsR zL&4_U0hi|txXikcY4GJ~0+XYq``G_iu|gF}5A8lSv4tDfzu2=8@M0Zm8g9k52pa1J z9D>plCpFOm`hxcX{Df~b?{hlSByD7=i+&aMrJoBv{yT4aE*EnOE42)7;rbkL_2zx%ptW5mQl>N2nHNkUDFUy$P1K$4E;3<@6+;qD2 zKTItB|D4k}LH{?E$QDKB{I76s!{r$7|HGd*SVPTlYV1g#-XTOQva}(`Nyj~K;ATpV*!(0f8rIKI)r#LfrwIEM>wzB zg1B?a@NpgvmeCvM<5dKs^@Y&VmtyV2Qs2_0cB#)Rw#nEWE!4bD#*qXkG7oi&Rajw} z)+S4m5{+JX8)tYnB`7d*uX+)3wKrlCNarkE|2`!BKUBSCP#n<~uASg6gAHzjyASR# zxD$fA6I_BN$l&ho1W$0+!QFx+xC9FhL4xGYIp^N5>ia*{RnxV*d+oK~=UJ5bG@hwr zUsBN`ZnhFfEu$8M@;QZMv>NGyxVCR#Br&u~eJ>KY2*unVb`;e9?|rFJ_)iTz8%Uf^ zL^S8q9H^c?f%k1IiSU)+HU?BqF*z5VeXFq~2SP(jcjhae7OT|+%%=H!UfssYgwj~+=; zql|2D8?kFnfPlY`6@TT4ESE(l(2HK3_Y&aM+(I5J>fvW-SlHNfX=4Ky6jFua;mYx7 zqlwEErtry%Sj8&6E`+ z9UNY8A;vF*^Y~t4WtNb!H^R}WUSgri^E?lO^DxiD#ifrJGid0f4k)EzK|s<%Y5m&4 z9^7DzbOlnMo<7vqGKAcVk7yivjHhevZ#JbU7)#OpVI$s#P{T$=5dhd-&gW0=o(=I&(BAz7JD>vYBXI_wpRzNqCoOd$lX~v4VZWT+r(eVi_rqVoTkLrH3=vA03sBlRp%Hrd{{zQ^-r)k?9~Ys z{_q4oRi~y3zQzA;!W7JxTBkqrO3#|#(ivPhE= z9ebe&d+6{3q{c z_s%_-u{q>OPyc(_>;$GHL&_GueY%_MgI1rA*$e!P?Q|L5rC2u=D#^xzM*!w@-^ET$ zI5u+_#QlmT>91X!6NN@%`h8Krn;L8Ic-d%oxGEk?cedV^z$QAa6%^gT?Zr; z3n>U81%xxg7yoBZ55nSFfLh%&Gnb$=Z7Tgy!`|4jskM#&_jegI+qgxwt#8R3h;?Lx zfZl(#=2sOiR!R?tq_N`HcwCPG-!mQY)s!@K-b0V0EkL^ZY4$@=DqaT4vk|Ed&CN5k zv?q$72-F(N{G8Znzsr=G%CY#U2XgMFZ!C8wjf-rUefn+K&QIj^YuG zHZG@{g;uh1JZ9>}MJ&zE5Gq|kJY>(AOJK;uXRSbo$oxySI~qyIy6OEu-49g&Pv>}N zV>w{?CjV2UcL-{j^j{9BzRIqC{dA;a=#U*daoD^)yYc^Bo*n)kWfuS43SL@aE7Q}{ z`yCZWx;;O*M|mFe%P`&1=axls(*6b3V(KcyTsg{7%hDwmF#QF_$79w9KZ@vP9wB=w zPo6Y<7)IewBaxmlTs$H-tfTtr3I8Q)YATRdwyx+RwSzTYA1?^2Lk78&)|HCD3nQIa zLEI^1s&KYbQO341-9!3ly3;~`JBGo-{yS@NKxU8cGOpa*Z|u1sq>@C>x_vwxllJv3LG3(nz6E1XM>cEl#sjsG}v|)BQlfCuOIpQVQ znPH&BExqtURliLj{%TCk!fSUg%C+~TAsHV=cyC}_a4H@`{cju9?|j&I8#}1p1m2iE zi#7nI!|KmXqkegq8ud;4ohfb&-v?jwQiRCuOboY2YU~R*u@7HfMzb{uXzJJkecX{mV-8hZ!vGPU2Wk=QNwG9fd_dd6X@V*W7 zyI*@)`SeH){wc{|Jj?UsO*L@edoS+1)kEUi`z+S`5@yFk&@FgHQtbB8^@6JXMTq&? zlB)aqna}Td`V5L$7|1Iv8hpjxahxv>Wy@ru#4I`dj!yBLjMKQo$0M8Y=Y4lV4<&&? zs|V$Q&TA$$G~@+bP%TFhdF$ zIag2A*WP3p!C@&YtF+kB@NoeZXf}GY!|P4gRv_~1>otd;ww){J8RyokAXGFZ9;}XLUdUPMiPl5i~_Otx3hr#PJMroeW=fn#yFjmJtM3<@VI)PQONW+ z6D1!uwuW6l{bA!CQM`JNy`XW&Hu_axOvCGOh+R4d&t`Qs_&lb-pc)c@7IbnU*WsM< z8_aiKKSyz7GlXPusJP|VyYNT;9cgg;6J*dAjIA8Y?v@xQRaP~85Kqq2RzEYyV|{onQtj41kZcrw9wm_x@f<+3#vwQ27v_nG9w#mS zoz}u>x8Ts3E)AjxpSD$GPc|cC#!sZ(_MX4la|`H(kVs^yj_h3jJ$hmRS!&7AS@@kT z9{oNac^CqP?x1N`-Hbj*5BYm&Z~&yKQC#fW&ON8WJAaUA$3Z;b1N4ES6r58JboTF? z(=f~!PI3=RI=iEqb%IZc$jONkBPB|>8JccLZ z?WZYC5CQ4;nfGyA!LObM3)&p*^qKJ%-S>om7;Q11dk}qMF&_~fAt{C+^z}qn({djPBhMdWv-{CmVB)u z@)k&kl7Fib~L4J@XP+3#Yk$4v( zwm-0W=DH1C*&HbzjGPPZMog|nz-}Ru*-2L$b~_p4?0&d5TK!}$nLr_l<0_NzB?sU| z@ewzOo&enJBzi|70d4Fg2JS04f7-KgUh7Sr5{(mo!lfzaF8SI>IJhx-H8J^Z*IqHP zzNKJIBAVbVvf-bm=qV?caWQC0p4b4Zvzq{OZ1L^wEsjhHhm48|smVB8hrr@Tuk>9& zpI+6{XFODY=kKKyNoVA#-{qBtEV1X_+yJ6mMKkka?EGTzn==!{qYDw~yS0R%0Nf(G z?;#Nf#P&bZJYk{&;UuOH$eU{|B%=w1{bOl}oTL0hIlSyyD@a7;T(f>c;x`DJYaQfg zXH0JU2BHW`EY(VH4rT^5k5rj?4>sl-E`plx<6ydmi19LUy8Q_zU3c_ZX;Rtf z7+V2PFZb?8W9Wbf4*+S4`JZ;aq@=mr7|r)4(lNAgy}g{3D!H2Fsk@g0vUr&@gVm3J zppn^JNk+KTpFhq3bcr3fCNQ<5(KbK*ChGosAPNq=Wftj-fOLZ`aEBY5uPn1}MTQUs zyB{Z1{C?;Ax*Z+iQwaaSHqjEEmflQGV=;7BLCKV%XYfz3s;{}4UIKp>S3$RrJAYV7Q(oKA1Q`Y!@yog%n@JmVB-1L zyTo-^dK3v4pK$y9j`b+OUcfV^CoTOAv?kN|mx~@;CiE{lqd40y_nU*8VNdRt;PS#0 z$F%oYu%U0(L$PgU0m!b-rR~AD+{3>XlgMKFD(uFo*(!BrXis{G3 z)UtGJM#cvNc+PN28%tCTN=|xwH~Yz5T}QQI%uo}(={U7Y8@^C<$N|G-WuqY22FpHz zsxu7R4LdDn;)!jWYw=c0345zMds$wOT3ZIV9~r~j%wC8#iFznBMAC8m zF7RC{_ys!|ei}-@80v{i96R6#wGL!_dmZ^=*$8kkx66w`)-W%<&ByOaFXR{-DK1Y zg=A^WV`RRGKmN#nJ3Ez_qw52;$UX3xaHu5^Oool8>KaPgJ|W$#)Pg=?6yL1kx2KYc z)myO0P%+(IY$djT1>Dr|gWF$_#cmcjYukU*iYdX|j-M59uf z13+azFQH}uaL1M*uAboM!@?k{oC#!uE=vhK($TiwKPF=;Mwj17g0YR-oMm*%@z>0P z(1VZWmkmN)K$X`1Y&pLTYTglZJ>N=R{T!fTH|Qn%#VDZAm9R5+?4CwQQoOfH1?FRX zo~M4s(PuaOtPP+w%*R=Po&FJf{Bgog5Eao4q&R|hmXVf=@ch)E4DGPsIauPA&SOfB zD(f7C&QHfYZ>TcZWCHd8tgIKTt>99$z5Uf^j zJ9AbH+fF%gRPvv^Sm2g^6k@5L>nEmaG9&IE-oUU{?t`g(Uq%Tk#;YyigMmgH%(*Rh zES&-VjOOV9zZG`?(>H089<;t!XhpsI83zBd{(z;Rg>5?lSNE;R1jz?jX5WJ_d+xi$ zhDAm9c00HcXC`vLTZ}!js@KZz;N9BQ*dctuNcwU8gp6ge6OS&HQvtABSq=ck5YL(H_jj?@qqC5k&YUg*8oUJ?L<_ z(8_fbJp4!TYQKW2zft~1OJ5(QoLLp-Bs453e9$^m9P=4FL5iYAQ1Y`PbuYCc;3A+B zP*n5&Giw+c{A?*8j z`Q}|tF~1A==9WG=4hg`^Ch_u6YS3DQ{I%HU`Lre9-n2D&>XCh!!)0J6|H2%WsqlMU z*sVY!)GqjrZA_UNZnWVlSbI~>P8|ua@av{g(fj!Rv_W`dA#}0(&<(FV4fYOW43_M- zzAlFGRRgA2Sb6y@ewY1kt#wh@P1jN03nq98QcJIDi#5Sm0BX|jenxrcp3CS(Ba8Hq z)?{!gW-G^R_OeXH#cg}df&|4L2+5RaD$`im4Vsb2GrkwSjM28A3ZAa6B`o0vzx}Or zTfeO6sfAw6rkwQ)FRskut4Vk{=E0!zcg!sT!j+v@R4N%A6J$aU;S*wKsg6+ZfxqE4 zA7hkOfz!lE6x^bBNRFp%e8Fqxl(stx>#FRAS% zVqoMLszO5<4MPi9&uaXrwK>Pw?9m`MIPz5q!r$=rhE$8pX4+-7)0Q;Okb~9nV7vH9 za6m#h+#VctUi!47qrV#+*;WEmel1_Ly1M?;?(_=)@uagrx!UyIl&`j@qN33UFK)UXL0e<^AFLQFKQ04UIXtIeD|so?%_gb$$herOpzmrhnfP5lv5UG2!c z5bRYT7LoTA1J}hs-CZNPA4^k;RB9t+LW(2>vmR?eH$wWZt)Taghru zM?sWDyj>;A5FRV%*<1;EtpWu<)%1mY$>BX}7WqDvoj4n~g9$oNFPS9{pV5^GwvkD0 zNn=GN2F5WOC~fDc%IoqlhbYqyCQyp9xYUjQT$-!|ds;2FJfMjNNxVOKC z3%7$KGj+S9lM21qSmbR-eXGq58GY^-j3F91P-`{BzA&Js_RCua(AOXSSz+`+S&bUS zFAo;Z0eb@7w+oZ24Nj*_kDdeF$*%tLY>I~;k2{?HXrbily9I3eIg#T~3B%b$1lP;ZU&?ZTG=VAE zQi<4$*GnewvbZYD$49IZ?eBs=AV{TXB|rac;_fZiH?~M|z^K$G)b0WnuRL&!@1}p) z`YoXKVm-Pc*}crl;npir%BD)rO6B)QjxsDC{|}v(|NQg$R=aLYo_9%R_m1s8g(Tpk z4ii;38&@{Z(h^}?Sq1|B#t5eUC#LWbYee}wqyu1MT9u_<0^C|3pf8s!AFTmt8w~k8iUm4< zjXLN+QJ8i)z|h3nk^WCU;PB7p#l|69N+jLAcQ%Gw8I`I_T-@thNm$CUL z#(g`ZaKJbiT_?SMFJ4>iDip_qwpHvFw9HYcahCzF5D`YPqSp+F!}fgaVa=85!?(_zHtCFso-NXD4Xf?W$mz zpY9XqozwS7B%cL)pB72*V=9;vVrXfFs+uzmcf&iP>%ys_(lwz9p37>^l;LWLVsY3t zB-#v2aiHix=*jhDS-l_ZIiG{%7M?jrd(km1Uh@0%v&G)A693!;op^M2{{xR6yTO8J zVq6p}jdq!(5=KR+aHa~yI8u-@a=yOGIjyhGPd!#^ZoSs+8;xKxj+Szmhq`hTN{ULE z$&AaJUwp!?rfkDT!RsZcn1w&04TMMws$G4VFElDXe@QnoPqCZxy+*ssr;wG^Vf$G< zHCDivdO>$&vfSuXkYo-OC1O9#kztp0aUjj8d!HC^-jSIQ;I zh5&H>4gX%@p?}{o)Vh?*Ky<(R$K_ke$1~Z77PEh1f-c61<(MQ=GWx2F3o`hD2{`!X zPzt_C?@?29Z+DIpr%5G)bNPQ+s7v0S*S698m6cx=-TdF6YTOn#cjBL5O7da`MG^Iq zNUyvn>Cm@{m_8>u<-_Egu)3!K*jz-LgDf1{KH~NDuk~<>rX92ES|_ZoM_D!zZ;axa zGiEX3+l=J>B^zskOEKE0=ZI2Yl$i0fI}kA6Z9ygf{q7qmapZt25;B2qL6>BKq}RS2 zM1O4*5S?Yi;14t)m>fY^pn4+i@KJ~$N52W*O;o8c{{k28n33+Ic0OndIen+Q5T5QN zxO?8!x@$_zb>4%EyY5SU!Ws)bB;m@zR1%CxKos4M{iUg=hl!|@4Sh(O-Y=q;OsYv8ZLalrOe?^ z$TAG++(3Jfg=TUoC|D4ACzy{G`xqFm>e9V%J&uk>_o@SfPm++)8i|jQC_1>Kg-Yuw;*$C~r4u%ioQhi)m$ zA)8(?k0m26?v;ZI!JE?UyBJgXLK^Kec!sTGCLT_d6KuCfXW-B78pddt2NljgNLpGD z^t^3=#}Y{7kMpOi-$Bt#LPpnz2o^);A8b{|>(70i-ec#Gv2mZ>rP!A|P&DkExvZIc z`dx1obD#bE2S0cwbyR_GM!b-pb;5uYq)c4a?k22JmVGN+?6S>n(}1!t9eYWCU4sP0 zsNYZqUxPGjOq(X~Bus=*MXGE8gP>#eK}K+DyMJeKEc)hk+Ljm7{TxBgL!dg>DCrOG z&P(ZwOgF)^B(dDe&OKgIc70JX5{B|BJNxV(#JeEc{3aFM9}Z59yW5-ez_urrnWU}c zN{u0zOBC4S?aYFNo*d_${LGmYCqUZP5+l3HA$YxdbO_|3oBhh2G*+JSP4f0=&u^<( zmbngAL3~tSuj>9~P2sbRdI1vSDbMK(M+bJzb!IQPF2eq3CL6NkAX(cYw^t!yP&XZH%plSl| z8-4S|6M6GNktQukbxP`phFSzq!y4|n6$bYEep}rcRjk3|#G(!tmRl%QZRKoOae>xY z3~PhmdrU7!9-p2U6p=`ms0gvuK2K4c*88IN&gk%BA|eJ6iuG3!^;-=Z)zHiRc|@Sw zu$Gy{u>B`g^c)m^-E<6hId(l7@;mdVfG%juPn1se5?7eCKYdunVUBt)FX z#XRA9vSwZ23Ab<{*=Xlqp1oMiCUI;K1s8H|%UW<_?)uO0NI?!ZV`M@{^pU40ZX&?W zP2oSnH0T&HJ-!G(Ka!0SeU7pokorVc*En3>(~iVzhW0dj;Hp50eXE^{$R-_4&C6mf z02ME8gnM}@c;UPi&r(5RxSlJtQQ#g?bVQz%q4XEG7bv0Q3VdU3)pNt`TIg`s}by%$9HmkaQ)bK%f zd3sR%H?efEg_%c)!D?c1u{1M8S70Sg+LfE`oOD#hwI|VlJ%#}F-h7pQK^$EqKm(|;yEDylI4hJZX>p+?ju;++=>LE zPrc6UfqyJTrgV1LS2BlKm0^B!UZbs56IuuWT=e!KzSbht#S4(^lfGXa6}de1>>DcE zi0#!mJEFwienmZ(R*ObQ>;aYGjWR!C8x>x7Jq33+{rgXQzya>lMdbyorO8^Z8LiEU z+RB2rVFhQdrKP?oL`!DDHd9~R|)#1ty_6kNFZ(qV>qg2!ke(Jxge`2SzSF`=APVCxyjWJ?t zjFzNnwx;{#mxW7B&s< zm@}RP*AK7!=QGTaNPC_TCvLRfwilgkf{Q`dV^s;^YL$>^NQ88mA0D%tLTS@^NoI$| z*|wMoN)*0#ZjH0t&~O&7bq^rCxI@-5`YN5T&u(p;ph?U&Msa7K6RqU`ZTrg_!ZH9q zcG#T1K=kO}NS19XUF91NmKG`fEOy}K6XcAom}taA3kOj zmSl!|?^_yR4!q*m6RG_L?|R@br&xDoaWC*lDpVZh9_%(*DA=x1a_)mLt`oZ@6<;{> z&QFIf(F<~oTD zo%q~=nPI7J!V<(AQW*U7RB7~yWGaP5L4lDOn|ZF)jV0$d8}r%z+2oxt75VA#aqn9T zWTe>icomRPy5`>!Hyggb3MF%I@B3uD1R1+#%d1_6N=BZGW(}S58ij_X6xZU?+XX%` z>GTH2sr)q*0i!}5CiyBYxGz~PoeP;2^Slp_@ziz%#qC;`8leGfa>#$1&oSc{fdOA) zy0XLDluaSed210!dY@rtPeDf(*O|@X_SB6f z9IQ;2%~mO1$q!AzNRU!MVrXRMO=&L+b^p*1DrZN*a2jMrTxX-*y-o`I(xJd!qmRzP z-iBG|wKKXCsBN)U81#>POKxv@)NSP?!^o%55$Dj>9q!`bgZy&Vx^{g|b(?uSivD-W z1hdA`Dvms~`fwFC_xIXA;EheWV{PpU4Uy9BG>#-IYqP=oQsPeInJ~xgKCxY>0j)ID zF!XCQGlc{Gi3*{CUJbzTERe@MI3CBs49N8-+n0VH+x5j==3O^K_i?WqVn=4?y=7o8bNzHk%Iu#hl{ zxr2QvRB0}+f~dKUy(B0k5Re{0wP#-PLk26BL$a}ImAq`+ebSM$?0lv3ejV!g_=2ru zmt%DF=Q&ROos8nkZAVxA2w~g`^__C@4BljfzlSQ>^mYma={JPTRZ4N>{X1RtEImsz zddr8dg$=(O>OFkd=5u7nV6R--)B5WZ3-uj?6Po0aOEG$mE!?JwzyIS~>GJeGvt_qR zi?x^=t8aaus1I;LNeA^!ui0={m*3_A1Q@gD{FyRiwA5gAp)G)kq0o=oop6v;z{`HT z+rI|Eb{POUI3Wb=hzq>fAdc4glPVu?D5p}`7#mv^@1|J=hJtBL9;lJj8m{L_qb=2VVbbGw7ypb{g2! z!u9d(+D5Cue0O85<3K@qi?-%#n$7-qG^qZu1TrV;yfIrtm#^?Ijrt|Qeg`&;G>Cqi z@VKoKXn-IXc}I(zHy?Xn+Lta&{~TUNd%TTM_@B&eo+t@pZ#O8%@^}(6)S5L+w&IJs zpIEqD=vi^T0!<2Gt3&*VHX70{Sp0B*nQ@?c~cT3)NE#H#*BgzqXViMZ`<=5v@vV5poJwD*`MuNXwv&}@Ez z)iFS#PREuk#X>*}jN19`_a?-exWNywK_LBL1g3;$Jro9{Q&r`qd612KN^o zQAi<~ax@w8I(5jl0&bVhh;IQ(lrQQOq_{9e1eYn&k&s0}IAyWBG)MpzIUP`WQf%m2 z3%OUH+P;;0qjS#u4B9q+1!reUe}yw|`KlHkKf~JAT!3yP;ZBP_l6PJ|++#Lx=0raL z44EKE=fA!8@~sH`Uc%$U^`pXV@I*DbxOZYL>?b16m@0Vo;w>knS2Sj}-TE-UQRhZ5 zDV@*Qx>wJJ6jJ5MQKNUbFr9+ue#5TDX-bmOHqU%g$Zaq6BMGR?bnAT&+o`2JoZ=E3 z?9eW#3x~8A*?$QC_{j9b9T$C1+~n&s3bA!$n7I1sY1YWs4*I$OW~8Y_z6^rFN5e+>>Zd0+FjC>Z zbY<35^FJ_U=gP%x`!?(fCRw!61=!#2Dr>S}fD~Cg;CD`~fnF7%;n?X8dxnsqg`Sd@ zwuM~$d-O!fP*O7r4=5qWl0tKOSHWeoA5j$Qa0|E|=Yf(3nVJ{1kNaw`ujM<}kv|#P%8rr*0 zl{G~T=`eE&SU%>_g@;;rsmtT3r9P*}Y{w?`Gu)>U|1MG<#e+oEH+BHA%MC3!cID&c z4fKmYuaJkarGuH#BZSO=9WMR3A9;je}>~ zcbRnFGTqGmo67$Z{cX6l0vfdGMVri{DURaAaCkVUeam zY-lPjMhRH_VD1CYe&Co55O^aRtA|M@bci%eKo!}FB~BQE<-a!;#W1(XUL27y0D}TDtN?BE;!kJ?P3ELjg^qN%^RCeq=Y*!$*xm3W>0cI0m503M^p|BdpSp+xvSZ1by6i9tF$ zq^^yPWch?+d0a~&^os#kq_%%A*c@9f+5n+P$HIQfzt)9qBu0VYi?Nn{yx~-hpt*d{ zTfVQ{2z0{Bt%eP?18C85;W^rfwV+<*X;y%_KYuEawc$w9s8#`#4&^F=%@dyYRD)yKvcS`kx&s5nh=Qt|*k%3~N8I4R@2##~gJWkP!&Z za46KNhYr%ewO18!cHm3xv4q&l%Oo-_iaQsJe4+`JFhWu>QdW{9E>(T2`mhM1!3M3y zF)vM;Hv=1L4Z~imXhwQKoJv4)LT!6~M|OMe;uhWbX1R#+Keh&XmaA3{x@n}BReE~% z9NPV|2;B0HS1DZuL2^;nyzkE+4+}@Dmuj^14KW(BG;UwO+W~+61MMD`ZkP1 zkO522vXsv)cnjhWk}FBeUmWXc*N?Mg=b_!^a7!fDNm7*hu9ji*MZeb?C^!{8eYB>F zzcWR(mE*0g6DWdw!@E1RP1RbJ!^aMaL?5CED*TgVJ67<)Luk!hM%tEderkP!5Y&X} z879LSl4eW-dTJVHb1uag!14O3HI5WesB)USrEu%ohm$( zs(cigGF0}Sjj33%Bf6nfZGy&!y>rDr-QoIbMjA6d0D=J|{NyzmniC zB$|SNJZv;)>ikWX)OROBZsv2md*WBq!N|nzqxn6*-|=QUkVA*S zsmb~Oy|>{+a7qmzI5{bnN)>^WC+>hQEiD69hA5-OwTs>vOv)G;aCK+ox;u3I7R1Sd z=b1%HD*NuW2B$5axLKqmmEk!!{iRec0Qx~CW}E>)ZplB3gN zkKoS@3wOTAqZ&Nk434{P-5cEsAfrUox%J1`pgaR_2r+sojs||f!o4dFa6`KCA{%4e z_UTH71U0t4|KH90La+M!;65t8UcQ`p&}<@}Aqial0)m1@Z>k*frWQ)d!DB zT@}gmj`M3W?_$o#(;4 zr2swHtbh*%B7yoCp?p1Y<^mBu#o`&HDwe0uh9&Og#_sh&LF97z{KJ${3x4cRR(wx& zi^EM>Fb{7y_U~n>(j+T;f3ni4bxwx-}a<~PPyRR7SEI_2*Yf`(r#Y%{3)t}3{m*-Si zFa|Of2E7-58{`M!(tSZ7STi{=_jW_qPCwRUWcT`k;=jA0bS&Nyc zq8!H~9f3F>qXCk|&Kq;AM85EzrO!MF~CT zXv0`6+>aG8zk@=}+Z%pn5kX7-gM}cJ2@e`qwwE>?!V>TXBVQUX$G-)~lekXCvJ*G# z4(wPx@qu*yzjgi0C<@!Y4R2H&N^qbtYIM{4`FjgbJ(xxu`$#sVX^mTgC*k;*1q(ZV zfI1Exlg~6t)u#U>K35ZdEaUo4sF9T~qs|a&gGmCj=PoU&#`kn`s%Fw3f#AxE5pYh`=gk6PpZeP|**D>RQzf^cfy zed}<3=gPVZ8&CKEY6KNPj-nw+@+Gvo0<9&X+B2-zO;WcEJ`dVt{rl%QKKF+Hw$i=`h} zSM%!w0(H3?vge?=ZOk3IggB9i*|>O>aM8U4K-xK@efF0$I1oEF!Pe64=ihBN4I)ls z$zxrFQp7MwL28`GF(JZ$!A@MbiAcmu0?q^M(MeVuo^kttxLCcJjee^MR+|EUV>Xp9 zVTT^_uP?sB8Tqj3yh7mlaCE|6R2gqp0T4ESw+CJh#`5`8dHG#9N)Cd=#H}!EqLj4| zcG;Pa7CyTr`sA-P46E0YX8@?sq~fHs_lYDIprN{-^uNsm2l-rF=+Y$=&?~xMe}|(` zsDpBLX7E?pxNGNAM6$J$f(cGCP^Xm#tRz*a!kIcWwa?tC;k)Y>Aj(KdHAHWL(E~W+U;=O{P?O82; zmh+)R*2IziMxcm$F_5;FxXxtnK^y5=Lqps9Iz*6IT3wA{Sa&yNE;Xa50;j4oYAwRJ zT~YWdQ1Q@)=Y{;Rg7(yPzw;M;ua%wKQ(#XfCSFL0kb$IVMk8$;i3X7^ZgP7$Gu+!F zG(ZqA(y_Dvdh_-GxBz3&sx<10C-+G+Ovr#u{?n`jmKGzY-cj))WG9adwwe}O_Yhy{ zijuF}4=r^cOLMf|qrLUH*OWe1O#Tst)gvh&oDdR13zG8y^0R_=A6>ow+*vqV15>}! zWY-YhS)WsrK@Dq4VK>0dpPp#KRR|)y@9gH14bX~mG3KsFaryoE_Q(2p1QL3KuOkh} zP*NM}12r(H4zp;u^Aqs$UeRjxF+HNW{f}RE&_z3paLbLcKF#5F$Uwb#;gBR6R3;=k z`Ry%k98JcQW-&uZfCtvO)SE>a{lu|`N8)=d9y)iAG$K@2W_KL=+H3ki&jMtj7y^Yq`FHa0f>lenVoDkT*P}?C z>fYuHq@R_)(n-eA=M$kLFae`wI8*7QeXx7r_9pPlZ%oWpqt5zO`B6BuW z>6<(w*+{er>YVV&a0-zNp$G^Ph|~S=+e|%&Evu5t6-bWI0p8 z$LO=$fEGPS(@f?aOv+}KwQGhE1Oh1<I`=^G0<(bmFdMNb6zxWuWStE)Eg0Zj?=@il_^9vS? z#Nrk!M0Rj1j=LOAH@XN={YSLk>!Wbo=)}mHR>Ut@<96@c9ndvtUQH#vulR|(H&=zP zyP`)!a&O@=flb=8mrGkL2F8ibxdx=??N0Ec?^9X0yh~N$T4hp97l&Jzig$eMr}UUD zF}HX{4;I{n*I@v2ZDkb+z=E^J#Elz@T)uL=^nzoH!(shOfq)gd<38UIP&LYqw zXH!RpV>Ng1aeweXW{W?0x~$OI!$Hqk@yKsMXHLcs8?5WjJBPWAw6ahqx;;hxFEVOs z;_%#^n9d-Oe#fRh3-YD`+OD|s2bx5rr9~W%CUAeL8x>q(&bl<{;F(;R9g>f7}`%phfqU&m91V7;`F>Yh}nK!1g4nlG0{&IEV7rVks}#Z zl4Sf9KPU+YDWyu`eJ%q;=od54lhdWphfRn_zKTrv98tG%BIB-iY*pb z(DNw6oux;&lPAB$9kg{MFPu_x2QF5|`THRZ!AuspP^d7o5@-J&-^P;X#W-dt$s9Q5 zT_kPOqz|5IayddZZX+KAC#a|0m*vq{;is+z(ty8<9JA)7X${OsO8iCHARJ5B!XsV`{KWlyQRjY<*#F3L=F85%cb*`*oRcJ~CkDNJVkcenez2e52+YZ<7 zBhb1cY#}rr@hUGKLaUSGDV#_2UNJ-)ZT_S%7I?tMTZt)EPia~ekIveQdz(a04=rx` zLI&t=9P4kk#YT=7e6 z1EuZ!?3`+(BL)-K4U-O3NJ}b19sXF+CU>NdXN+2v98_v3583AhVT(G6a@9*kMa2<-5MlXy`4r_!Zl4_h zyHVS#F=H|rox&3ixW4iQS7aw{j&rq2QG=~EfwOs6&ZFGCu2K1 z$Q(OfUDJGE_y`I}Nq#3QZK{gX2{m1ddhwGiZ2Lk)4iwdbBdh%)G3#F!EVZq8#Z@^R z78y6AZ-6Kz>Gv+KL{=oyNbaa|Fo-y{pmrj(3{k~s){{pAVKur@i3DMhaGHh!J?^)+ z@nJi{u!z6EaM>n)s^3(5d7dgeB|+?<>sRj5=q#IJYSZBmWC@Tykl z@v`CoSNiz#oETVx{Kho2VvdYb4j?|hY#OSl=`?A}UxDm)IVjJ^`0520;X+iA2@$Ee zgCvfPDJg~N1?vS(*B(MWaO!U%xU`P`?6{HemDsej)<)=${nU&C-- zTiuv<=dN?_g`~j5$>V&jlTLplG;&HN3+Sd0sNZ16lgVNF3dQ;-AtRw;>ND?0;)6L5|B45m)3Pic zq1fIGsjkJ!PwNWyw&cGS%5jh;4WjV$&7dOGaW>W-&i6yPw{q zXX+IeeZx5##TQBXqh$?37KPdPaEF|h`RO+`;Fd|V)hSk3fx*THph1*lN|srr7^N27 zML{zcN4{|m^ilBR_oZ~p7t834Jr`wL^GTeflFMZ!PcLX-v2sovq+*`viTyEF7HH=w zGRoSkSea^7uDss=7~odrlMWG9Mh%zxSwimdo+9t@QTias8N@9hqILp8$LchYBhGV= z9bnW}uc{%^4qia+(PLar8t5e4M!cL7U(6BGUeD=R+H$~}!wYqzfa#xfj>Upv9gaO- zn68nEbS0_s%qf@*^el|-I(EJ|=o^^KS`EoDO`qqB`yF=Q`0L4&H^jWK=ip<88L_oC z$GSQ(DPW+=LFw=8FM8?8N}cL+Uc;=rHCAhxK? zF_s-Gp(er!y!;s;+BV(d#&FKS$SegZ#?}H#pWjtX0X5n3-;s zOPv(R_4HK~L7&WdE5>Me!Af7swD-4kFyjp7Ws%_dfS(nVc|n9Tlv5RrRkNF$NCYr5 z>c4V{n<*9i4Vgwt6)7tq%+#8p2!Q(=;?Ff1oO!A#U==LUBg_lXo}7n(veIaGISW30 zk?A`Z`l4C1&Q9P&7Kao}Dk?vb5p*$~n4$ttL+q0abZRR{f_|l0@yB*3zGg;Q;e4Y6 z+-Cr=9FnehDjx@vD(!<=>m_x6P}MNZPN5b#7ZMI6;*U>Eph*oGK8~K~G#qwMF4L?T zhGPxEt@RtSWd*RJbwOIP1h2c)ZyAWDH1xV}`UHUrRB{K{_gp3^=g=J9pSj?!hnio&9p;QKT?H>cdnd6{W!P3p(GaqPl5 zth?G&{Y6()yVb+sX4TOz%xNXFveBj@hu$^{6^X&t^I|?oyH!@im zT}W_nMY#BuPw(CE^RF^nn@gngwdQCmhEx9mfGRGw@dfg>6&pwTl0_2SRH{`hV`ITl?He6+3)!&8!fi&%b zTs>~3>c#DHe^p{$@3d8@`PC>~Gv&9-xr2`RtLI4lI%|j5*V&_3qGmwh<#Pm3$q;ZALN!!6opB6Ltv zq`UkM$FY{F!)%c38JCHEnIpllygv=?&{=4>g4=fA+k=fvDuuu}W0Ba5RypMd!R!+; zqgtahT_S&hYZo1HO+&n7Oac3f&!?5!Khe1b#iMKsM9~Z4WJ?x8cT!#~zyG04YTzk_ zve!!?#`{G3IFT8lZY-tBK(#oBDdp)Hw0+- z=z?wtEVR`q=ua5pZqZ|rXUW6lFzL(r^+J+y(f-YGDjiO=qLY{6J3sF3x}b{VxZ@1i z%Hw8%Itrc5l2}%^P`nYZm15{OFR>+X!IX;@5G%+Yq(_t}Fu0mI;Rr?pmJ~bk!~&3J zRk38WEs03I{(df3e^1ZjjOZOB5UH25n86{9jI+~UpyU7(H-qj5<1K;emrEm_HHwrr zcPOBJT(vJ=r=Uzmtgb(@TdxW`C;{qp-Mt}vw$sqNk-|3L#@ossPl>8^HfeU>?Hlx2 z=b7KX^;ko6JPDr%$sQMn;J?b<4-R?HOZGqjvE$?h{^Rq8WV5M*=27ie?MmlhQMKS& zJ(Mw7;9uZS{SY!C9A$Q~hPi0&q@uBtKqeaX=kg|$=)()nAm6cJN~V|%pm)cnU)BW; z#*UsXuBqf+E#N$I$nWULemvL{0 z6)&e!{^eTIS)SzMpLl()ZF^Mk>6a}lkz{bN3C271AhDe`?i<%r7SxT)6iPW#uu;I@ z(C@3{vnAM2Pr25~G%2#0@0T}sc^Q^xkz(3>uYs%|h-x!}{{TuCB(2+l^ql#Fu`Z7> znQbv<>N4-`*N8(BB6M6VQD9C=`7DOsaew)NC+uR~i9he}ca>XQ9FG4X3_?D|v()y- zhc^doFSdatgv^T{c)afDqR{i^UX;37opUE?D{5M-Vldx=t`2W$`%tmW!&lHus-=sy za4h0y_VS<5mbA((I4+H=KekI z^8^R6eNocOZP2_gAfZ+%wkQuV6Q{flh%d-TO2^=l}l?@21%Cwo;bDg+W%bg3&#g8-BW)%XVl7}SCKjC z2zT2R9Fw#ypU-GnmkSv1h=~JAj=L6fx%mZScT$kDXNmyxIPFW}A!H*qJYz^#4&k_j zglSC&v#REF!zm}K{`w|*WJ-aR75^Ia!K(3kRfD=9GnDKciY!9hK`Uap>T;i)LCro4 zLfyXN-A2DCZZWZhkSz=W*ce5Rb~R^L+(Du+%Z zEH)CN*=1|yhEG%8BjMh6Hj=z06E=w1GlnG^*)yO%ZTG#uV!mJF>%9rcEf*JnLMgAL zlc0_>aZ%%6D}8@XMq3aPS7+P0avT)&(ipwE3-{nvsMeFNEkO)Unxd|Y?iFITej2PC z!YZFoI6=f1cA{r}Bum>1|7j4Z*`T$2_8stvnojW&JRJRx_4670EgY5~Pl*jfn?=e6BtAJOpqgXupK zS53-2;Nf9_-^z;c%GC4C@||qo`0kWlaU7lmhQsm;=E!>Lb8s+uI5p@DlT|(Q2du+4 zPGmz6gO^^j*XSLOrgx8^jx#l2EeaWvxtbQ067YM#pNotqgf%|wnJDA)F}-0XPP%#^ zC^Zl7bx(=Xg^%VxTumB#0mc24E9!#mD5(XxIN7R+A5qXP(o%}N(GNE!P;kv#va-9S zo6%RN_MVRw>kKF`$&H?@*@KUWbYNAS|}F>D_{# zwyf=U81rO)2y~zbPk$X@SEDtECO^z0D5C6V6j2Z>%NZFSqYc#az6}W^F^|u2=2VU0 zzV$P2hdz;#C zi*YrXde;0jIoBX7pgL2dFh?uofHHY{oXzQQbXZ#LD0=D&@1TD1SdPJ6-s81I5~Ni* zW$uO<0Izb=&1LT22Jwu&4fCYv@PB$M(ng2(Beyv4Y6VB19y!1Y6C3Ga1v(LwBeQ7IBic@V!{OVo)yH4MqHEqGy6lvV3imvl2%_>6JNA`X|=JgJoGRBHx z+2{Dxx|J38q|1JtaU1OL(T*RI`&Z(dhHH81$jbY?{)OtL#;&$7_yH4peGNkk0m7(U zWAC5**NL<67PqGjA8XRVPV6K1lYeUbiswVplpXHYNbfjJ`vJrjf0YRr4D-gfA-iil zO}+PL>0WDUPLV?UPH%WJqdGsvkmMCzE5+lWiwn)N;9DLJcCc4(&>IoZdc8dUeUXM3 zT}*?W*pmb$aU&?&0?@hn-u%gtE0A<0s-3uH6T2Dtwh0VEp6zDnS}H&Gqy2nLSYc(l zXxHNT5g3$K^1A5wtb}i6Kik29w8WEvZv*6Rdwowb6}D~eC&RotCb$oT7+0@*JpidO9qvWwZFG}6_l^tsB6EhN%!Q?e$^gcmp-9;V)# zzv+z}P$&qQMy{#dc#OTDG%3CTb5hu05`0X;bS1Zl+N|}%rX8uZyuirW7c7SH8`3IS z(#lO56JhUfY7DB*>R4dAH%1Jz6c-v#GUln5XjTHckHtiObQy=0O8mMLlJUI9^0B)` z6^qc9QLDMs1E))H_sa}w)S8wEJCrO0f0gU;VcT^17}~vGvZ*&1KNs-zTi$WoTE)^J z&RHI{54MH#Z9r^{}NbH2l_t|3dr<-#p?mNwjZv?E9gRngh+&Bdgd|1HWtc?ZbyJraHS^@$M_0uifMGdWA8YFZisXp(A$daz z)-ho&)vPQ}o{?t)z~2R}iH=K6%Q(@c*{AbE2XQQo1Zv4O9dfVP;+7iK7gYt{C7)ab zYmHeEm?jmgXS_EcQxv`53ZHWoY>7&f`1qpJXF71`9Siw#n{*mGR8YdkTf2p={Eq#A z-X`Xc=J>$@-E9DU?&jdh{MWutm8F9kho-H~l8s99aGXY`x|lEe{Oud0nGBm+CpbNO z3b=iu(3t4PHUhb{h|+Aou9hzKjORyE5HWDsC^z?b!|{?m;{#KpzE7jX*`IJQSStqv zwu$hq|9IHK7S^E0%1D#IKuFm9Wk6r44En6ERyn#-V>Vpi|xIUD=P-egXgucTmQkx-5s1M1sc~w@ExqoA&}b7YDXTOJOU!fNxugyAw;D> zEc=61V;WQpGYJ5s_X__5qY8%?irp^#Xm-tITpDlJAcQV#@m)w*>%`61-)?1e4Z zt(_Q6$oE?d!L&Ba{K-V%vmkaA9M!~@lAuwuHe)XAGtx@=3cllGEuA`X!jQwzzXc&T zKWmhMk^t^)Vv}va=H1vwS>gH=KA!|bflqMZ;Gh3AW*3d{uU<=+6vvjBB5dqXRi00N9MkHDP{@U^RXpH~tnpY`yx!22_%3wH&F$?EtPf)GYCha~&aoxoGPzn}3h<>$se+ zBz5~S40wygyJ_J#y4c0-;18M;1miC5<7~_44yu(a?9?*#Yo+Y@44p54$>~k(_O-;r zEI47m6Jm`2L~rH~hUn)e%DyI#i*%yt)IpX5O2TAg5ux!ivE|3ZUBfEz*lHEsNLPvjqhPcI>eEFVuX1GKn^G;8$AkMF2w{n9Xihnzz?;lU! zaewtOB>~cs1Y10Uq1j0ZiRPYGvR&SkG&I96AisQc)V>xTtsHjJ5=Rg%Ui|d-Op1&L zD^B~?>yLd3(#cPFc!5e>Jr^@DzeQ(<9-MgG z?=Vcw1Em-3GdO~WexSnQnVo3(B9jP}t0RWsx+}X(2&k)Pp(L_)N1g|n7g61W2Xy^q zU|m&Q!HX%+mZwguqe-E;vEoj9kUg9kxE*fcks5(reG2l4rJI>8p4GF{eOHuYsI(R>wa zNCphPp90_}#8}h(fWHi4+Nr_sil9YT;|H@fHjM;{eTP@$Lt#Rhq$lJQ>2>^e0?NKe zbI4T8ggLm7PUCMGx$p4HTQGo|_5jA6+I@dtN|YzM3}Xi}MMZhVhd6^84v{j&6Uq6} z7eeEiM~8BLetWqf;-o=kYf#9AGc~x8uCrG)tXx*Uk;Y&LB@>~~{==f=iY@H`PA^64 z*=0tzlT~#4Uf(!s@h~iQa9rAs8q$o-#~2(-3v>V(16oC}nwjfT`-_&>LEEF;hS&q5 ziq=;l(ZOfM1}pM85!NC^Bg!D$9b#K&CXmTm2CLJc2hYxLz8GuKn=U!vck}W09OD6U zvHa8r1}Tfpyi-f7CJ;(+eR82oYEgkQ+`PD@oTWq=Q@U|d3qk-F<|r|8)eMxKUDW(k zcBks3p!h0Fb0TX-%bs<5X{>^M^uUe3M+9E3o4tYJ;a5QOQjI`9q=IbtZsLhvfp&!| zgUJ-);-{^Y_Ad*Gh7p7ci4pF(yK*&g*=4?jxOj*dr}PN69?UP|T*{T02p-^Fx-H~@ z0`>*quppQ!2U#2B6-~!TofX)x3~Wkkcz(;$#xqGeMIA}|l6Te_TSMX}d6H_G*_kzVJ4?;4j@g&_zP`q|{U&)= z9Jt=Og>V)966;}sLuipBXkwey7jsBw&0$Jl08-Bv2JmLXxu(m zsOYL9gA8XK6aejmXJ4kt-B2zgD)c{o}Q?QVQ-l1tVS);bt0kQD0|K=9W*(nzZC7retw$Z#!jxj23S^GnoX&SgSRVF@^I5iN)rqjECn%t`MF$ zHHB}Y5MB9~QJ7my)tpk^&WjKt^J*mj4SH)^q+MME0dS*OYr?izzihk>{s&R~PVp); z1$^uFuu@)X_KjH4tt$RF`Fl=T#}&E)zURpcz$(RR5@Kn^CH8De2IeOfDy~>e%U*p( z{-cIVFYSI-7HiO=)teNH8iHi|trvUxn5rcY$ANoqdzOV;IZU{jq~E_0l@c~ZUrl}z z7`9myqa~H%vcx4osMZ&ZF1+DJn1 zTs2;7e@6Frc(%2k!?X9S?QM+)iAzr2ZeA(4RJI|tkS?XwDM^+gnW_} zJH&`9(if7#tz)mF2^ATi?HNQ&($wPl0l!-z(KRqW{9FN9RI-z^Ym=4Tei!~sMw2@P zhO^B!YdPvPb`isyQe<^n<1I%Dvd%;(JZ(-`2fz$D7tn7C$?WNx(>~_7>U-Pk_dpo?-#xm>~}S`hlvs~y!(d^a-#+H-h6<& zTW}&O1G#zeP|ad^M!aw1x6&#j1^zF12`fqmzv$!f0tn(=Ux8?>=9|+PU4R~B%Ll&2{&8ib}`jl@Em(#b+JdGQgD zrgK-v&S{a$@L5^um=#xtLO{n*4NO68@awToVCT(%1a}zAAN3L$y&JfS5Y#oc&anHz zgoC6H7gf=C1zZdE@WW^fY1S9k*SV7qPl@QM*fT6FW$x}8)a`agVG?(G7|^ zdrVi<;3dB}Y?_{|@6(0bWtIf`RCkr(!~@vh?fCDpqqfBVv=};?1$qFL1tQbRr==Zl z$B%%uz6`{UV=-hjn4`+$iWwPKD=USLj*1)|k5ZEtxuI#OMRN()uxuP<78$v1|?mrq0ArL}WXleu>2>Y>1c9hOuWpAm40r z#OxPBLO3K;id4*1CMwMiDggZqc#TT|kRU)0^RJ{c;y{rJcS|kojNFij2#@}Q)QaQ6 zxh`pQOW*n+@I3nz<@E2+I}Vnv*4%)AJGX23^!Z5%Qxij0j} z8-a~(nI%$p>G&knhStW|{FMardZaZYBi@(89@}c|?M5fo(ua0wXEQ4x#-ATjHjc#a zloW6I5wu>UIm-~lbxWXn3c5c?2OT5oBwr_c{?U+us0%U6Y&A^L~wf~Lhg0-mV$IrIv>2!qZ5Kwtsf=N-XJd29=%)R8iF11E{D~)u)U;BJ?U5OpI-L4y z2BCPajMUhc&L33#UF>JPJ68%H6wyf|Uw&2>(BOCe>6fgWlO)*k%(oUc9@+8eT*i1i z0bNPMb_3rlXyb(HidDm0lQ-WhTytzFrb?EbBXgK&tH{@fZkEU+cS)gNa@r}FWoyVC z7EN3Jq5d^ASFu#_>PMmUuAF6Cakk3ND#FVNw5xSf8Gu_;$FVbKaqja2of`jY9yf%$_!lWn`5ANR1q}vxYr`D#>qT-ES7`hmvlu^qK*UwQ7TD zOeY)k!WRR2$LMvYoe>8aV009z7iUCRU4H%?sel6zznID!7tNf1$^CJdY5hwuT2~#7 zB?!ND_wF{8MR!vtdCl0xchba)%}f8Bv#Vaon`vCnvg(WV59JZqN+L-#se+9y_r-_g zkOp(RX&iam=;Se3w;%s-S=%bwN&zxzyUj3J2nY2drK(PUoDT_dv;&~0!dQtvdWhY# zYT0t_(V%yiS_gzvoFZV{DZSI36EZCtJEw=4Wq-dqhmNI$8>JLuBNKNM{H~$Lq_6Kg zSkt)uvXoQGk?a0RlL)cdL37ZVA615>%mxm3Q()?#lR zw&g^Z@u9W^8v@thhK--Kd0pqV81Z%L*MDIihD?`_0t+G%9dsd{WzM$RDz5nJM{IY|7`P*d^oP*1|>FN||~=l^`m zo-57>;?!;=%W(IO$J6MWWwkgsWm2|0f`(B3+Dp@feF^?ib`H3J?gvQ<@lA3@j5AL8 z1V7(?q-A6*xoxe^>J++geOIrHx1S`-clA2K;&PpxKM(!q5W|-zqMFU?T@VG4&s6k@%tz>;q|aym;?`hbzFXLve;&btu%eSXoaBt{1JY5;l4< z@NiD#SxO&qCe$+o3k`i`@D%JxNqoY$ctAOPzTXijK`%Yn=iAc{?zWH6C*-g~z~2ex zN!Pyc&2MN>E2ITJopWo;F+#YmO+~uerw+s1jxT@X_8pa3;`pERDtTgKwQKABa{(UB zh@HD|A%p%!q&?~MN{4-?AEB!X0R80k%dWvYxlrv0{2)?U%#fnVN@VWQ!6PDwER^S1 zd<5K;jt5pRQF6mzxS;%@2&_&`fk>$$c7(F$FN1xCZU!g5Aqdq?JYxwVQGW1u74jGN z9Xl&3K0dw%a)HrOElp46co;yL{c-NJpO$Ly`nipr&qJ_R3O5bMtcL?@|o<#{~2|6bsBh(ST1Nny3?UC-le&ITD+4+Pyu?D-miU z7rhmKy?VXE_AUa2s+~|s7S@a>RiVAuaWO0 zc_U?=yyKJ zhkHEpnM+x?R;s;4papQxGcjSe!<0j6mZHHnSlwH}HARx7R~3(z?7*Bhrqaa#JeOS zNsLdOw-r%nQZ~>-|6U}>k6dKVv3wE1I zJW6sXV|XzCgdEYB*$cD9!qX~ycQh)*PEETN$|WQ_@bSCTlVuM#T3Eg1zRob^Q) zp?@;Q6Rx@W2GSU+aZd|K-koCEd)LAr3sZ*hDxXbpMn#>_fWG`789ypEF8s1!r(^Dp z+vm8zK$28aTfvHx=c&eKjHquQiVc#Tuw*bQ`Dp=kNy+Ch+#lnvXyGR-e=8`?iwTF8 z-d2z9;Orq1sE4qZJSO)h^Sb=u6K%AQ$I-&U4}&9JPL?z{N#Bvb>DWat2|-WD8eLs{ zZCM!cIrxk#-+tj=!~N3S5Z}Xh&uw=Rr*`1W>1#r^do7Zt66LZ*4PM!3q?jj%bHYTYzGep=!PY#yHGcaxxA z79upbA!UXQsYTQ_X{4LAZ#QYu+E^CFX!=^A%u5T8>@c(+;o3e^ZO-O_61iLc_jAxF ze)W~>pk}p@kN0|xGCUOSM)OV(yMu<4&giM)zPt|K%J~h~&kr*3&7(vP6@n5~=bu{9 z^-APGL(T46+ymS=zh0T|+-A=?2tY?|UodV@a%!raR_kC_<7ru z5@tu{ScK^?B`A^r5QI~fx4fYBGY$fpb?FDZFH3I5czHiTpPWNg)Eqgf7`{x5Jy z)#vRQM;}ctq2p}cIT*NY4-xJBY#64+30ue@mi4)SI_td95L3Qo%~t5*Z(^GJ`4O+d zz7Rn(q$wO79Y-^UeiO5rF&aU2Tz;9X(uH=k~ zUSbgS7kB%>mA~4|xU05qydvAEPZyd6EP3g_8@es8H?^{T=}pv^uUWH^Vk$@$ z=W%oJb#fS$d<0vP+-wFUb%^< zg$*3ZiM~S|P6;djAU5voMX&A0`?{r;86{oJ6-tSXJ!{yiRxZW$u|zu^?cxu4m3&#=M#_b z7?d8^Es^JZ*DnHVlPwBG$6E8v%$HzXPc+~$BgQWDYNVRld$1wEH%|jIY8Uxb{_f5h z`WGCR0&Hr<>#^0Y+w=Bg47ciJ>EQye9Oce95F4AS7R{W~ z8xVbaUQj%!9@W&xpf6e*}KTd`X8fjhLh&*q2O6P#^^&|nm zvJps!#N5qymTtB~dKb#?4{Kdfe8WJqAq|IS;r;voql!98+^K#qf|Og7Ksn)9u|(07 zp>}ekNq?Qibx`=>ubWwL(hUW@AMqk;IWoB!G#7ozq5PY3-J9_<=uZ(6nZ_IH>TgXlsz|$d4B~mUh7IXplf==Wb=iW}k~zYPGq~S76>2#v%?b$} zB4+6c5eMkQfh2)`-*9!|iCP-rmd)aCMXhBxO{AVIyUNJ_OC`bX?+{!C3A>YjKXkbL z<>ky5jsC5vif8_&0O!y@UsPK5)cNx3-2jtBE8e-L}THNQ#L^mmUqqh0i-zhNdV@{z!EVDM(7hkWJK(bXd8jWYbL4#EB%_^kteW%A{6K zFh@38HddY^@K|K~k1vn%u7g=$^PWKXU`ku`)i5t_X=j0mNRk$h+;uWzV=w4U3`4=L1fAZ5?TSyR<+v`<(Q_nL|4vh8))JX#(mA4yLKY$u)zPvBuwN#V%sZKE ze=#E{WAyy9DQ*U2q-SO9U92pK{AFIt0X_bC<5EOMlx-?bEAD1Q=vJ;vX2|Bj2J>17ES~0UT=h1T+f`@1NtWBaf(Af9Vn?2G*OD@b9HfMhhg7%~HcZLPl`J zHri*9(3OtK!4jA|`sJ2gAPUC=5r0E!m`3yYh0T9cF1 zy(z|>cHET9?$(_LI&@f$Wh&y)=iwDe%z@E=_rQu^fPyI)*VS1*Td5Z6$#z#q!RBgb zTpJxo;rUJ_Afdl+-PX>`{DPHMY5S-T{hQ|A;P4tGuA4 zACx(OQMEL{A!Y}$xkwO$P`iq7x2_yDMYe3a3p~=W1Y@pk`CIz6OGS)gFFlK0%t{wb zn$WMyCL_W$1;Hb;#dqU0(F9tt3a}>0dX3Gf(=0wfMq;KFf#yML1g&>#Jy& zlVb+o-9qlAg`GEE$$*q!WAzf3Bu|(7d0+5yJneky636b>=c59|Ho2taR^LMP#7svI z_-L1mq97uFP$~zq+@E9aRBNJ8SruNiBxPh7Hew&*<3?fwlsZtSE*f&o7JmStpHn=9 zo;TP1)s=he9ykLu)H-eE!kUOVJ#-C;TZY6R1x0}0 zJI+d-Tbyeo^&26JhXc!YuS#V^!On;`$>_Z<~bVz z%mG-_iNrot9h31`zBATTjUj0EvfeEEV1J03L~KXp*XEwFv&bg)C= zpEPA~H_b<1_89Y}M}p^tfutkx{?-`#`0mlO(NH@IV@wq&yl@MH7g!w=61v zm3A^ftV<~I;PcEyf?$1nyTHZR+8g3qlu(pHe^(1Ao~8PuI&JQsM9DI3GBA1*tV5_$ zK^et;cDX}(G?3kZS}4p8W?3R2%Z-}17+hcz;t>(RtFH@<9Ku}q1W~1VHlZRH+FSVe zOJ=3Z67X#seuR8S`}`NT107{_;Zrtf_TOOW8#1qgq_e{N{zsDFzfPG%(FAzik-MI@ zN4AB!Y-Ws9p^LjC-|gINF9*UE&(BUoQV*D6Y(V#$l%~4+{!+;_gOJ3uZtu1sztrHT zW7_APOVN)*K23Pg)n+VHq7{ z#8e<0EfZ=WsyB16!~ZRhviBj{-EJCHoSR*#a`)@Q$a7fLx6qFdU!TR>T#fs3S*H61 zx?WF9@FZMKvFRKcaJMZ*f53JmD_D**^e5(!!ADtS-s~b8PUZ~RellpWAiX~OFd_W3 zwiQ;?0ehd<8(ouvUL^-gP`RX&h}%-&t&vNc>l=n~P)n% zO`}Dd9r>^F#Q8<%>w7Q$UtRR_OSo5le+PTg{NDrFVPllhe`)09^2TES|8nQU@{rE? zvlFK&64-@UxsXw=Uz6+JSXr_7zprsQ;*2N=n}S#0jcGiyJRQ1z3_D05^B4UZNb$o4 z#b`&Z#w7w;qciK!I`d;gVirtAu;hr#Dl1wW<*8^q25%%*n{gGz_+LZ^xG&vpcgkDb zE^6o9a3}j#94&T!LQ*S{W8uKn4Gm5G9tzGcznD#*y9-{rE+TcNzN8ZO*BXs&ISeU_ zvJAZmRw7C2?a?;1VNSgv4ka-E)_7IsIKA?Q#(@{{{ z_3Ha)GHeh#*V8}SyT7@%DO~9@bV&Nu8Jb|LlQ$=ZH}T5t2~NDBL?-3Z7L97t$rGiT z;CHmAB&z>!>tRuM-!7k@E-kG*iS(+8AsG%w<4w zM#NF0RP|F~@cDv=@9oBm0{8IM0%?H^rziE-z+X62Pv-o;2p&$~xzc~;l(ZLW@INsz zHiaQ9wD#sI+ucrgz0wUKs)=~Tx*WS3?;piBJDc#*rb4xx$Ui<$v^Vw=%Oyk{b(eEV zp0zQ$KT_$H2*jg0HB}1{iKr|Y^dT~;H77a0&r|x|Ps$mKeZ))gB+RfPv*k3FHnJQJ z+4_}o^vrPV-F@sS!cCDN8t{KZdx2ZTGI*4kKkv{wdi3jVHYqqF>wWNFmoEQS;Xk{s zdzAwi*X!?0CA&K#edQu6>1kbzgR$9mmcO}Qmhj$R9n=TmuF3-?0?wRUzLPv~arK~P z!C~+p!uj_K&lvfi$cGQ!_rPk6F|;i$E0~1bo=zcHl8n-9)fMwzB2yxOoVVQARj6`r`qda0w|iKqfj4L3oJspjwj0hsPJDEMHc0E-dSD7nXwx3c>mh+`36)uN)pdW zI?NnpK9eGR7VOCzd7LU>@BkXlkFNSZwS8q!+|AeJgTvqu+#vxnK?4i~3BlcAAh<(t zcZb0>gg^oW3+_6&y99T42<|@YJjs7+>)qOV_rums&4;dE)y#DDbltx9+;dK+_asf5 zy=WAgO2vlXzph?v#=Qu*WF$;;!%PEnrRN6DA9rTuD6Ji|UA+nyGEb%%^^0hQZg@P! zOzx2%p5CFI4PO{^siEbm6u(er0cBbS>gI-MC ze*w{@QaypNS=jFA*fh#1uHOT6{2*yeC6!Z%J0wcjA6qVhKGt{pO$ynCn7yN+*9n3= zu0Ul?O*Cj(c1b~gVQwWhJCD@yaDJ2TY-!SRr!)Lz6&$rErQ$HQHA5;pd;R4?#q_%u z*2EPW5`#lLa609PG*uv)UC0+*a~1Y#<-IcsFoqoBf~6r5Cp778$eVhPJMuSFrQ}TP zy9~zp-HK5PJ0f-%;{9$SJz-=tomvpmVgc{f()jy8m&HrRL%2zj6ZN>K(S_yQ>b@BeB)s%{Ttx?{=Z|O{t{j7P*%;|l&tK66d5%&R44H1tGF;` z^H;M6u6*gg(uMx6vwNJ@nfM;YSp!e6(l8a=R_Atyw=Dvbgl$PKYW0D17+gADI&M_b`?6#rdH>Yg^qkN7SiQ^Z1FIyx;*l>hJuU2#ya-|9o=(mGpZ4 z*xzG?bm#2MqbNhj~v5C6{m~2HCFFzLdrH5rc@HWIAkK79IvR0d1bekp<{F_8m&{bxS`d7Oh??h4M#+kJR z%nWk$d%-Rk^TrWC5P#e+1$!ptBG5jiqp#yCtP%^N`7RSq){@t4-)k!O*S!EKu5xDYx9l^J$b;(T!)BQT2>Sx5W=7 zm4cI78a=#uA`Xh<6oI@w)UB8nKG@vWCWrc+FHg*oDLN1*ouU2-3eE}LF6EGoVf;N! z4>s26*E~4EknzO5=Wv%QtcZatjtyOHF(FRD8$S&|kq#`|7jxRN*)pC=TOwq20%!E+ z8dB6!Z7QuqW>$=e9~ccjXnYC#;;&6_pw=9IvEb6mV&aas8-8#ZqSBg}|1e81OT0Vg zD^6|06R%*lx8ON7`08bynmU{2eP;%YWS6svBuTpz44ZDdPrmJYUKH*U$Z`Y(Ecsrb zQ9M=%At9zHAx4_m$HD@Wlz5?xixap8V=&>sg&JSPES(9rweiJFoGp{93u=hAvdQYD zq>MCpm2F%(-@nI>YdJ|UgQ^XO#Ir!xFK{zo3}vboXXk6Eb>Q40>Zhm+nZADHVdPT( zVy><3xi<|s-~Ly_O^V4EA03J(r)db9TjSO?a?n<>`>HbZ<@I}nLbFWl6`p`Z34;xbt=MY zh5|5PuZSh(2X&73h4KE4C{#m)yDr)z52<__H>NJkxB)%C4^0CaXeub>`3o^D?%cQ( zyR9!mmM)C#X!5r@Gf~u7JbwAK)%uO6%5eU;dbESUaKTpfT;`?Y;TpbH5`c{*%y8x# zbF93Bx8PnvX2rtM1P>!G(ozK5!~ot52)bSsE1Iu1W}`fpN?GxpTl&?6rH1-x48O`x zK1VO1D%XmS)}p!NoyK)tnWZ_Z`|x;WC_ofC4hlCKvJX^vfwX zrXA+EA{nV7ZZ8knGpYyc2D_LbqkePalRC;E%2pk!L+qyjkg1zP-Ye4`YG|b>AOg9m=8Zh zwlLOB6N1yz)@2!nPhP--B0j^=PqYsOrvi%EngeO|@=@BlVnyi@NGUn?ndv5K52g|8 zhInpSkt#@Egn&R}FArvp&$`S(4!L67#hz0F02?sceib5!p6-P;Pl`-CkCmCa%%y9g zq0*KNI%)c;N)Pp-Ru{NVl)eKqUm{GE4U>qf{CFl_=0zqi#r`c;<2JRPRLqYe$XYus zMjPNsvRASpiaw&>2^4Icg;}kql-&}33Pv9R;}WMvZAd|mxr5nq?rPVu(e7YNT1D5|Z6(xmY44`jb#>CRlXUohC7xvDwc4zZ)#1xaCV+76WcQUE zNkv6fs2~wY=O?Aw7mqZy-F(I$em81L_Y>QIr%BJ#&T@p{X&G<^Ci%F=*uIJp$3NwZ zl0>q^BW0*|P%-cdHGvs*GIlo7!1hJQenqDuxLBh+c%>*%(jo|KAHYi*B2!G8_@?ti z8*Y5=;!#~Zqe+(Brw`?-W0s!_9K6;+iEC3uMpK1GbaL(UN3ZcKX^J% zs*x58g!HJ$tHB7TX}Q9kxENW@`S!H62`*6x(Deu|?3#kH1jfyZbDde?(qu0A&JOXL z;-sklB;box{(}DO!=kIxyQi@tud&HmaojHgcmbnw`;mIvON80hUs+z)H;WAFkP|FX zX$^ysQA0DWl9YkGhVFa?X`pt?3S$?`fOAbWFaeq(G(Ci7TV^myGF7(s+o_7()$N+| zN9AFXG4&AIn+|aaH^wAJvGTx#b)zZ3J0RxL%e~jX=2F_Y)b%6jfaZg|@88-TOp_-q znt#HZj{y=KqAb)Yzpoa_nKp8uMK4vsg^nOZ4Tz(v;U;Uv z8QRpGivdzD72m_EMd@}|v(ZSE9Ff3isBRHzSYMOH#5+$Mi>1XQuW13CpR$w#Vd*m1*zIjZZ&^fF9|n zz)NfN+h*xrUZd-1qvuCT`9@qOI+PxDEQ?=1#Ih{9BP=prSx?tqEIwTJkrnK%-!ImP z#fsElRX}^`n%N~~_@)L#M}FdyQbX=Jfj_BTG|Nd7MI&|1{a*7gs_!dzWKS0q;#m!> zx_r?JAtmb6E1u4rwi_q|l;WMM7lhwtvRCoczv=xvZch%hA|D}kd5J7hTtT`xL7?zU zfbF82?*$K0s8ys6r;~(>nu|0m>E(SK55LNML%+)6bVV%v{Crv_If0 z#4kmPMXv;9ehP0cW)h*DRFjJ?*T`BdFnsev46bCid%Ks?v_3=n4q$)Jc8+$Gsqi-F zbvci;Zp0<~c`PZ{oAXk>U9j(TZgWa_si+BN=Yi9ZbN8(tYfoHwyJU{cnfRR+Lz$9$ z<}In21u9eeLbEW&uat({fT{OEXjJIQhVorBc2VxhEPD)I|ifmV@bMHLxj zo~j+z!d37&UUy|FkEv#(KT%0UZ*-%xX?LvF!dCN@D z-@$1&Hts#H_AO@|dv^97v?fY6V4LJ(z(ra*ys`y#JZR|CcHsD{E;-WnHkt4n>6f1g zzI2}JTe^3fe*SStwpQTh(?GGFPmIR%+Zars@q#9iTzebH&B}>B7o8R1sD z|AYJOG`o^9&v&uX_)aC*gEgP$Z>-PT#M((OV6YSYzNVA3?xZAS!5_3GsDy{0#b3*$ zp$$|?ku3gI=N~UQ-9>98$qMBy#%~Pq_1fD$g%{U8fgijj@~7nx+EqphB%q?SqygFt zjn*p}AV18U#lTp$IG-FqsbZkNDe{Gy7&GIBWrcM4#W2YZZCV=%1jSWqyXA>S2@Vefk8|;#PDPX(p4^gl&W;-LXm(FNuNBYn zaz%CSkONtX^75_?JuC?lH*-?R9Z!~`|3%W^GpE?H^ums4RT32ovKckS8%k#1_&vfy z$_m=rq)Th5!?JgH(HfUZuu^7X;)tSCi3}H!Oo0W?lel59eBq8xD@4>BlxeuH#|jLE zKEf7DK}lqpW&Lp9z?ic+@GQ8G!;WiXihZSfLmNFd3&Vp7HD%!Kw3P-kxT?OczSf!R z58On$W2e0D!oM9R{D`2K=7G~;sLYLU{CN4kMG}WG1uBV zgyx{`?AqIuYlK(oI2I~;Ne}bQq2-E0Oeg~ z#=onS5=Nq85fz~W_c{JK;C2l&Uz*;EZNm2>$c?hf4F%^jpye)oYo)#C>vA6SxLF4srg4Tm_ra*O|WRR(>wKuc4l6T89DJ z9;EY^zZ~?E$uqud*I+@Q%j>3)-%%n;jN`gdyTuUSio)&Uz-7YCF7YM3tFPR`s$RsW zKl0VUKk| z-F;Lkh=OOU`kjmWOo$!mK>DSzmVRR_R54w$YAUk@P{*4L_jD%PvZC_Tg`+S0n&SDB z;+A&=D?S(4kN2g}%Bm#sIFb~YDL;>H%Pre4-PS;-7MicyqSO(k9Be;4Ns`Ohvd33r zBx|EZTLW~4HfAU^;5|l`rRJc-lOH+tmXj-NAWi#?sU{NTPgh+n(*x_pFi7UIDaY~Wl|~U z#aGmr7inj}!faax5NY$W>va$I64!V!)M#TjCSjH7y^kyA)s)$rcHF$@No#Wn20)Qv zzgM5VA9rcmVq#NZ%cUkJcl;|t{wTRl7>fz$zv44>^z=IRt1T*8D`O2>UCF;~5yK8{ zo>^g&2W=mq`5$t?St5w%o%_&AN}0sd&4w)+IcVU}?x+dZ*Pr#AA96HuROWhfqevWl z9mOI~qh7dc+OaSsFLXcO*gsSGJw{zTeY-n)3%1woy&IZUDNDk~DP2D-_lwxxHcNZw zj#F&?=Ju-aLRv!X7UqBJ{5T6;$&I9X!TX_9wfkG5J)HRSC9XqIyctHW?|b*kCmq&u zd0y;sBt$1ke?-B1x;)*Q|6}@&!ozi!WMCg2mE@jQ{bYB2P0SHi^G*hTy9Wy2&CBk4lw8p`u} z@GV0;u(6y=35)?1#guWQhlrQd3hzba&inf7cjyQ$0P zOa8Dc5J_pRefZ_Z0i8`rNymO_ryAN#c70`#*JwzG2+8*mL<~73M)T{<{-u{eNSi4% zR~P4sxMWqSH@W3QCkFoeX3bu5cQPWkwoAWr(_x$To7=G2_kC?q!bcgQ-|jYR?($z! zMeGaBvETR+ux~D&=zWP5Y6+Nz5sNV|gR*t#Os#n4s4_;Nzq^7ajjX0< z?;a1&L2Py}#v2u|h@&JLl|=m5lZW82{@z5(H#9WNHa%HRBC#JO^$|i`{gS+nSC3}m zRT_NFB8OC0bi^wmzczZgl&FHoEj!?Jq0`1ARlJ{EGU`M~5#gVvFh6d|Vhi4NCa+CE zji6{81e5`KIibCK@Qb~})?8CEXDlkh$M) z%M2PqEweCI+tC@(gyytX1G;#FOr&r-E!_;w?bw%aiUoOp$Y&NqH~UvqzNpHmFOUmf zbz;n^EAR<*k>Vg5=50pf2;)%k|C9WYiPe4my{kZ7%-NF?{aRJOH771+b}EU-6@`Fa z`6?a-&F^C~YRVR3JN?Fh#9d;1O6nk0_7+~`9Ti5M0uxq^u=K$@`MhX~ae^`lSyFOW zBfGI6l{kzGF*grvpg4h9n$Ae)R*lhf0k-DsTRxgWhUE!EHp6zSp8;#{a^Q|HFO)CP~_y~CTdBWB7G|yEKgKR*vc<4OH^L(fwa+CSu!Wa4Smc3n8~Xh z2W@;2KUM%?J(z&9 zT(_&YH#9)B)GOfk7}UC%0S+B41hZ->N|Z`@6wPc6m%S%~dEm;&;p{ne4&oYS<7~!#Yc2RtDW~d zUn%zvXwWy-mY65T(cdOfUysC2I@%6akgG?1Dk+na!J_W&4xm~rM8u)-Ck6+jnn#g@ zS?p$I0px1#6@Jllr^Eq5VI~|j!QLLkqts~>pgi~Kl5`xxun@-Z}Uc4#bXV;ykqc56<_~l zG`t(!8_>|zciIN)I9X3^yJ)&SA~6Vn;g`##nm$I!m{uqHJzk3lD;{2SmZ%wxnYFX8 zU~lRcU{R5MU;IW7u42V{u;t_5@7|aI`T5Yv(2qh|5HQmiu^S@+2u%n@inyKxKFe%L zPtc@W@**@;G&IMxc7*7-I58zN+zUgMzd7kG!VmA`cgR5^c1}-0cq7YKUV3$%LL7~( zFDE~y45LmB@)TS#-uhB|#lDS%WK;5*SH4?!7T6-i%AFN?pDfle-nBJ{$6v|_xD&Lx zJme21>Igs^vBJ1hMd}EI@xhhcaYuHzs4cOr?%P_p3>KFH6V^QOgF8l*q$|+5vG#@qTk;+_<=L0c2aTIb1t9w-iTgE- z=X#t^P`!wp#QAsw=!yB!3Vr?KgJaHt@IPG~?huY>8dov!7di=oPhL6HAk|8t+%TI$ zlol{Vs|+D^8ogX1*t8WVQ3Wkg9}^R!%b_SJFT1y36p<(CL;--2st=KEk&^`KRnJ3~ zOTzk!n8aLm&4+g*_lWSkM1AaPf0D;YhKSPnT%@jcLoi9SZiQHU=>8^^DSe^v#JS}B zPwnyl*vNOHYNPRae(-?Z?RrwRvBy6&#Aayqh_{U>D(=hv}hpD>xI9HpN8Zjj4eI}M4*Y-0i~pNvt87g8i{0n7s{JO;w%7@lqQ}7#k}S=EmV(QxjEyg5lHgjZ zadfa4h2>$%cDhnuB{3j}X43cj2&gfgctgkftsQt)tpBT(K-*hfqVhJxq~FM`(7NiU z%H~*2_42Xjo8E)+0*8%B_F*5a>}H#x!$MlB)lUATZ*cf?B;cP*2*ZOjzy-9j^=*(8Ys;!t{bL1P|uQHF@aFHDWMhyQjBQ{%_F9okANafgat=j7B zSVy?;&Vk&!7d0WAW%GUm$d(}-_jMpHf{tb?ZRLIBgoLSUV5b$nLM;YD8_j|u25;Hw z%MKDLM*Oa;X>=FKH$~s-qfjuHDUENb?-d=;`CQNH;sSlZ*> z%2Qo^(^ay50_!2zX}w_enZT#%8-}(9`(He5=8gT5I^8K> z6=f!nkUDA4oUL@;%8_VQ?}JRIX`PWMc0C-4rrY5*7-J6@Q&_!~-GmT7#`@{KIviAb z^CslOR@GJq{blzNn+_aSKED(6yUd|k-%d8zA#PiiEl%s)pUf}Fls_H^z@|i8bxn*L$YJj7i-WKxAeqt)#9kNVBcZvtMFQ9Dbs5R z_0fQ|Om5EAJ0T3%U=)g@^YVTjSF`5iZ@^We`W~iVEY)rT$3QTqoH^43T~WtP$?W1N zKsl(DV?dCM2gR}orQbQ;a3jvIR&N5$Sq2B3(e~^UV@EUmZB^o|Bn=lAoZ(}kfPt)k z>{`9aXUmqw#VQTGUWRW+?Z&gJ0@(u7nRXi1Ag~TE@}!6`2p;J3LO}${|J0CQ@n_`wAd@Hq|=r{ai?@rYuL^q@8 zS0-~d;t5V22P`b#ETUQ0l9R`TKC(5-h1Djhqj8RCx-LP{m`W!sW!$Veob#c(pHq=I{H=q`G zNe0$Wm~&h_3J=y=i{Uxggo=XRFTeyY zpfEHp@7>H&5>AjKp46^|(Mg@5L+qNh!2=+4nelDkG)L-@axHnvJ10bE2I{&o8j!v} zc6sX~L961kzSo^b^YsrrhJ@=FireEN`Y^?kU#soK0&UWY<q|zn`zw_)jRfFmFM= zn&39f$ALCjWk_<_8*cKVNY4}Dp)GdYBjga2KqxG9G4-N2~I{=TD!A5NYkS{B>^Mrk*bTcAH* zwF0@<(DEmo()`Fell^g+W(5tp7%PY`7k}sbxVD(&2ZIO7XEs=kKe_o%+~iKiXP1|GH->FX z4>HZs_HFJe{MVO=;0K*yoJd)b2Hnu?X)$|FBiDT(nf}3^wjRePHyp2!@Z2|i(2rkB zlPJyzR_YT(nisk*q|h8(79fu07+gqTEUhVNwT7zi1;%zt{}>1pd|=a*C|T;=t3Wdl zI26lY2m$sRUDX`f;X_fyq;pUjyJA%B7z{BOg5?)#uVv8i4?1~l&xYC)wNs_Tt}LM(X&cG4 zYtM08s3Ay)gL|**e&KBuMDX(&I)Dd-i@{}S!t4vP;-MsAL<3G-r`aUky%oQp|K^SiFunRV649E0!B74#dY3>PnV>-=>WK^m*H32g5^TwB8#7ql| zIGdiCTd$KyIJVr{E!|D7+eHL#HZUmXc;gycyzwZ>J7~?EM%(#X@2^%nh6`vUqo|O& z2tCev*f&oD#XOD&f-`{tMH;G$DM!n_rtzIlOam{RSgBHVpY}a@MM?oDB{2*GayuMIf!B$X*(*T93AG4^{H?tIbBq#v~S zv1FsE&%M#xV#o0jgkOK%BK%;e$$rtW?u2qSoM6H6+tJX$hrRW&)0xj@kMu`M`rNyX z@vK=C)F-#c<4Fb&uQ*%-0se6I5pPGE1?=DniPGZEy-duDF0iG7Ic3(9(l0N3ZtF4d zl!x1|C?-a|l&e%jZc@kiR?K0x#+^z8519{sDIFamq*$TptUDsv|FY0)9Z=uu~jq_ql;#|UO~L_g4x<*ySrp&@HrzP00aKcq@V z`uQ5Cf#>Q>l%@83K@I>j&L0BPGMWst_)q|jzN|iP)hzixHVOC8z^<(4oPV>Qx^lu! zx&g4uDH<`Cg~&}9x_^XP6{aT3!#TOWYPVwsY*7kI7V4>m-m#p?MrP>}uWm2KtQur!M93lI#?1S_oYX#&*N@~e zjkY%rGmw_iZcxf*mi zXQ8jRT^5p|+kO`&-0sZefw0T|`Qh~=^3uj1vU40NRQut*_2!};X4}7R!!pUX9c%w! zwy}plu>R#Y&+9G4oSG#4rAAlF8Lt2TAHiE*{1+Dfus>_X5y$hNxnlkIzkZQIyJNcq zYw*no_@9jdlOS+0q{GnTBxiDeODb1&VD;l)c6*l~D!L<+_>Te8pmEDDG?hx>9Xb_% z3#`!jSO5J;dYuUsG4dOY70*FCd!$aa{oj3X%mh8aOwupcgguTv(+EBcSD&IGvcOtt zzmG7I$DmT;^!=j#yN5;6E*|>{C^J- jVBqQP$=#W#ogU4KylXsr4)B}cL{FA-QC^YotysV|G)3u znfva%xtYl%*(cd&?{n5(>s#Nqc0%N3#nF%nkO2Sy+II;NMF0Rs1NxLigoU)s)l~01&|VE+VMx zs(Z5HVyCr`PUHL#@nvjwUd7q1ICb`R9#W%q>#n_Xb2`ucWZGMvw%}#^*yCMM&}G$n zs_N1{dPrL|<36a7P0M7)gz%LN%MXC)EAj3Z5u)#BOhn&)PO}UY0n56kxGaIqyP~N> z2Mh)VhF>1-9CxrBE*b6QAI=fR+vPI_EDHT!n@uvt&M*+*vWR5>zV9(n?QAGxUpwq_%0DzxS0Dw>Zuz*{> zj48}NJC+}J?1AeGw?C~u)&&cZT&=-d2!;8OiXioqw_eF_{24`BKE%PM9_ zbD?_v0kxbvu^4g+&;SVJASN1*;AxGdlOn>ts|NT6`J$u6YmmpRcAFvl#{~p(|EEt; zUM=gvXzoO@n_oknn(OXe>RvSe8A8R%X3;xAmFZRpgt%B{85VkrJN}LGEA)f_RAU$b z0Pg>zX_^xydSX0(pm6ReAjGrmU;|t}+0N-3c9RIP?jjg1R;?2{O8!Yk( zW#tG4W`6516@E_6`y9{bX-iG-v4{Wpx*$esQ1htk*L+V!>wV4bMdOKi-Rw1-g-#A5Q(qpW%QtgA)Mb-rK-SP`}wkm!S*Ca@)Sn>n%K~N3$x2SLjkw-GE#1( z9lNiUS5ZbA0vuI2^^sDKa9M{R|K=+)IXZx0eRa@H1o4Jqf8V$2p0#;W^HMmKs*^(q zNmnmy`5HRLjUd~LC5$b*BiKu0EzYOQ2Wu@4Q8n_oQ$cI@Cr1_Sw}Z_Ha_YcffGN_+ zo$cvb`&*nEhG#<)Ch$?l_VuLwwZP|gZ0+?}asO6O>oOZQR5+wG2;9^V2_GJTxc zV%u}ZTkzZF+DmZ8RBrwvPtW>7S9{aqqQibbz4v8J!fwNR$NDk8Cp+a|PDHR`w|E)p zB5_p}vT3io%dhOZQBC%`QU9Bmqq<5aY3V*quTzk38(59hQw5S2x)$@DMM}KL#c&u2` z5Od5?lW{-U!BEJ1VCR2WSnAX9vtv7TeTwt>q^@krj9)R9fI|3oD(*8YHj}GZv~~7; zEWbuR2zyqCvC>14@)W_?lE@J2{dPpE*I^|uMM;37@zeI0KXVD0nj)Ot=Vl5&1P%gM zSpvR~Hi|y6Bp!l|UcBSbuzQ$qe%p)id3ng9fO9AvG)Fp!Sbg>}HMUWvsP}r^$zv)- zyD6`aUwd4CF-jY~85oJ)NvQ@4pdl8b-i&lm}JoJNBrQ&5@x1`w*=lNYaPr9zHU2 z`nHv&enw{`;EK8+Nbbv-R~C+vp6ix8Brlbv{r+mMY@s@g{rdKa#?}Qn5{2}oDK4{o z7SAKX)6)i^(&oA+Zrv4r1A1KbzF}P09b~MPI!*9-A#|X1+bnw#)+V$(m)P^Us)e*Sga{h(Tu2nZ{La_Ycy!=r#5Fb{_MF+H!Qw~{XgVAz=Fb4dGV zcCplBc^sN8>NOCjO{>pw7 zx5w-HGEP?}QjhwUz<8{Oi)^~o{)+c@w`Sdgyh(K!E#QB|@i3S$w^da(=kw~KCXOfs zW9uDHGSG<+S9vtUi6ZgyM|AaUMn(Tfn9dBBC7u-;C(B+0$?Nr1MgBp_OuV#f^VMWX z00RF>daf}LW}OXDymx@R1~3syE6&I3dOwd})#lC3H_3vuge6u=TCp*7FrZ z&&%~uQ?9}Ov^_TTT8G#D{2c$imw`QOgy#H9j;Gtn!miP2cxWHr)XWNsX2tYoOw@!l*{fpJ(B0+63kBf z_f7EncO?$EJm28Y#BHDBN}V_10O#YkvbdhlyLw1$KCYE!fDW&dI1ueleOkQniIy0^ zH@Hr%8UQ$VJspPipM(ZN0l21bD5kliICRj+h_*KhN{j&u;{wKg|Hbq~?i%01%gzUA zxF1i`0Ax@A#uNWL)&t%{`|%vdMQ?9)o+xwsV z2CA*t)xq;FPa@ZQCEW$fBrn_v$c4n##iMIO>Wfs`gO~%ZNvI>yP@4 zFN-R;b8j67t&;j==wwcnjh9Fe&2pBgQ@-KJ&7b(u*Cf|gev(zY9Tn27@Q?pQt#ua!f<+KnU(`$ zI^R-E$yjtZax}Fl+~E-~*7|e=wz1`P+gyhAx(-FrTS`qIIGrUtp%=#>RRtSh0Q17e zE@!nDcP5GsHYWHOBG~6AhH#{4Ytr^-|7JO#iXnRBZqM%2WL&9HdJ(g`l5gCPI5Q-y zElqSq_kUsE9Y68)pJzoC(CNv+* za-5Y@V0&nsinQEaRAPqD^Zn}s_$}Y+GMipOH<3_>MRdq*ukn?v)JT3X(&jd%!9OHF zRLNme^ise<>ZmAZuRyG~cL26shBt^}M5g|CT+_rU-{WNUf+hZ0+w`LS)_n*aibL#F zUy6vP0|;y7Ygwb`4bLN-hqTui9`-;EabLJjRl~Bw3m%5vu?)6kE@A6?xrOpXYDJ{I zaJ@v0?FsyAoQ-2AWEk+Sp4THRHIXJ`51Zz^~Urfz7 zeXKGo;GjeKsFO2g{5;$bsS`|K%#5oPr|z5M{bAjhczu)gZPqaw=D9uwmF&KSIDl(M_TX$KUXw(NG6qpI3sz{QT)?AI#%E$Tkl`o7#AY`OSZTg z={yj3D#J7;VNyQ4!#FA6PGQd>m@u_%j-MwC7#sgFBfYOqUvWw1M0FJOSK;0eKW3Sm znL)v3aZY38-Xa!W>guCcP7GZ&#Iwjb8SGa4B1W1QIW`*Re78n)e3VgX{j@8t`M$3= zJe7~aNi}?UYP5ugpM)gI`i!WOOB>}QZ@^2J7n~AXy_s{Sg`M$XiImXv@dL zQ2}ZuN9BPRr+@u6R{g%n0f+FdERu8Ul-tkD^RI;u)_kvdO!TDDXVRwJyX zY<~58N~)U-*a`l3pf)J3`&6Ex{Agwtd`#S!ErCyHI9M5QWzSSLXZ~Czok#F3S=!H> zT&?uDGf#+_gqaX^)qDq}PnM@<1^dI=fzdcyEQj+$XtsF>e7%#U+t7n^D@F1jgADH6 zXr}A;8WKVD&T6bEo9HrDd#Jac_BqxXi}dPMig(uQR;-=!mF63tL=KmTkv#k{kJETk z!uvMW@%V7$jB7Y+J(cCCv(2j>L^{lwgLA%=UPZ|rPAALn2z*Wn@0n^;BqNr|oMF(E zc5gP@%V@%u6RU}f@i2(+TG8YVR#f;(ILp&!S7(2r9xB*e6-Xt)l=8c`(n%mf%dPaM zYyb($h?4eH5pkROmkj3pTED@y556A%zzKDUw}o-KDsRed!=(m;TlI?=LP%MIlfXG| z(mKdSz{KOc<^^!9F{Xx#jpDKbCKWA8Y`rTu&C?R62C%g3(LrIz81lcYU1<;04+lt3 z(>|Tx{|W^y{RD3mW`8d)nS;A90f2POS`6l-;ZBM)mnT_VcuDX zKExRiE$)Ue7a%>a$>c9Z2KP@8VBHN$QT!L7FlL3jJ;enP0>yt~1M;&kW+e_O`?S;w zf2WCg$U!O-*+4epH)tz}9)qM6KV!4wVH8o)(J?o2JJ$0H@~J+Yd;oZ?IwZqeWHi>) z%au(iexLG8gNNj13r3J?waGAi%FspaQ_2&XZ9Vy&Uzx_gf0J8-Po3U$+T*Q>cj@6D zx3+;}zhKOR^?UWT$cK~ghhkBw@s64o15SI1k0e8awA>hX=YcZlc(EK^UVeC&Im)iX zK$AEn4M~JN(333Xw?~VgR)#Y+kBtkfe07pGCANeqP;Z77$KgSnoZu2ZXJ#OCY^!V< z;mB|<4}hJ-Fv zFxRYWD1Dldvu*#`A~s_Dg>f=_vNFTO%f>x(Tr1At!d$F2NyLaT#|!2S7E*ghRYMD8 zCw{1R#-y>TZdD5iBl-)Co!me{lxrzSwZ~*q-BX9UikI_SF-xfx)o^@zIa;%@B=uwx z?0dH$stKGcw?KK{SG!><0}ia@jBX_3LxEc6ZhbO;8q|w!x+{*_qXlgx;|!J?qKIpA;%bM ztW3^?eCnB7*G6p0NOjzrCLdSrvf1Gs=M|iF) zShvrpYBn?WUp!egt(NaI+tuqV8nhw0(rMIRMS)*j^nc!e?fM2M?=xnBOW8_I6r#(p zi~C)qgu9Z1n`%O9WoaqPZm_vL>&JMCThRBc6gIX4hb!h7rN7zAH6688eksX|cJ6g6 zr{-J~dX!1WaZ%`Wbz#h>hniqm8B5WZ0FKsy)P8JO=b28dvFa>BGAtsSAy`|ak;qH@ z5F+cA8XV?{)3LZvh2GBJvUJIm6D=eaOGi?o%f>v6KRnn+-%EgyA06`R&^+1Xvea>l z|7ao^>3*(B6dAH2q@_2PdgnN-|1G3}E6kUJLJ^#~hl42g8M&k8rp45+kA+WMB<`0m zx0Ei6c^)>GR*`BGY?X2cCo3PgPUDM%Yon%2VyegsEPl*3Qm-p^K5wKV10%zw2*Hdd zPfQ#m7V4~)5ouht_WPB_t?kYDX#O!(=Vf_U`dQSRlGZ7S+nMv3>k)cM!A z&56==kJURui9h##8j?{5f?@}+skPWnX-4UL+DBmd{RDsI+_)SjXz*1164lbx*@!fK zsFum`&CwBekjFLa%Byw)Cza`}v6Vao7z@rYNCF{aLGPKLQLCd!P3F`vP&GRb4l01+wm?uX^QAfB9Py_i%aGZ-T05-+_@)uiLf!S@})o<_%x;ocz(U~K&I z^0H>kKQItJVQ2>iz{8D=OqJvrYr8y0kMf~amk~Eq4f?HL%0Lxb?ESFDIyt^S?xrvR z{X75v+w8K)3ODw5qcvE$(}Ol&xP(AvCz&#$AXbOH=%bVR2S8@IM&wPRxTe`zyKTO( zVq6nC1#Y}htBzUyDVwD*AC;NRE&84918|NH7Om0dhj8(ygH2 zUql)#)@Q^`gX`tz2U7{j+${>9Qa<@Um000g69#ktvZv02#O>CHG$91JDqn8?ju%eK zppm&AS^qe2FVcsYFw`QuzdMSxXHhKz1ji10KF?I0*3p@bMyO(ZwZkiyzjwxm*ai*k zI*&eJnUEDY{23##;xBS==R)^tY-$X%wNX8y7uKPX`P-1p$|XfvtIIt-yYg~VVCJU1 zI8o;?;K>v-Xv}vpQhjc{RI&*MJ)1yIm>%~Dc4m2T$W!nDey`Cbpk+-4%dDf zSjoIom>>|HwXIE)mo7J|`nB@E@BD`onr1@5vgzsvF(nKw(xXo$TdLHgk93!*5;hej zhA-Ch>==5>e8CAZnQ*L1m20Z2n~*8`B@X(qKQeC#)5`2VJex zMOyPU$&_57I6bOAybsnGR-s6zhTF5;i8HQe#&V|yW!M#c=?vu{(aylz)Y%!8y^&I( z;OMI*c>~73>0?*>M*V(&{*#IYpG6{&e5FaU@aw!W>}vjuPSx+JM zFXN-QI_8XDgc*6r_o)kRVzdD!g2T2nBQm37STw!8IC0@{u9Kfp2)biN{D1awgcnd# z!0>qE%edDXlE|e3y zn^vdYc4%CbKgv^7Xa$a!9`r;*$WeVR|8wD?H|HQTY!oMd3lm-3k2-)bc}9hzxboMx zOBsw}*D`nJs9J%nGO)WOQbi)2XdjF{nM1mS@;kP!Sjh6v9|v@Pk^;7#~W913J`h1pdpEBH`Eh zpc55ItI1@8x&82|JyUR+9wjm`FmPr@g=$_)Upwc$!WalKP>3xBjB-ro+`MvhGpnm# zSupbrYWvN2|0e}*ISJkvx;6+VU1~CwlhxeSpwyx{kBcdc0{jcKdE#yik7tvkAKkk8)aN`?lD|(lz77i0M-VU7THmM=w z0hak53Y7CfNg)bJOP^3dqOW$%G({vttVQ?j5bnha!`%mE3@W>P~ zoN&TehLV<7x|4>>&`fxeNkF(uS!2kk#>)8Mqeqiga(Pu8p?OuFkiCKB`R;yyQUrzr zwoQVn~AmUn4RS)SF;4~Pg~y4`k~a+>&{4oq##=%;7@ z^fp%Bux4iyO8FBV0DxrmZj6}E9XB`aG5#am%tR#!`8M$O2aMa{^TUrGaxY6wg~3M~ zXVxk=@{}%CCfC({#&Y{Tchg-hSyo2+XuhXfBf51whEX=XR#~Eq6Vjw9bF?aK=f+&^ z?gh6Zl?I^I%Oh&KKCf2nel&(6aS&)-A(;gZ05{a9(lXXS&#!eodqH`!DGil>v)vmp@H zGF7?{h{%E5jK48%)7?$~&d(>RgJusLX)$l##|*GAF)^{SLfYDNp}!hOmR9A7!4VM5 zR4fW7=6*k?3VwGp3=8Y`0rkB@qqb>IG}AG#eY6 zAgdBKe<)NViEwFN2@!#94Le3NH(S4YC`<^4EuX!1%)$}SaokQS72qKe|1v&3{Z3;X z@iWRPd^Mmt^M?TLGKw*bvEY^~fkvbR_11-^my25}NP<#n!J0a%kk_GBZ>5~SA$Zu| zm4JAsKxqc47SjxSb?6# z=hsN-gBlFGTUF*fQNy`Y7skMhKDJY9hKNJ+R zfZy}#Mh$PNS1~YKhVk(-ZEei{I#2O8%e2?V zqWW`?lTRg?4ohm|)ZXH96iabQyto{iY<#F35M}%{c?2)i!bki{16Gc6+Qn11DV(If zedifbD-?L;rL%GmO_5UuahI*0r|=eq7B15YoZC>UGqZRmK)-si%-Q>Iy{{nh#T+gd zm7Kb_RtFhr&A_bnMXvk_oqWxu;DYlEp9lA``{n6-+N6Pqyvb&Ml+6We$y$z;Mef~@ zoy#QSI(gj5Cs}k^-bRo_?xaD5No7r3OR130eA^KX^*eQ3$NJP%t-nEGM7CB3Wc~8( znaaRnCss72+(O;vE1iFrh9(hyzm@6O1;zYhhL7{$$KNcZFD+<&Nnrl#%fC5_mm*Vf zn2rg4C<(p&(SC$xHdygvNqXkgpq8%C-DgsA!m? zp7fC9OTr)|iDVegOt3{;y4K5KTbf(8M8T4sn3?Oe|H4WecVqkFs_wJocIW!cP}x*8 z^Wmp=?BS%mrOwpV15ddO#)86b{?LVL;*V~mb%hh&solS)L%k4YC6lvd)V3$eCyxrNuiKquP42K2LGLeLZnI#P2Ph9TrdI6l|^q1tCWZLq7S4Q5(L9EuG^K# zqq@TjhoBl`l0X=wnIGZbVpNjIucFaXkff^O1;&lyR?jPy|FiH0Jzo-*Aa_zo@UYoL zcq*ge)B?-x1gih*=7J-ZmY*xL9&Pso=JLybZkgAqor^~;s4xd%%%27ZYEb{vu@ySt zy0)$=BRf6b{qp3C@D~8#;volWPE7@>3MgMlt9}mga^vwnS!C_^7n2_Yb!^z-hW4D@ z<%rA^l1KG#Zjy)g2yqLS9UKVJbr>^Ga6ujQ`GY4(#NP2jO(c9+X1azz&P0BGKB5O= zlJqI`adILW2kl-($1goS-3$U-Q&U4vPrompcS{h^T9U5en^}HLqEuQa!-F#B32(_r zKYs+3{h@FQ`Tw7oYx1}9(~!Sm6(UqP-den-u|=+vr%D<6Cm1)dJr@~Z4*CmasYBED z%pc%;#T-MLLI24qPQA$QVsI0#;B48;q@Vn#{KfF=Rhiy@^>;qOxGjTd^WnVq80%_R z_DNHn@3A1WXUOx@p;*=puTA|XF$Y3lPBrw_hma4XnLVt!`K7&e7;t{83SA89{|5Ma zES^(|1NYFQ`bPZ!Sd~4f%W>eVRbSwhqhSx36evglVKQ*xBAZOEcAg zk6U@7x{7;Xo@E#!TyBR0<4eqz9v^LQF`8h>p1Zdxs|sAAL^6`o&CXeN>1U*8{4lk?j0Vr8r}~HxZ-1 z8t(~-KeD9wO-LtgtW(R?GXgojU1^u;^rYvWzwlM`SV|eFp~3-{#i2yTiS|)5R{#*H zzRt(loHQ)Lvp@ z{OHZ;SSH)W0@P`QwxTx^Ri|#Z%=mH?Xm=Tnbsc%*ra#-Ng}<%@s7ab>B$qV=xTJ|q zG6hmhkJxiEvvUS^jc5jZ#l`?&WTk6FVl0e$y6*3;%d45q6;mbJ+g`gk4P%+3`&1|1 zX7D^h7__U+cZ1^_Ezw`ZvvgMAo`4c5`2Ixhq>h8QWB%i|eu!cWenpx!&Z z;~Z5rBq&*M+V4*;c;LMaqD_$EOBm7r+B4a6=*V^Wt=u;EYQE9enAz`Dtv^qRvvlsX zHnHwye!!<+R-=rP-mBF09ozX+z&w3G5d&3mZftz0r0O0Y}dhy4)Z0JKA3&6?+03veJ_x@)-r8EW-2*yv^6XwIv z0|M4Jpd|?nI5Sp$e8NImkwRHeC$wk@10WGt`6qQGN}Dnyl<4m5Ehy4r9~~V*SmB_( zLt$KSm*CrMe#VzF)#j=yg_M8iI^%v)r>Ag&y zBd=4~X*p~c(ERpaix}?pZ7Suzqn;iF8sk%5{-tGM&99FCee@k%x_J{b&*c zv~WL*bgA$~A3@-$0KHtl| z;bYT!R7}^MiKz_0mg>p7pC5tNF7STBn%KrJ-mVmq?0Ehq_7S9&zZEM2uZ2OqEOM;o z|N5>NT|?dqUccUt-VIv6I^Li!wTe^?U}2b#b}2T4vY3I=Tpnwo<#f|`c$edgQaYw zp|ui!%)HJYuX&v-7YoIcercDKoT}IN2`)Bn_0^$q@X$GU{LG!KH=>G@%rjWls2hPy z&oMRAj(M43=l#*m|E)sOru^*emPa}mtH_ldU8Zv8l`veyR&b%THLGv0BxG}D&CKB$ zCsrx`pYu75z$Rq1yY*J*<6DwiTUlVzO7q|@B+=Shh&!Qdo!NjP=$lNZ|Dzznclyd(nM~63UWlr2{;A}VrquCCQgT|-D_j&l#^p_h_ws7 z^Kxv8(L7ImoWIu|!i?btvI zXj3Zd!yFZn91z+Yr@e1P?#{=%UH4RZaxx)zm=A94o~ZmuBe<6jM342(K9w~8Z3wkW zYg0e9bd1;SF6|emnZ}cT1#^|BCg*+uAGL&sB&qYT&G0t13^&Oh8_GrhLRBG8nmwnH z(>_u@nmu0f8#F|w*mAI1t(`kTZoVndj6lfwfmIHM<)8e<7W=EOLi^2dU^iFyEG|iC z!nfW%5t>VQ@-5xpAe|fzhN0w4s5|B!?Jkcm@AoT`li0jI77xUrHwMh`oO7k>)|5lS zzH3^aWucJkg7?%((|p_KL#7VU%sIPO@IYA&Kd0FwF!x%jqZWz=UpjOh>ggMqpexp% z3@@0v>af$iuz3;^i=z(hom;m;#prcS2*vIq3xB^_#M68RMAMWht5vsy1Zm zZjwx~SRiq?MU)bgHl&u;dCM`>fos>=JRJr=dG!%WXPKJ=8#E_J0Af`iBSwbbm z9y@;+v`l;Mb9ntGQ+!eKM2$i3S~pC97dev#Xb4>ai4CFR^Kjb z_198Ro>p_t+Ah&=___P9q4*u%80J45F*JUi!u=QfS?GiNoL+ZU25(JfJJkmEBt0pK z6H{(nX{c$DTDltze<1yb{HK&g{Dr9FBzWdKgfSRnesQFw%X37J?8Q{6XQgK;|Dnl# zKv37`OOvL~nEvRg3WeXah^u*TwtGGNO~8k}waO}9BCD(u?#lD_)X3IFiX|6cO{)hl zr&mqn=Lx}CpC`_zs!c%kdODQzp!Bz42o?N1T-}{ae*(;?C|Z%%3+$eRRWPe9J#fr2 z|0PcT&U>Fm2I(z+#q9`B5~DmemuXM?;wjiquD#PkNbY#lX^K1MF_X|+7{nP1?ACgbbdJ>cd{>`!-K z7{8lGRy<~eJe1lw7%&xN+n^dAwO~&TF(xOFYPcz}CQzgLSc1xSyes4^^F?Dfl-J;R z>&UU22J^g!nVzjlgUL*JNQAD~u}E7Ykczx*Qor?uI7(!`hJ0IUCjYsNIwg5#aoXVa zennRth_mrwm!i?0fkYkid?vq4%VFo|_TTXIDtaICgm4K_*evC^7FKCZrjP8lhVAZu z9#YxNK4Uq97umM4vb-G#Ti0?x=ea`<#_H6#h*X2`+}9NigbOw=ex`qz#YAjk3ls`5 zk0SqYKsU6+eV7bC?PXhSc5}h#F7l+Cx^_qKAQ$ml^S+!f>S?_2nK4D0S9*)or?a)` z`1qrBM#k*(1Wa#1E&X%x(PiubL0^px(o4A){1L};<2(YCmbr5@!{zCOsFZ~9C&H&N zqpKMf%ES(N2N*Z_%vv&yNrx@@E8s*_Q7Wc{C3C{A>|ISDy(^n2#jaE*5BpA)Xog4> ze&PtM7Rf7ee5AT;QP#r0M>P>-F|XIMxVIS4JYgR)Xm&Ssq$ZM6OmZ02m#7p#>LVv2 z5G3g=T|)~eFrSSdk1XY{I=tYlJ1X8=DysZS+x@e@sM?IJkYd)Bs+g0pf4^(EXXG*a7tmemS`kVFR zrgmTI`3Ss?t!2HuRKmzk*Qx3Mk=x0Z-0_#5kh~tV!r1 z36{*Gj9A7w(r;(^lR1uc>)XWs zP+SnmAbz*vk8C6g=bnV8@(&9URKL+oI7XpKp{2!pnyRt6I^b1Q1W z>3K;JcAh!QHwjI#jCGQ2ADSz+OrE@%+Rx_hefTX?DL&o41ljGulD7PFFKHU`YeqjC zY>f;pdr!l#ksp+SVb0%9vEtz`smi6TcD|kmov8B>ntj0g^PbqRHnM-0Ld%L0i(3n5 z9AhwfU+AhLn=S7@pv{+15*D2v8rdrbTJ^R5;r>0hj3v$i1_hiR4rG~4rTe5!9ixqY z^i0H*`ZwrH%L|%gLD1OtmrJCxXH>H20V+?z8WGd#>cO6$E~bWT=_9~}d;IiKkltte z?FY|zDT;melVg+1*;`ypImCSXBHuXKopQ;AToaA{8a_$#3JVjFrVnM=v3xQc#Xt;* z%Rk!zJfXC_Z2!64&UQ#NeROIM$+vG=Ece_%KC{(gf3JSzGh?AX-Jp9U|Gb&J@55D~ z&5VE%W}#<``$jr9b67SGWxnR!esbeI>BIl?kN1sTCo=Sy{1Lb0<;r_?pOle5TCxn_ zh>7!@I)Ebkv5{p=Iv>vo36P>B@|ieJ<$;IH3V65;LzCv@%_fl_C5+khu)eDx@Qhhe z5dlNHOypUD78Qi~n&>rp#mHm&U0=t_RuuYz zev6PXd{t-jX>k9jS+3Aa0s6Xc>@Q%(ew3(Wj1?oMp{al;8Hn?RCYjMTryM3qI7i*0KvTEK`)Qjp5Cv7Q(+&JU z4bU{mjucAi!Bzv75sU=`pe&m5kv=0P;ydm>#`~*}L-RkLmZn$KR&$>xf>A%UuiG5P z!z0E?#z|1xSJr2`cvBGq_qri*^NG}`sKf%mwJ8&iMVQYdG9uW{Z5g$hv;-3N|M z9VGs`;{uuP;AR3B79*7WdZFfu`2Y)XTAdf{qC*=kdn0H92B>WA_KD17wu+W;DI7t(IH9^KC&9ZV+zh0b#MRH~j>_Hn4-7Mnatcpu-FjR*6 zjB+ar&FdrJtM$jQ`~CO)wHYdAoC*8=d6hn+9154qA6{Eg=L}Tl#|)`jm7(d&nffhb zs&Q>X9#ys5aGJfQh~ZZpBeY!9{6MarCCG7_5a6*zqv!S!ML~sAh^mTanT+9<3fa-_f_8*5wa(ui_VKPKM8wHGd zt=9L=`x;v}dTj zW~6m=^qeT&2Ax)uNRXn8n2-d=x&3mzd^8*db*iO6``-;ygbOdGM> z!)$tcrD4>zv3N6nlPVb1c3sF`-S#H(Ua1; zOgZI$v)_sOif%|=)S8wLR5*4r!5YJGz0Q?IAyl;7?$SWFtD38SOOg(t@8joj_x3J5 zA@zCVv$4Jph+rg4y{(e!8-3Zheme7M_&jN2qq$H+%y{Y(TH9~JtWjdP+h^uUrKB+G2v_YzcH^L^*HbHC3m zSf@}z_*H9J1VOF$(G>|^92<~(_M3+Irx3$5!kqIb%torz!$rsE)rk4$2s6{&O!j&EKiA5WGYA* zhe72a?`(lYZJ+df#ng)r&``{C014XKnL2FAmaD5KBHNIAyGvEg-crwAk zBgcvXHPt)?*6-O+a%cPD7k4xJIY0k|g_q2U70kLq?h=}MfR=hvs?p{-h|l2eW7-mENF97geR92*1NZ Date: Thu, 29 Jun 2017 16:14:47 -0700 Subject: [PATCH 2/8] metadata fixes --- education/windows/get-minecraft-device-promotion.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 45297b24cc..22b18f07d9 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -1,6 +1,6 @@ --- -title: Get Minecraft: Education Edition with your Windows 10 device promotion -description: Windows 10 device promotion for Minecraft: Education Edition licenses. +title: Get Minecraft Education Edition with your Windows 10 device promotion +description: Windows 10 device promotion for Minecraft Education Edition licenses. keywords: school, Minecraft, education edition ms.prod: W10 ms.mktglfcycl: plan From fc5e335bec26d509e7ef54f8c42f5caa9d24b338 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Thu, 29 Jun 2017 16:35:44 -0700 Subject: [PATCH 3/8] metadata fixes --- education/windows/get-minecraft-device-promotion.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 22b18f07d9..7c05787325 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -1,6 +1,6 @@ --- title: Get Minecraft Education Edition with your Windows 10 device promotion -description: Windows 10 device promotion for Minecraft Education Edition licenses. +description: Windows 10 device promotion for Minecraft Education Edition licenses keywords: school, Minecraft, education edition ms.prod: W10 ms.mktglfcycl: plan @@ -8,7 +8,7 @@ ms.sitesec: library localizationpriority: high author: trudyha ms.author: trudyha -date: 06/29/2017 +ms.date: 06/29/2017 --- # Get Minecraft: Education Edition with your Windows 10 device promotion From 198a1622d8bd6ae3446327a5aecf20dc6191abac Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 30 Jun 2017 12:50:18 -0700 Subject: [PATCH 4/8] input from review --- .../windows/get-minecraft-device-promotion.md | 44 +++++++++++------- .../images/msfe-device-promo-success.png | Bin 0 -> 36335 bytes 2 files changed, 27 insertions(+), 17 deletions(-) create mode 100644 education/windows/images/msfe-device-promo-success.png diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index 7c05787325..b50cdc323f 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -11,7 +11,7 @@ ms.author: trudyha ms.date: 06/29/2017 --- -# Get Minecraft: Education Edition with your Windows 10 device promotion +# Get Minecraft: Education Edition with Windows 10 device promotion **Applies to:** @@ -21,10 +21,10 @@ For qualifying customers, receive a one-year, single-user subscription for Minec ## Requirements - Qualified Educational Users in K-12 education institutions -- Windows 10 device purchased after May 2, 2017 -- Redeem Minecraft: Education Edition licenses starting July 1, 2017 +- Windows 10 devices purchased from May 2, 2017 - January 31, 2018 +- Redeem Minecraft: Education Edition licenses from July 1, 2017 - March 17, 2018 - Microsoft Store for Education admin must submit request for Minecraft: Education Edition licenses -- Proof of device purchase is required +- Proof of device purchase is required (invoice required) Full details available at [Minecraft: Education Edition promotion](https://info.microsoft.com/Minecraft-Education-Edition-Signup.html). @@ -34,29 +34,39 @@ Redeeming your licenses takes just a few steps: - Submit a device purchase statement - Provide proof of your device purchase -After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to **Apps & software** in **Microsoft Store for Education**. +After that, we’ll add the appropriate number of Minecraft: Education Edition licenses to your product inventory in **Microsoft Store for Education** as **Minecraft: Education Edition [subscription]**. **To redeem Minecraft: Education Edition licenses** 1. Visit [Minecraft: Education Edition and Windows 10 device promotion](https://educationstore.microsoft.com/store/mee-device-promo?setflight=wsfb_devicepromo) in **Microsoft Store for Education**. ![Minecraft: Education Edition page in Microsoft Store for Education. ](images/get-mcee-promo.png) -2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up. -3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. +2. Sign in to **Microsoft Store for Education** using a school account. If you don’t have one, we’ll help you set one up.
+-or- + + If you're already signed in to Microsoft Store for Education, the device special offer is available on **Benefits**.
+ Click **Manage**, **Benefits**, and then click **Minecraft: Education Edition Device Promotion**. + +3. **On Minecraft Windows 10 device special offer**, click **Submit a device purchase**. ![Windows 10 device special offer page for Minecraft: Education Edition. Submit a device purchase is highlighted to show customers how to submit info about the devices you purchased. ](images/mcee-benefits.png) - + 4. Provide info for **Proof of Purchase**. Be sure to include a .pdf or .jpg of your invoice, and then click **Next**. + > [!NOTE] + > Your one-year subscription starts when you submit your proof-of-purchase info. Be sure to submit your request when you'll be using licenses in the classroom. + ![Proof of purchase page with Invoice area highlighted.](images/proof-of-purchase.png) -5. Accept the **Promotion Terms of use**, and then click **Submit**. - - On **Minecraft Windows 10 device special offer** you can manage Minecraft: Education Edition -after your device quantity is added to this page. - - -[Learn how teachers can get and distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) - -[Learn how IT administrators can get and distribute **Minecraft: Education Edition**](school-get-minecraft.md), and how to manage permissions for Minecraft. +5. Accept the **Promotion Terms of use**, and then click **Submit**.
+ + Success look like this! + + ![Proof of purchase page with Invoice area highlighted.](images/msfe-device-promo-success.png) + +6. Choose a group of subscription, click **Actions**, and then click **Manage** to distribute licenses. +## Distribute Minecraft: Education Edition licenses +Teachers or admins can distribute the licenses: +- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) +- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md) \ No newline at end of file diff --git a/education/windows/images/msfe-device-promo-success.png b/education/windows/images/msfe-device-promo-success.png new file mode 100644 index 0000000000000000000000000000000000000000..590a488c11e988b1e48867561c46e95d4b1ac812 GIT binary patch literal 36335 zcmYg%XIN89)Gi=JMTm-sNV6P3x}wq{pdu($>0Rm4LJutoMMOYAL3$VIReDPTDj>br zKtc;h4TKUxNOE(|_uc#4A4&Fp_TIDCtTnUdeb>B+*4NcwyLj^=9UUFp3(aS*>F5{? zXvgI9476{qGKcfDA9|nH8c*n|hIlt|KgdNVSx2cHcKeyV@l6{dyy02@NlS&lpBdw>xj8`=NRgweB@T5nRF+d zQ)FyQrm-e&2aZ^Pkb-b<0yAW&YGW2fss5~RsaD#FPYdC4*t;^>b@ee&W3R5Y^O~^qe-2@DI7mOqhg1p1V z7ZbH4>CHMYmM4$sG?;2v8JxNtQmy=V8m8A6ihCYUTOJex$s$~GY^s8mF!B+SO2+vt z*=79$0xsv_)oxw>GtBP1OFdf$uG4PUkzMe8ev!U@sTxM!;ue{mG_fJ4BF_Z5PL8}1 z+sPjz`dDaI0u@#5LYER*v-nk$B#~!$%f&}@ec*#Z+1xL9E5Au2S#*G%q~~p~E>08e zEV=zo76HqeH=WzFb!x)5nwA)K6PpCQ^#ASEsuPPSX5-u=(C9byt?6o;CXbzr$F5VA z7D$)LvPf1g=rDtdHA>}5g1P9;hSy3i>6iDVIO5DD6&g831sEB^&bC#tiaNXP2fBHI zHc%o~Sj@PBw7kWKYN|AA@IK1WLlW0AQ)yRzUz8Vh%l+th{jZ6?xzp~Xq)WY0QZW$( z$C4FRN{p6YxqdJ~^jDo7z@=durezzDx^@TAGdWFhKUO9v zpLEPyfLd?!`0NZ)LzaKEz)m}Pg?%;zD383BSGTH8o=RS#c?o$Hs!62yt{`&)_oIO} z`{WItVq=7&kaqf`x0@?c?SX_<3-4DNC%3UY%11fFvToLJ-%(%{Qi03wJ*y6pLLnfl zt>LE!!$2E^TQ3(6IA(Iq`O(iihgDV$w%E-{)ieH}zxkH0-xu^X8J<`ca0;@v>%Ws9 zxENyQ+E+j-yBGgTOufJuP!M8b2_FAY*@i#x2a)}M9ik{Iu0!=a)dTJ~Q~Il0E1T>0 zcbwMNe-&eJO-Z{^f(lFqzBoMm$G5+a~f(g3w-qT9=dTk0aHh>TNr|zeYNnm$^6MiKBDa0!EQP+YDLI9 z=QXj4I?bE^x~HT5!L=0hCVbi|C3e_bO#~yDYKfmP(1VbVrprw#&D#UKo&r4XX;dh{ zrZr+y>C`P7-MHn}EI-)wHN94XRYzzBhiOaCC8 zpVJBw-_vUY-L{dOL2Lu3t)bXo!|k=+*ccYac*+j0DhIhp1Ym-EwlSbADCUfSCSoQO zDe0BR#Dwa+#1_3_9>O{g^>~e>l>*sAB5i_a*?A@xs4Q?f-Ru*Pd18_ zb&P`bN`)TJI+Yt&TAuEYv7rDp zzeVe2#n(QA-6$@-V-C3$mPcJ&HUnAm5C8Q$8 z--wY?vGM!m_s2fdwHkS_HH?4<_GQHsJ^kZ%@=F5C*=AB{igZ2l{;vOC3vH2=+vGBP zqDUbocmbM>C(f7*Pj|pOm>h|;!(2eOR+|WsBgtXkj=V=@-VqI z9QAa+2eUvPvM{0U)@EBAO9Z(ab>>*z>U^BU-&cN*xLH1|0u7ieLB;_`%wat?!`t-I z|0Z{(tS3ZCB-Dw6`H!{q7dl6s{V6?3#r=k(q-0zoCZsuk=G`PM^`b!SbvJZu3xYF* zs0Xd{Qv%Q-*-bo;EZ0P3aG;uG058{9yj37JSpaf4I@gdZY0+3#%HjGby;=LElZJ3) z@5A&@WWL9_6{ZLe^685tA*?j70iy6HSBATx)!!~rt>XKKe%YllT+VrlS295~M^B^o zxZb=|A z+esD{Xr?A0)lM(Vo?*k<;exW%0|5-@WR(r#?}`y-`{Zn8n%d+-?bD0j{+kF$O>Nvp z5l_Mc4T={0@=DhF9YED6^Le8N_wI<{Nm)J$h9nlm{DUB2+I;Y)i%abKg8a@xILTM0$H3}z&5j3G<3&AS$?GPBXqhqQX8E^p9v+`Q5L*QmZQs*DMJ55#hyP5q# z`)&hBByuwwCwiv@jzXy-Bdg=ORZRjawCO$h*Qyxq_hTKN*D;G;uM5MrDm+p39F8JZRO;sypBbD0ZI4KN3%kP3=tzHx|!0KGpU|}kdG7kfq z{cu}a7_WnT?U!sLB1rtF zP3D0IjYzbD!+uOM4Y_p}95`AlY$hZqQ@eWvBm=Q6>r&KTAnF5;wU|j)>)_*k6b1AX zh6!3<0Aq5%xKCnLExU!X7zm!ig3I;8#FUJE#+I9*}tPvZAKJ$8ye>qG{Qg0mOrcxd{oP7_*Wspf6 zJ(4heA{2%-kb<`??(VlNdRglCvCtjQXC#Xez8e0Pb^$YpzzjBqgmZ$J&)Z8LJ-}MT ze#DdrK3Rnz3eyS14vfPdMCCjq15uE88%w&PTN(oV2@u5qeDXyE^c$F1`K!uy^a@}9 zxcjVNlu`OtmiQ1RXt1GYdg;|$o+&kK1Z|k)@|A=X_X=H}*_nwq@4 z#l_Bu4k|X)MvoVkI2-i;!$y7L&_@f876-~1Q3`%IR$h%brLFinIZ8xBF{_H?>?)Er zkyJhSKiF`cQ50iFw~eHQZac~ZY+fvH)nrXYu?=Oe!67j{r8MxtAP=OAlOOln4iyUX z2huQZ=#zQhah)C=I_?~?>UR7G9`D?wv!nfC4K&cb>F-pJ%FW>QbJWuwAmzfpXgfDj zakts-@b73#$HoK4fi#pyn*^;D5BSm454#@9mJPKpQZE7pLh^0@3xPiyAh=gN6d|&Z z`O0x2y)+fO(@QiX!p_9C`#;mruv3P^>EXsL<&#X-TxO@%Sl0Jhcpch%E}yrzr%MLV z0RD4@Bw@WF;&bNzx@iCXp)2G4;NxxXhmQ8cT>nAZPtHX;naqZ_Nxye(9X2OQA36;& zo~AZ<u=K%g$m>ewe97RgI;CYO~|aKA6y!aova>rJdgKb(ND=oTMlg=vf29^P6P~QJPu}X zcJ9%m%TRPYOxstz(32pb9Q4R}>LJ_TclQIOKhxhTND}%a@X%lU@~)R%PxwRbhs+}G zn-lNyR!8lgpG)Qg*!DyS@x73_?))e1hw8FgKl`z~S13wR7d|@xzqW;t`nB0s=xRCLV-pCeQRJ)A7h#O92qcxBvr}hm5|m{0;mf<&oNNc z4)_yu&;6i7z9tNmMZf$9%|^h8a7}^*2+p=){fQ^mEyLG5n4XlTV7K;*RUr8A3z2|^ z5b8yeaLp_6KNdH&a~R_Ty9d%2KhQ;guH#j_{+%V8USA@;j;=VVl=@=v#%B&jsOMX? z!3eDjL6>eZ7%FRCD!bbzMdO6!E6=d~X&MH_*w$9=>_6nBeS2!S zBM4;EgRfz z?|B)Za?)`v&&go->`kvzt~eBW_PZ1?kR6+LmLxRPe1KlJ4)Hq9Qe0O#*@F`X(q*=) zNVqm0&4H%}0y)7LWsWaTGZdYU2UrAxPS9{ z1rWwTryRk;4?Wz9vr%b$Bl-C-czvjiiVhC_d@euBXBy5bV0PbbZekX^pa|N9tFo@o z``}`w;Beaw3!k-tkiVTw;NdJ4=<;`3AMX3~P00J~2JcZw#o4JAHyFaQ!0`qu&)Rk~ z6>+1H3G+VF+ZC2!H%3lx=e$U&eWBV$djTQBBS?3+h+*aJloc35qD3WqNct}|qKNKy zgoI|5b~vrY3>D7v|41h?O+^PaRjiI|>8W_4Dw`Ild*fZ4 z4g!+IRn(wjqsMHsJL>qc00Qnjc^bjuKb$VTF@@R<*!q<~5cq>>wZl#AV5$Oe3ti%E0if~mof-r8z} zb)5&XwJSHIc6G8zDl8g;Ht>_V;zSn$ zdPfo9hCz6Z*B17tiWBVzPyPB+;SabEr9ZUgb$sHLUFx)MfAD5;TV8)v7tjF091nJ% z(-vLoC{lJ-N*>C0J3WLqWP%UmzE)z~%Uri?$2PhO)mdETo;~S3evC_KAy2&}NP7(Y zjRb`>gAUd-aOngJi>t~)ogJYuJGa`Z>7+n?OT`L~Tcil{BXEtQc4*UjIcf)5`1%lH zCqB5*ZI(Lt!LJ`^eYy-o&mo-FH@gJ3=YNo6ha0yS2-q9`^gAQA94 zjHI^rg$O_gW5@^Vz_Y(AddQRcI#zzDr)Z5q(J++K#l;_d_G3L423`6Epyv$vyTruG zHIU1EihJlN5wQBD1uzi26v-vfPDPLe0`^8DS$A93bC?oT6bKX&e-?6aRD+*cdD}+} zx*{A3Jv*?eHh;Wvj3oQa*ZXbBBIR(1QM;a;p3xy;YMb*k`W(rBCuk!Xe7rWDn!L-f zHjJ1_64x24=1Z?rE4>*M3@ZCC2szs8CX?+kjNV06-I5x<~Bjw z*XjoQfi_5gtc4hQmb8<94uwdQhAyARb&NS+$WCf* z1qf~!Z_qZHL^4{P9ZC6yF@kA$D4%+UnjF2zjFiG1rcb z*4WK_2396-`{*en z_QHq>O4OeRdMcC|2e-Ff4^9N zN)$@Sy-zHKAsg(8F`PIls~`3oNqX&jl&F4;S!2MCQ#mG>Jh{_G;GIG2tbnPqcB0bL zLa7^3+=|ej{WwYT30WN{ZdQ8|(Ub!{!iWK__R+xt;dl&mVWQ_Ru66&sy7}2A)o?V<07TCCM5s~qZ+v$r^n?9DgoGRf-&?A-PZBO=74BY4I~Y0RU=6h zVO+Ik!)Ajl+H8NeZ`uY5?JC2))H>jT9ilBj;z27%sRF^rE!8U2kaNVsk9={7#&*H>GW$bzd3c#B(n)Z zny~W$@j!;dAW@C(=H#JZkR)|=yc#)I<2V{6fIK>#Cta7cLi+di2@V5~Pk3Tg%v+p$ z`w9h=s1steB2l3{scH-2o}(3m!N$5J4sJPj%()KK`wM{ zRyZeMd9;VW1w6FPA^^2VE8VhSrEyH$(**H$@bSPtN3nQ-{p}MFdcK7)l+EI;O#Gb$ zn1|sedT9g`>C^eMhdVlpp73pMq5BUNf zm96w(9)mhld1Tuu_&OR)#kUj-K5KEn%1!dU-^0oU~V?~W@J zdvvnueTjXtIe{VbGXoO|ZXX0#cu}h&<3)PsL<6U-z=Q1vL$h^`IyZp+XTM+QsgRa6 zX!+?hc6c!B)2A1DnO^HwJ{?AFK5L&!?Rq|?%dDWM(E)^&gzI6hkDzA(o{5VcLb{Bt zpT3@B-x)IVaU7&UoU`w3pIi7jgwH*N9B1d%c6cp7h8M<*b#v~sr>{x};=j|t?Qn*& zQ}>}rQn7BPjKir|wUpIaCsnm?pF=40NoPw~Wk=R9^OYiPW(#4R90jN2?H6yRTOM*> zx1ZomzoH18f2Qw1i&2JL;LUp%(>*U<%w}8`zMbUQgAT;apW)5L8wrC>0*uDEf!Vqa z^h2)wM}PQl;ic}0j~}HmvituWFsmz$$fg(4%~F7z4x~R+wbDsH?I=qw&k3+U-f2pp z2TPXBZP&Sd_Srn-9)I|hO;VN({or=?{vA$&vN~vz z+d^)H#SMk5^3?0iu76#e8G_^Kg>*9HJa|Wnwh#ITY(|RiehXLX8))D0WY!D+OicZ= z`sA5wsIZuw=H+XQF;5!98Nv)h&p*50Ve|PG$Fnod#JfG8?9S+$KPtes~p;2x87WQORmkz(h40L&)CCu?9TJ2`i-5+Ms zW*x{Lb?jC9CVTQMvd4)D^|_E4gxH~3@(!IMD|8Bp`-TH9F`LWdN)CXswQa%|P$)I`lo*6GY;rLuR_hrMsc@gXi zf1&d_*>c!#{szK2XHMWLKnl_){Tk!&zfBZux$L?UexrQ%8eK{qLOvG_L{FkKAzm%_HH6&>p3Kt zSi+VXHy1ETXnexL=R2YX4r{yHmwMy1=vOv2HYI)>OS06>3&KgImW$K9dd3Kzur)H2 z1a#sJItlC35a!h7Y1oK)m010WB_ZxW^ zuKvmU`yk6d`B^dVOCh4^ClpWIhqE8148Jw*EScW9K)Dk=R_grdLjd$0v<&aw?B-28 zAjxBcHv%zVzygbg9zr2UglyS_xqv}0a7P@5M0&d0)09)H*i@)SGaTsx{;qbiduZ`t z<+TUVrzrdE%G-099=r`3o3AW9{s@wGnSVRTLco37>EfByJV#bj01Eo!rTp6(0k8Xf zmO37ULa_cpgVFz%sO<04e+4Y=2k7R9_{X-w@=*3Z`+);c>4!IT)?_ZRaX&hoI~Khd zrr(C6)5~*qE#+0UW3*Iz8|bI56X@<&sb9wVs>UIzuj{6d!(qk z2*P7Ht>6EQZB|{fGp+zZUV$lI-@+;|;hn^n3wuV3R&Vu71 zERx4IvNdIBmk`g1)>oPrY^X~^eNJ3cD*N1pd*nu^=k6y4MNVEjGqoCyU*``z$*^5z zU(Bbn9?-1p=_Vib&%BuILdcswBSlb)JqhSB6WkN0PEf)eulXr@obJTKEKe8MkPFZQ zHj;4YmhT2wmg3QafwrxrY!TvHJf^8uwMRuf$MG#LBxDsTm;{os3LZpXfXynd5m40Q zHohiW12&R0&}P&|p+vdMQUfvXHBgvLAJ2=m1xfL|w1mR*ihV;HbNCX6pN+Jm)I0SB zTM5k9ZcVv@$rxNCWv4nYNfNc63fyVkY0ZWq?fc`JR(0UE>o%&v-sD}>bNA*m8%{ms zY*j7*%^&FHc~0+gv(2Tr65^>_=pWNKK5{C=u6p)(8i~am zJuY~|8PuCbZnA83-G0a?05l-XV-=~;jWt)0RFKDH2cC-Z;h5=XBXv_eNQ1KcX=m#T zO%!ZLy+{=QNk3&&cBf^hEL?uLq5WayAsUFIAd$Pdp2Xu!YRy(-CP4c{!dVm6dg9)) z)(21GBEVFYkaw~-osJ^C1EKOm z#zc>s4f}YWV_>fub=5ZLVLdJ7vB zQbfcGrd0|YLk}INNdkVrhpjGCcIRw%^FX<+IGZGPy`1b@2YyPJhZ9 z8Hiks{rpmK4#)!Wor)Uv%&qK#9^;Cp5m@7PD<5hJ2nuvT4Pq3b|E@K^<$g<(`u*RI zcZVh9?3zyhtPX5n-e_oM>%X518=OD#-*N>^x7YGF?E|v~LMEsi!sq%iIE#kp_P}k5 z#q()|LB30F;NR%0)>QC9ELz~qP1*0DIISU8AyujiXF1xonS3mZ*)YXFUh0pGvayue z>uQ6SH$Ct-iYdz#7XV|2-f7)eTr&a6R1;wYE?~oVm68SppK4!&cA%k*!^GUHI#+98DCzW~XK5&&Hawdws365Ah?v(?dSnpK zP8&`x%J{GyHlAZ4fFms*6-}p(zmyq41lR6j1nwV96--+bb_A%_?QewZY!w4>iaXWt zDR=-7vf~36aK9`ARXaILtd@k-EFH;?x>7Y1YM78vkw8*#b}U*Abn@W`VTZ=hM#~AF z{al3hgXhC6S|hoz_ZSK;qX)DgyZd@%MUi-tAHm*wWrb!RiKLiT-RKS2dBZ8u10_6g zAzQz)LNvQsudwthHdSiE138mP%>_a_{GSKe1 z;L3Z6h6wb*D65VQKvU89Epp+-AgTGFOM?d!0(&zFmx%R05CwKrgjAASIA?~}lhMbd zIN706sGssuhr&QN7H)IxhszY8DzI?9E}<>8N);rY_Z4m(NYJp-vVIOZl$1oi&md@z zqqLk!Q^zpMQb*$*$4L&qVPq@{$<#)!?1mv@gO0_La2Um;>Y)Cug&dk+?(JQjv3%}u3uTa^i`USey>I($dil21DyrW{MAixnUSKtdaT+Y849|Rf=d(#wM!N7fGsDEP2qN+@R)>|CeT zA%7KY1J_p7ri4RR_hxqU-k_DCEE0?dkjhkas)9;j74e803$U);$belNxM|{zb1zI# z!kqoY5OjjSJB*rq`bMNp|0bV}2rMhE3bNlB(_+wfUA%%ioE1}?>jrUn-kXK_Nv}uC z?!D}R8AnYo901xC0U_R#XZwW!;KIoiOc4XA+1)^{VIEih{lS%qA?a<2)s^v+}Tg-0&G z9O`&foUfVa%mw$C92Go=sJKkXnkb*1OYC$uP9vOss5wX4!;^bA23 zB_OpVZzIPT%c8(p&siNJ7%_2rJn`ha`sv`>mLxs*mkUC9Us|M-xYD7C>D}Rv9MX?j z-Ze<7&E5O1{^a7bv-H`JKZip+QcSaT!HnE$w>1kGWvp^tM?U{fH}=}H!BqvFKDSTQ zI-Ut_6P-rTN7bjS+ZUnZkPBY@4u9sk^(hUonf(OJ?upoI35~`lG{GL2V=QUT6U(t9 zCdQbY`weI@)rRNk3%hE)QStLafsEyTLF%Ta-(9e_@vVelXsmXHf(ZVr9=PsH`n%sf zj`ti^U`lssaGhmgKknC;=jSv>d*g-yEpFj=xf8m0ak_K9ufy-EjfBukCu*<? z+-pHgYqTqEpBK&>Aa+j31qh0SZTW2u?f;lq9#7cr<|`X3yf^Aj<+FzjU!|1mQw4&Flt&sLLQFuF z&DwMHvPHFwUEz`gk1XFkQ4jv#Ck3OL9XJ5voh!L&eOxXLI%(|V|WG0 zsM)!hnW@R=YJ^E#shlbFuc|v+n6^u0Wrf1LcERYq6U5nqVvu5xKVKPc+j(YxN4BeB z@JF4w!2fL2tJYpB2zgr$M}8|T6VS4IFqg?gV%{@ee^B0k@9hqzA=u{a+ZXPT;e40m zPz)N?sEkze_{{dr)hiA0w9xN)aEGh@gt3gY*+ezaM&pf$>hrpn^PbIR_21L9-}V(A zc2;?)#OSTmowvQ++6F~YA_@b8%}<%<6z14Dp$4yvWAB`|xOu#qY+}&-^V#Nate0Mb zO(b4$cyl5?k$JV<>4n14mbJeC&562EZ@)^d`F<kRlO-ubE0mrq4wrM?PT7oOYoI$yn#?YwM{{mA%B z#b%fIZFF<%%FIqD<7J#SK40Gv8*3=ar&kns)irnItruflyyjIA`OJSb6q5IXEoYle zXM|UM-g_JIu4)%2%D22^2@i8tx{~l*%~v$NpZ&M^&8Pf>;Wuhf_hvGfZ>GlxU;fM( z{Y*UPJX5%2vDDv#h_O3goP{6^SwgQFX`|25k``dPk(ZRu5?eaShmkR_delagsQ=%S}cRpA2Tt5>?+Y+ zgJ4TayU-Pr^_@JP4Q~yWSL3%m(|8fgF;|{_OD}Rn7}SQhw+o zoc+!F&_aC{s_uUM5`c3BrH{MtT?e~$hMZ-J7Q-c$#4?klB zlSFFa?5R3ES7Oz#{&*&ms>!HLZ{k`@wDOOB`L@AK-7Q|XdVSQ?J6Vuh&xLsBW`z6w zjDM8Am>1aoFue&^AL7z~cZoTvph;oU`-m81V=HCN1GQzcyApVj zqMZM_=h~&}5H1#{$`FNyhSa>xe_U#OlQglSTPewhnx5LM>Tb6W2Gtkv$_vsNL*u{3 zv0yF4mi}d<9>q?ywnREy^}MIvP{(THZ1~R4ng;T)_3G z9yMA_1KmY3*Dct^b?KuEUYE@>GAD>6dp`@RH2+!rirGx5_4DxML@(bDmM&A}X{L=& zz9oO2(Y~Ws{;>8Bqk_5+$GCWvoz~t{TE)DJ-VpKjvM67K+sf^%cp<;Ws|}gvg_Acp z)wdn*ZDY^HNVwy#$57tn+S;YohgB?uk6ql+n5xh#u4ImzO5@34@_+cjVP>Y(xo9hv zlzhyyq#TiWk610YJRmKPsYXv=}%~Zely7aN1Hpz>hS|R7n&>W zFGh=9Rj_22j4d0vv2eXWJO4r3&dY|Zo-59iH*Y3a)wPXB%LRvq7S|ps6fFGpn(@`X zZdE#(X=t3;`EDG=_A(-Em?K90I^6np@=Yvr+>@WHUPhwXM!2Kqdi0{1Zc!vH?XzAl z2>~+e^QR0=ch}`V8 z_%$@@VbJPPkG;$JyMD&w1Io5eiaqAT^}ZMQ^0N59)Uh#|rRdUM-M&7T*)ru))}pr@ zBM|6vBlg4+v0~$|9rY{U)G^Ur^h)e=y?|d=-zSOO3LG_+PLJt2d{Q{><3=ZQH9BkW z?DE&k3F>x#Vu;c9YfNABuW3e{vCs z{ZEv|n24R|BN(>arrkvUpCn7QHp`rt^Zvh5?C038;|2)dxwW{{pTz;C@)?={((S>3 zJABl_bu-m}g>jcPQ4A^(cndZpX(A`NKAqH&Iwe+R;3K8$m#I4*NnEZvN$ zOIf>WQ6Qd-)LM4hV2I+D{CelSZ&k#4;k&27EER2hTGR>I&#d$!)4uT)!DD`W;1|Tuc6f;z0dl#&maBBzGl?12DCo;upE8OMqtgH(W?LS z%6`yM`F$>Y*K>?hTeI>?w7kp3GX}lW|Nhu={-6H6zErHRRM08wx&PF6x6E`+h|rz? z8zuuWi~;BW#N6A<+Xb6xaUO~KPZt=QM7y>QiJw1?jXWp}dG|hxYRPdV&rH&Py+D{6 zl#5f&8G2QibRp^a4j{Xx9V7qG_1Lu#py~*2B;!+Y-5uki3|N@(VDbDrX?~;9Yv_^t zPAq#f+V>1|XL-0^e)yQClJhJHMbnc*U(rTibgaj#raBXZZ$)+GQx7HRTT|7+9q3|xF8EFd()wuQcl=Z zS@^Q_mu1`Fk91*YFXbEXSQ+bQXN;LrjmyB{5Ja5{SKsCO80(Oe= z4}D^Ped{Z)>ig@?I2}g4IIVl;*o1A2IWNaL;V?O!kj_ z@8ru4Mnr2qU4o9b=p#aV;x!sVT7A|1gqaxS-&a8*1ugSSDqG*!ymNmPxT)7x)^##& zs8aX*_T_S)u-w=ZOs^yBFN|V)4a+?YSR8x5&*{r+m$J_&p^XOuO8TV@xl*W`G;NfK zKJkN~an0LFjeg_^>RikDTQb?n)o=u(RBf@ri`-%0*Ox)clE`Vnr8*I9>-!m`dhngA zi*?-g3gcWu4MC;P3~#Tlys(cLDn82zgkk8_)gORnCCpw9(f z*HeE=pD+!Y>g%2QC2eKo!4wI~X}cdgv&mMH&)^Uas8rk6F{3BC}(%Wtz5 zGJYX>d$YyMk}Kl zqxI_3?A{6_s5|)xDj8GrkGm`I@;W!AzuYt02*d1n2QkQNJ>X85%Z~Sy<2}D-yDh|* ztiAfte)LoJR{afC{d?0PdRF5Kk!hNDc-(UgMX}zB5uKr-I>is$rXOg;1MtHZzwjox-)!X9E=m1|t7NUwkn4O$C*sjG7Ui4JmCl7rk}) zg?A;r{fp;k%9Bi(Dr!nEmjScFbj3+gKF1cr8c3lu<-*5*F3O4iV<5il9X!bVIChY= zM{i#}fVMBDBFBc+5>%Efo^)w2t)z@d?ez}&{G1iD5!JUb_oc~{fAFNbTR>#o9lYME zS&O`KjyAP#19Nu&4BPxx$%8GA`BkuPBJ+|r1u#=_EE_tQcqVw4Lx-&4cdxBfVGZPCtv?Y7oB6d=(>4RjD45neN^mX@y~LD;q`5i$_kH?@`W~6 zfJGVBV5IOd-(tv$fA6|0FxlerhD&MXw>{31wNrdw%v^@~kG?GV>+iSq#qDa44xc#> zXD=R`q>)>eX3LhzWL~2w!1>m}s2KLIMpKVu8$k0Xvnes=mrGYK#{l>%s>>B?TxH|$ zt}M2_bWyCsD1II}1vDMjGAqQe6GHPsWztejOifItXXZEdy4bvpy+jnTTkb*+m0`= zRed!$!WO&Y`(IipzJhv=|0fV%O4gHFN=-GAdEE49YFf4_FZ_pPY)ThS+Gl2)qkCDk zSmj1^m+o!{tw5_O1nO8hW`cS!DFmpvr2EI<_ly zzNjhkzVjPGieK>N>6gO`FiMWQctcXWi+Cw6F8o;WN|pHhg62 z=$$VQ4s<4b@7#E{d7tlyccw8($nRNr%GEc3+poe}YaJ^$-rv;yprjrQ_A%0h)7gyA zZQYN#7$a)?v=kp6(%60OQs*~imcQPqpJoo1GNjI>U*}vfHA20ZD32uJW5m;)-a}*Y z<$5MB#XCE@YhxTAC7w40N%x`8q?6w#<(jO<|30+E$0PuE3(8+Z?cN0@tMx7*yy`mr zHZ{Os5oqH}sGW&zl*NXecTPjpfr9fl%Qwy?Z4`YY#oJprkSNMDV8)|v6$k8iZL0c7 zy=$S_9cf)XfNH}m(zB#jNr>Ev*51zfaP|wLQtrLJ3wLqdRS+Vl{Dim3y_RS$=M~*8 zisNxuyW8zBVA8mQqEEcVbFo=m0DAbARW0j6q02@8#-+f241EGQL=!d7EtQGQFU&p7 zC&==;sPe&)+2-geKBlS(eetX84$SrH^%Uj8sBCLo7+EpiL`Cw4kDgZx(5LT8(_7r} z4g*~5JJwgGJ|gXVkG0v@@+Cm}_X!A7lpFu|;~OP&@JPQ4skTHI#%b$H9S=>%<3?jb zS0#(<%594Dos+$_0exQfwoJDc@5@XYJ(`l8obvlC;ZZlZ%f|Rg`h`YdwKdnC0xvYr z|90-E?ThbY+L!WM+3mnV+m6|z+jMEZF;h9#*$)@}6t3NTs+8<$9``)r@fY5h$Ox~! z;g%KQnGi%GJoxMJU)5jvYxGn46JL><}OE3bL)$S3oBvbAEK* z_&tX!J8tH%t2-O(;2`KwXwkI0-7{X+$NFN-&Og!o_q>t5w>^XU6XBHx22|xYx4}NP zM_(3jQ@kaWp5Y1~<@yiG9X693QANz=<*y>1J<%J#_4L8ly|9Ik-2ShTZ-dipav`81Q?!x!&AIrD_(^tpLdNMc`L zuU%>_FRtT@G^z148iZ`v^I}l#t^}1kPxr|3>8eEY`{LF8H6Yw=)E9)#LjD| z$ysnQ87g`GT7PG7K`^jQ1=C#Fey0CozcX7AoFBc~w=A8%kyg^?d$!XS8=B6`7SJ03 ziHnPC1A}Jut=$O$_+t=Im$;mb4TP8)OEO-A!<(c2?DcLOC9~bSQOnKFU(yh0yE;^s z05mf(GctN@nbibZ&o4rkST(v@GxJC9mQOv7?B7PJIv!v- zKKGt8y}hSNgs?qMR@AzA>Sa~gFloe+p?TxUehyzDmXk9X%b7jnd`IWG9|Zmm=J!|lyy%SKmHZeG;@vJ z+<_%FW;8pl!Tn>PA-H5U4bLKg6jkU~&eJ0WOY-YUf;c8yOeilfF zK2a4D7r!S`-N>l+?H~S0-&;~h_fTe;LfiZbyvV(h#J+g9AejQ({p(LV^7?p4wGT>7 zYuu>1Uxv)A^)-|EUrl{4b|!da%Xa?uH=3C6_Xpg_%4zIw{q=bA(yQG?Hg70;$bInM z=8J@>Q2b*+EypW8^bnuz)92{dlyK!>!4G%!?iqB3w`XfxN#1*F7n5Ng88S4r!1P?e z)-3YLlA)vZ549)dCGUO`8XN6y+|qnkE%EN>#eJ(l!MOB_^B$Z&sFZBuRH;w)mjsan z`I%7En7*}PKuNECg9p0N$iBDqK|Z{(fy>6H3__eQ&*H;_I)|)?{Hwi^G~F2ShBeXt$!%sWgAzmA+W^^6FFvP(7iRTq zlHt=^g;!2_TrF4Ur-aXPGfPs58w4Z0H$|4V2q)2dgFBB{8)*{8-f?IHR*FvGV6I@%g#jQwv?W}LDwGa0GuK(aa&B2?z znRAXg<};pq%t8OYcps7MaaXFZta}b=T9+ROeuhrjdP5tCvz6G2gR?DnXY^mal^^}M zxGKX`Od*)XW2$**7R-B;91jQ#a^U#PxnUtwjwcTGWGYYv=^X$on1&qcfJ!T;>f z&yISH+(c}Y^Ijoqy&`fBV^m`UlhDiPrBRa!`==gX?x-e@9&^H=$C#@Do-Re$NTbEi zcwfqx=@UAan#m@I>n%E_t6Pj1Hw?SGN{%PC>_#Bbwk*V_RzI`YpU~?hiomHpn~>?thJ2g}$*O5Pk(}@lBRk~f z7(>DM0sonhK<;JrLxmn*nd~e7z!kZ%2m04s5q2m0U5`e-;s{MdMxW~$ajq~2)1%v` zx7yC0ucb7@l+TmOsWFna9w^U-hQwVcW5#QbTtDhKq;&hAe^fRwjR=#`8~sSpM-VpK z<^5B!_e0j!#zLyj*mkE4yIv_;$5h$f)ki%mf)O5bbpsXQbzuAP!$y^6MRHN3^Cat864n814`f7FuramKzVLh>InWSkN^w zSV^!sBR7TWHLS!=lNc;#KdOQE$D&P>wN(#VC`4c)BM>wtTWh2O^)IHPaaako*%rUn zJ#~ik&d<-F!|(RBP+=@1(a-4wKW)r$m$Ls!>!FcO&dBwr9fD`0uE9Cy?_^vopDFFd z_7Tl$AX+@Ep003B&B>^Y;*Ri!&Eb0iv}b=lGIBsT9Zx=BrgjnQ9u77B`t@5u0Shy0 zqTZ)U4t`&6V7}Q8a%^`FE7x)20CWx=M^0IZ6<=4f?IQ0qj(XxJ5gl^e9_$7TXktV0jz4pmq*{%-3*9WRhy3^z13rEK` zu`t#QaG3-F0YSoT0xI{12GeYD(APkCi>Ff`EIu4RtGmLs*MaU|xKwYpy?v{okuVhE z6|B0hE~$nt85det@vv~&|5L3Fh>|P4tNUAaOwhQfdS`jywK8S|XshPrk-^d#TXt2%rx zlaXw_1Wdoy7dZd%!=h^8HZ?wzse#Fowke_JEmKkv!ZRHe55ri*jdd3{1&s!@fbVz~h8AAByf_$c}mY6(x=J zsOMcKH-7y1u`yYbF3k6KCevs8!1LA5%?&^HU7Y8(BeduPEP_ZaP^S75dUO#BE}A6P zrQGkoduZrX(W)AP`2^ekGWU9zdR&Ud{{4}qDvK3}AJF!Uut0tD;O6t@N+0jUyq-9AP18S5 zvKHjD*a(CqtX;$(ems007CKKm^=@$2H^=XMqu~ZT7{bDCXmc1yg*!smPn!b3X?gA; z$jFL_?KQuAInP9q^5jf}3WZ?5#~kKnl!GFa!D(N7zTL#&#>nllTn!`SLpYBj%y9$G zD~a+4D9q-L(rr)>;Mvh##?=~${s3HE=#V`vc235x7^Q0@`uwAU+1jH0BYv?E{3F}Z z{G(H*l15G+r5|g#5gy!#X`GC3r_4hAdXwkgODhT#@&$tS0v;mBss>N+mB`pf5J|{11Os=jK+LtvJ zLM0`wX0prQ(2YDVmTelD)d9Fysx3scSGV~vg+ zj{Mbgr(QG_$MR!bT_ZA$`IXl=tYcFlub*#ijxStXWKuqD|IT4YYw&zfNQD3HC(fam z)a_i|=;hW1gsa3XI(ji!T}su#wd(Zj`c%WU^*6_BGLwWa`4X|Gl=Zz)P8l@89HpmQ zY@Q6OPgO`-Fn5d+bl`Jqo=T6;nYSH|OF!M;M=-q61C?-HjQK0?rC%|{l+|LyOZMH1Xo@*t~#7U^<1*yl?%DaNvCH9RtCqKsnwGd*@EZE9de45pAsmB_{UC)(o)W$ugo#AA~U>4>AP9Ld70j z_l>;0cpMd*r)xbd_DT~Mc#cFbdU!aNdmP>z%IkCW_eD7F=RSQuOml9Pb1l%dLJvGN zIZBS5r+Vr1uF*>0883F3*UAl85F+%6t%bQr-Wvbz%#0PYW9=ZN_;r?jn1=l=RFc0- zbbGk9S(rCL>f9@a97-Z+S4ot{kA+$+vv55&mj- zAqn#oDQq4>^PhyyH$~O5@xytOUkp7{l{KADLwHud^w;rqtv9Y$% z$^8l@ylm*Fzg+f)8WNWlSp2S)K;hI$GM1gx`*jHOf6r?cG+%s?V&Tq5t)ZAcY1?T! z++xG{JTYn;EEzwui!H^QuURFS&m&SM>yD&xrOckb@HKJuE6&On37M2`tv-2%rT=&1 zf-qYe!|x%$7QSqiGTc$5<(p3Se?J$WpYk92hqh-j`9FuirxO$Ce@BJycFKQU`-d{8 ze#J-C`;0jI^8&nRUuNhm{n|0J3|tC7hL4Vb28+ae5#W8&eodRlpsOW~ zllHaCM7o+++Ej+=A02$r-%fm4q*dRwU5qp4pnDK=QH??`umXnwS3+LM)XLd4f0lbL zBla|r;qeqzT2dV?FkDO7zMV8)zIy(B4EK8keEnKDU6WN`HEI@%7qgove8ZiuGHudB z3~-GzXpy1fYZ~BUSRwbAKJbE&=5;~VE%U7P?OL!iqT_ahP`5&Myo`^W%bWKUxA;=? z#+_TRZQi;M4xWL*f3(TT(K#n<+2j}t)P_#z!vxvVk_Q>bt!emQj3-jL>;Nq)rHj$eGTguDc&qCHaG zi8F!y9w#+rlA(Xw%2Kr=wW7riq=jT)j(YXLa0guwt2cJdNcfIPm&L6^zcOIEEPvo> zQNkgXvkeE82fqm9K#vqbOyE+8ot52V$OPpoUyIUw)jgs1U?vCJd|qfp;%-2NRgI-C zB64|37<{_655=OAoeK90CsNhfTB$^-u=&S#utN_Tp8>AAFfLYJ z=`j{Pqw&+@FwR^_Ct&Hw+=wFS|{_ z|Ap-1%~iJ5Qwk5sChI91G>OOw-Emtu?sr33l3L4CKK@dA%)wGAV8Dki8w+euC5B6@ zS(=q;C*bzH;5=1Gr`KFyRHgTa?g|{KPAoI;qvd;zRstZ{=`6YvzR>}n*H97<(=eLb z{mYDbCqsXKU!MnJ>H_x1486(j(P}|6%^M5}RdQ-{_B_a5=yN}|;9l9=c7*z$9y&QD7$*WEiDbl7L7k;i$I_wx)jY`>B4jA1zlWBvX zL=q5)s9kZQRzH<_j&ymXF#yoP&pmnqAZ%}*axVc3{1TAmtkyaWh+wz(MdRfjkpS$P z_tl*ij-6Zdn*1qIV^;U}eVUUv4A^Sa)9q-I=oRl#U(mcQU1UC@XoKfeHd-yLz`~Ey zY~n)6oGrcnoCCnwW9#(Rs7SeF;!dQ1r%2rH+nkuxS*mblKF!R4QA3 z)QWGA@mh?N+{?_LO3776B?`m1RJ~>ym?%=G!J+p(hyl-1hBbXQ_wzFbf&>a(>;x=7 zQj(v>emTxj>u6WM%((%=>#llM8bVUGP@tN zBe>~O-uSHCCqetP*r|3^ggO+RTl&gmyA+*e;^j{vJhp;hT`VFsChh9Mf{tT~?mq*U zpV6|pAAfJVU^u0EOpeG#=`a$0%heB?tYpWFWcuhXia#=C-c}G_w>;$ma^t5Vg3@Qg zn3mS<%RcTmW826^4dKF`wBG}BskKUbgF>QGHOgE2dAVbvMi6&oKXeI*)^Plad|KvJ7D;T1F%CByt z_dJeBWXU7ApCfPjvj_((Odw3gzBl+~nW-vMcxeG~I&r`j-AkdeyqLLC1#J zPY4||9if;ClJ1I~cDlT@zQqFcZ&+#H6YY~L27-?%_^L4%Ll^f+y;T%R1Qtd{k@wK1 z+2V7Q-|<)ouADPlOon4pY~z;3sX|?_Xmy{TNJy8iad51!7$q}e>m8MMzDUCvp{fqn z)dymw%UR>uQnn#d*maDB`b?%@k>RR$vOHbl=;lDzsb5eiCB=(S2QP`a_&o=*WX1OQ zV5bj#wVi>5BCU&cYP^#0*R|!iM9EcpFWv|kF%b0{OPVUVTh23)Zha!bR4Q4B|1K97 zt7yOQ4WC;Z2&LId{$TwBM;Q!^81i}pcQXW0E^=1%OI=`M%X59nL$D>oSogGh1EHQU zLhM*V13(gUKS%bc@^C6lHPaL{xL~Zv-Td6P+E9Dar$(KN6i;6fhEl$(b=maK8nB}h z$Dc|d*q~W#fPrca#cajBZ^WC=J$L9iz! z*yaT*g|e+zi?&SF!bMo@r;;J(*1x-poin(qGLhfEYUx z2yOQer(;SYZpeF<6-e(!oCghcqh$hUV;C=R>eQAO|MKBNdt+K`w4BWRL{N~X89$P+ z#+d7~gMp-~Xf4SvzrJ3m4oaz(B~Rv=>-_ZwF4u%q!zApK0q@>q;%9~qpSzv0?(;d^ zg=)G#ZJyAmMq`NK)pZVAs3IdJP690*+XmGjk9}$A(LK!e#rGTv=8sUrNNnk}%H19G z0)*(KS*Gh9`QnN1V2+-2^6-O#i!^LdSB1z4o)^YEt=}6UDQBnMi_M8$2A{Q|DJby~ zm?>^U6s8W>v+M*8tG=u2`|v~cR@nKqQ@RD%XoC$ksv9N;f(geExkt=0UWlO~*; zT~v4|AYss5p{0{@E0Eh_-9o>sF#ycWD&-Y=&!YB5li}>@OzX;tBe~7T z)bY)&l^UTO8Rt?Y4a#K~p|}?}Dj<@iYIB@%YDLHIfndWz40q%anp^eV*zz`+%~+q# z7&6Dn5AB;sLTNR|?$X6o8-~fOJ-(T?)YH=NH=%Ba9mVGHIaNfUX86 zDCbI-Ww&a3Eg8>}p&vI1r78_l7Ydu#t04yf;7>9}97Jxq<)okLM`VdBvk>i%3S{bV zRal*X!nW=1og#IK9b#a$E`oa^+)k&bvQ?2n3(2n%en~&0QX=OZec6QNa}?)OIc9s* z8W#+XmjUzVsDnzhIgcJ5ZKCL)K((Y1kU2hlj?^x%KuB9VS!UwE^H7&Lokg`g`kf|5 z++5p9W&jt%w)O7_7#v1ys_x@nrQC=i#V&wQJ(%2i!I-UbayfpBY3?TTfFsy4bq zcG*){4nTSzim+c~CoVBtWoZe=RM&yltKGVm3^E?U$gpsMp z)#$QQd3~=(8Cr?naDagc3eMyEp&u*dMc}a|i?k57_p(zL3isZa)_5u6p{I6U>xxQ# z`s&QwJK-n_6%H}t%CYU$A8}`pNq||$us`-)i)+9n3l$DH zmYt+C)!17&99oB5K8OBj>Fp*Iz+U&Gi{3fnH%Y=SW7+q{Kam7vq7gd7^#>1PMS<|tpRUn;LyhJdDjV1;)$>7zI%&U$RJ39!j z4ntySmJ5H3BHwp9&6u0ZdbYrAtjNZOxf28e8jA# zO^Z~>^}%$~tQ^zxIgc{LNrv1Q`_s4`3s?Gn4nXD?BKp90FBcac&OgO6U!SU~b_Hdx zt!?POZwgfc`Ib6yVE9;z(vLE)iez{Aima`!`rkkONqa_X+DqKE=DriC%x2U|Q=fJb zh#N~Naxb)&$=LXGA{Acub;yLqCSIHzK4DV}*_^*>B4m(VIv2JtRK?Dm}UB>p9C$BrTnCuj4gY8?y z&58T;2Tw0gj&Q-m3Aw}8xEZEJYZwr`j>*$|9C(W!`sn3tpm~;+(1~YG*bd=?4YE2; zjLxWDosGJp<5rt%M~m(9vRsDS!SV?=V#pv}Y;S}?99N1kRyy8vmzq<&ug1cs0Y0TlA0 z=+jlg6K`$aL+@{C#*juM)lgx^2`LlhKv&``c%0^rhA!Qt$$D`vrf;epMms}P^~8meQ*Q=~ zp{&4SX&I8H@|wEckn5#~hu47V5Yj`)n$9j%ZuC)j<r^Y1FrX?{BVzZQOFq^pd{mw2$bnsR=QC6}3di_h6_stAIU zn|>8{?^>G7iB&M72|0iHYa^X7j=Wa;E;0t?_>G!(foU&>h=Z(i8E5NfEZ37#9(pKoaYwJ7?_Q9?Tiv@X}!4or!-rH47_>@E!>o-H+ zQt+P;nJ{MZ1@kQ!pxWBMh4?R-e+1W zQ}%6GWnZlPJfXR`FJYQ?6osAbXr1F#Pf$A9^hRHwFIYf_=;Q-XMc`K3XPDW0DNh*K{Ildh{ zo0fzsL}M0=C!hMnzJUNpr>(!z1zSp!r`FIX;PrNr$4YY2%)*Y${X+u4Y`ly2-Ns{Pmo>SPl;2@!HqT&3Vw z!tJ}a(ZS=5dZv{vs)=8m$7nEbr_nRrsnxkeDO@5OE%d5Fydk|U@0ZpbIpEBKx|GKF)Q9PJIeBn>-@-YTS7f$jMn z$W2|fl;jDLG16GAnVaTqgdL3`ovLM|_}}bf)@(YOX&@DUG8j+{DBwMmN;ei`I{fNV z_@qc+VRL6C#mSw%JnY;WK6v>MBjpE&0pi1c;Py&RJo-qwrR$ant#P0SUuR zahdQj86;*QNup>XzhfNySMP&yAgqG;h%*!^38k3!6-qG)uw`*6e!AL3$s6 z`p=UUtG2d3S}{E(QegR0{OJp_njFe<`;>Tn#wj;-XfFn&6SGpR@6@kJ5TSTU4bHK6 z8DUzxkZTQZ*5wu1gwt|n#YP~6MbX~91~z+D&Ruz6I{^At z{7>EJFmJiBxIXdaWYqsal`Pa>2{{-C<;JSfFzH13crpQv5*#25@?b!o%UtM|EZy;i zQo0x+C}CPh<+TfOCVN&*rZr`{!ts#ci6mDN8TP6**J8@0>jld?9WkCI6BPlD3OEZk zM~1&3CTUh%>HVFK&5}18FG>!T-6@0cb8HLsUoV^Difi!9BD@f?GY8XlOf(5%GA*w` ze*OB8&pNojRom#nf{vpY0r4C4RdGj}?=5jhLT8y%UvuGQtFw~fMtC7io>6%#=qAj{ zv83mi_b9WyT8y=&G~;;MLOt?=P_tfNAOM{>fm@HGB8WI5erSmUVjEs6*+x*I3K z*gzfehmUSKKm&3dPjLl4_35Yu7)#E&b=?)?kUxZKG#xuQR;3<;xip=<7nCE!qy>%^ zuSDWT%mHYlR023qqzll3!yb;KEGg1O6;Uc^EXS52&;AnEczKs8bM!EQRaYbv#ugu- znm;;Jxet{X6lUHtvF61gkG~wY7I)DG$=9qo8tC=_#dAW(RmKSKij}Q-5g&>dHpnHF zVC-qvVuX|lWjdbvVVE4sLc6x!-zXE3)IniVbrb@;IOa0-NHU?*BZx3a2b&*DiB6xJ zl@MS6IoLWEnX-D09|c#A3aa^F-H{r1j0R~8eDWo(+*&zIvTrmt=rI(d-F(!xa>C8Tps?TA(fLQq&S?oB8bMX>Hx<6)cXW~BlNCYMtCTs~b-SYzOL zdsFULIH3wK{U+f2d}~`_C0;#tvKk5frYo3dbLeaii6R;oMS=~pW_U#dXyg(e%@axF znW%74=KG=YeZEL@tFJd$<|T7yU3JYqy-$UbnW7`d_J7QZ1ai?(5{LuP7$bnGDheWf z3fxClco;w>CQ@G=WpZK-%4@~%wvB5=s_fymB6{_redqT0L^+mdR_}GbE0=K^RtrEcF-fN1tl>)HY{2gMGr zm$~d7(2T(3scNv|4!i3kwzjwl`=t%@!WqDQ9tYjPWU+l4HJEPn__`{Mv_=2(-8icN zUW8&AjmC=@gTYEZR@Im-#Zo;^eK&BShZ80&C}qs;>koB0ejI9GTq@NT&PZGsEllmu zv?gcDPUSTnuTo*h_aJMAr#f*mWg=#?0M4R>vU^byjytDjgBn1>>;%P451~0j`nZik z8XBI(c}LEX7n5yxfY=8;Tvxx8WEPnYQ6d1I4{?n8$V3>Ht%2U87_-@!4gc~R;YutG zvRDI3cC@XJF~j`bk|GwxM%3TwxC%euvo8%UWL?u(*P!o&XHSFe^O3fqs!3yi<`_Ux zA6~YF9etUZ?a`JqwUrC1agj|_=3bro&iDK@jq{0)_K{a9w5Bx*E`)N6n zS&E!kw+XEKi31K?l&6>V^63tPZwSUx2`b53`7mqExposG<6zVRKl)gwNPbyF~w%spjwhSp@t2pA7Iq90bnrLwy9 zNyDC?o{}J4bDhux^zu}-STbe}trtX+?&{e&mzGI4O#B{9p%T<>7f}4Szpwck-65BYa zWwumg^WtR_P5YHdK5N16Q!_5e(y4Vztm239;-B9DQA>^$+LJl51*$e4>*wM}U;C;D zo8i^Mx_H=9GP|+uroz398en81WsL3&o4^JzDLR(^Q0-9W{qK_QNhi{;4i?povY=UO zf38t<%IqegO&`_oySq&3+#<}3+butT`6bEbOOZ?G*L3BKxFk>R^V1vwGiA$Gt2HJ( z%qN^#_B~Xi3_+y0utBzRK#LHmnYA~_l1SLG0u%c=oFN|50@$EirW0+A)^C304^?NY zF|SR)90sP(U0}1j^8xP&fd=5UHwAvcIA!V)T$o(jTxHs=ioQU^$ePo#57ekiaG}~Z zcg$)ve|xSvLxI^dW8!6H`e5+~w5>cY5nA6})KP>!YRI6@z?RFvrn$$3(*3fdletL+ znJ~tFKuVJ>9?Ou*E>dVVxy0XzRd)*#D$J$Z5cs+3+#a(zQic>qO92K zs8X6J0mI8I6F>%J7F@UZj8 z6`Ar+MZr)2G4`(^J_j?5A*)I(TKpKf;+N=!4r05rgz900J%0&~l#ymn=YB76oVxl- z|NB%|fE4G#V)g3rP1{$#lta~VYov{PK7GrdcQ3Ra_({YP)9v-y$oPvyzgoLP(IC?< zs~pXkf`St0A(mo#A!5g0zYqh4N~s7k@!x(H609S$O<^bEV(wa(^P5*9K7@J2ph)AC zH^CF+ar&TW$z>Q@2*YDH2LeBaG!Q}sZCNLi$1Mqc7I>)RQ9I67RSxI;Nuvc$d}l>P z_$~Y;Z1@)gckYL4%#?HfOnglAaeVa(83T-^69=hRDzI>KY?G4tcfYgZ10_G6lSa!= zr0b7}3fUUqDd-|wY@TFGdmJv}{NAYj`t#jJI#wlfzU=%!PLbx=4uh7VjNH(Z<~8`l zfu;Z@p52T4Nw_BKphn=~lfgK9UOgz*CFXUL1o;)2cz$k{Q(lkS?lCD8Nc|Z*s{@6^ zTAP^mbP^Z#N4Q_@Za}}qzSrA52CO?fR8lt5m%D#qew%NS1&zkqz}GE26u{f;>Ewzh zJ)iL3mt%Z7(FCjxN+pX`7)CN0KRa2A`jikv0;WQ>>O-bZx=aS)-{HhDySo-FOnxH` z&B#;FDwE3cR)!+5gDYJoi^;Hm4HEoO0?Dca;?Qmez0cj*gckyB$h)v}6_$8iR;{v{721>L@G-KZ%F%`>YRChdDjd@Mz7y-EIDvqE5~m zgsB`0>gKeK{t)Ku^*9DT(+d}15=+{lpEqylKa?$GIN7iA9wc4c*N1Y9Zm*iIEtd!} z{M=R?`2y<_?RX?E?IW?_|LuDr1rzCS>9?DnYkfmlalLy*>w8H*B4Q+K z_^9Y@Pfu%m@4GfU4K@ZRr9F<{!H5`=E6#H#7peBD@}8!*sq5=ITZS#~skIJ@I-2#tuOrLGRGSj7>Trw4f?PU% zaXCgo2Pg2WbKbizZXz`QSy*;xc$vFUstH9D%Xh&~rZfBA#tTwXge{BZMuOsU5t_&y zWXXzYyHndV)ynki{s^!;lSoE93OB@-|J?3`a$GiS)TGD5K)Eom6@GwX#AZG6^@U-Z z>Bmny&7Mo5Fkt#*sa|=jx7g^@|K7Io_BUO5sSA)n?Q`_}uz%Wrex0cDAV=GVCKLes zA4AIvK9VTlxv|g$5~``>|iko0Lg-T&^-grT!b= zYeDl+*H^2YDz<6LjVk4u)D`M57R82D`ot&iXRYI4EHJ{Jj+7%3_SbY?EP2OMGqE?& z29Yk3Lv=72Y74r!fgRMSqdjN*kDd3)xFW=jVYx}vp-xgPjVm(y7=rolczY#hUWNb1 zdH*wk{xx9zZxiNUpI0K}fAMg=lHL5`*ApCOj*Dheu|KX-q1yu+UnI^yDP=^&QdWd_`BSu`G;9ZVn|BSL3)A27QdcqMO@$I6KNr1Hc% zKbms=j&N=Yi;riWx3cT>fo8^zFR^s_J%bhBBKRj^iPPnR-I8r9)}5OcnhC};ZCmtg zWg7=yff|ZcOEm_y!f!12=vs0U{j!ak$P-q6_&{An&lG}kcdP|z2+iTj?!I|<*l)pw z+&`?rlz1K{5Z(v^u4#uSug;ScJ`l%@9<|flQ&!E|w{OZ$pS1&JGO<`%^aU=xdlT*3 zkmYL*LUbjB)s@4xty>8DHsRg-Q{QM05Cy>x1vwN@C1?WSs)3a(th-Pq%;s*L#j+xn zIVxcI8@6r0M7ET97E;foT}|P@#JD3f;9AwgorZ`vMXN52Lx?M8*1mP4!9GHHqMVEZp66Xjg zPJi$Ay9Rd0=zcRbAus}qbI484aXCy|C|5Z$IHYXu(67(ew86B@R*l@SELy{+yI??> zk1pxYwk1z=5My=FD|HY<?Q?6UWaD{CqHxYPi=>~Na%OU3(x1$xAeOIWC;of?*0 zP3qdpW_0C(7+n_bFD`R8{&XHI)WJzn$^W??_@$1cE03${7T&{xf}+?VGRK7>A!>OA zMLA89#~$hS$W~FtV?sM9w~$CRD;U7DCUqX<9fjUA>_+K<2@%m6p*RzAqBJTuoJQt^ z$wG3+j|4orKXi{ao{E z(plSbd!1)MOF%KIb=dl z)lX+Mu1_@S$|H&P2`Y7^>5g(O=Dbw+kwH<$69*o)y8KCVf*bTAeeCBC8|tQ%nT^`q z;^wvH?(tFbUeej~nQ;n|Tx!Lld53b$>2r6s(%*wy(qf~<2(h!D>8RNjBbvo8pbczK zufr5&xYBNEeB#s*s!HNQlqt`U93w6wYOc)z+nRX!bx7LZd(}&|tc%A%VX(mif^JE+ zbc{{ne1+j%fkOe5?Zbc>yEA?gq}Gu|${QqKQ@*puM{|!Zk}ySHyCT4wQjw;%A(W+F zS-iBN8nJPTt=Rs2x8=scr^J{GeUXE5T-UMf#fPI?Uwo{5)_7K>)%Ai;SHd}osx6_) z_BG2~3`Gs8YTpQ>WgsnL{ce2{PdyU8kyBIa>90yNYVoHar9!EzEVS2SH&z9@Od2j%90!j^biM4M1?+CoP=?ZYqH7kM9KJu|Kx+KhrdTs3oK{N z>GM|$Xb0|Uf#dZd0_s$8-4}*^!wKa4=qgn#yX^E@VT>Z*D5?ZRU%4$Uq|P7QVUg;I zF(}m%eAjtZNWf4t6FYr@PA}|{A5JR(MC-EqEUj5J)I|R+4Vn6)!vE(U&l}nQ@!rz0 zY$c=Q9nt@98i0i|*j@)nDwZMtz9Kc1fDq*YZrhmKH_)#R8h#?syW>{;_V0|Mr}#-y z+o!AN2{B9m|400f0r-F282(E}Bxn~~n$0J=><3;k68>D_iZZXj2uas10z_nd|6NYDgIHm}0{dq?$-Qq2+EY~cis5KQ zqB+XoLqLh@t0#DX$?oBo7^0=ms5RKpC7GW;)gr1OlSUmFh~qGWL}I?&MzvPRGJT1N zWo&=CS5lH=&c+w`p#~-c-hU0Ex{H@<`3A@0Vt$3IKOo3Xk^S_CDXkfOiSdNpzpSRQWcqVT&FD6oWR&Fk*6Nacql+%?1BktIeWf0JtarG)WWBek<5ul! zITSPwe+ZJZKD)s$$5N|U+%sOZCdom(jNmR%Cs9bQuSbjIJBvdn$rxcoNzXK7cmX7o z{Q8oz+IrdsufUrQgnbz? zYM=IpM(dV*9AIes^37o9ndvXh;XlDxD;oWNG3g2*z7bO%tys76_4D{sc?lflcg5o? zE6J?^05*!c%8p)OfL5HFHUTFw7$5qn|~6C=7fWBHN_8c^%9^59y3 zU>W8#zh$yrvXcK(fy{2lv-&kaNf{F%-^LCu#+e5axKQ>LVJz)r> z+_?C5$1QqwU3UBx4=dXfm6HC)U>rWm!pb2Wr3!_RD;k~Q0{B@ z>>&T9)}+d-{dIXHW~Qrs9Kud)V^6kYj+P!=N76pM05YR8SyNs$SkjpIif(Jtj#>yG z4sM_b;>Hi2lBhfVa`Xk5t%|wNNNiey!N46VpX@A3k&b)Edqu7R6t-ujiv(3@vb?;U zef9ycu1j23yU%0+(W(Fdc;{$6rdZWmC|?f<1C-fHeawvv^vLX+V`dIRshftt<;rxF zHf9>Fw(tW!4|nrdBgAzhwdITj4Id)W1;O#nSCv>`w!Y$0(C2 zM)~h`2)z;*hlR99R^>9}4(5{JU;tj#QtrKcGJ59Kxw4{-PS=K&$fgVvLkbppSOA0} z4hFc1l;wSl+CTB(0ubYbqZYf6a?md-gQao9E_#}B0McQ(Qg18S>{bY&jv28R0I5vp zWEuRUR`FrbNs$sAYsL2$=)SlL|7UG#QHq0*gsvEQGK@D;;u%7<=QjC?$Qzkjb2No0Me+$1(<#2u`}HI9OjLLgcQ`>@6^jQ15vr?BYhdEJKyG|3#Nv39iz< zd`+`%Ln2c`eYsqTl@L&;F2gHoiV7NX0>V8sPg5Q7ajKXm!+g;%dvR^~grJ2)3z`+0 zK#E{RP2U22IfZc_q0SsxoAVALV(V&hCmV0U{OK##8lDE{uBiPtQMgG}R)G>wZ3mHj z3mwnqlnLY%iWTjdL8;MUyJpEP{b zwMqxwUZsj3KSZa@Qoe9?J{>+VQC}QtwFa0m?`acfksBj4p^hG3KGGBR@Ed_Jy&Cbp zZ%2j|uDWH!PS@2z>dsCH3YyD5KO@m|D0Tj2@)jy}_z+27SdGM5+mlfH`+(9?e5JiN zv|sC&KFqzxhkd=R4+;aiFbt9f0#Auogz^jKhCYVWtkV0|&~9?6N#JA|z=4c6F`?ap(OrVpQS=~r@l5J@G}Z!juuHrn?gZ%E;7>+-zV zSn;)K$yqu{96#7~=kk5&`286HYSSD$YbQ7C6rOMZ~0({bke%JCZ$+l=LlNJqO* zSEt~Fz9ihK%j`#=X}Oc{Ba>#aptV_GI2s9ok+YYCFF$Y7AszIYo<5C(B`JDSGD3S|!>0Vl zzz6&yJx%W_0ZEsvx+e_p>#9B8n&ITl+jokJc69pt`gg<|pw6nj-j)pT847-fqay`y zAxCB+9yJP>kOvjtP;8oeQc1))?j2CGy0Qa8W8c(lh{`O% zM_1o5^lT=nL!Laj5zJNBe$Yhc`m~X%3ZvuA)~FIWo{^V#Y??pw5VO9qUBB{t-4Bdg zCyQm>=dYSR@(Nt4i5$O3d=(8$n}k6Ts%!@}a37YjGTE4M8~rJW;hHw|_#vYX>q1S0(Kv1JfR2%cc#q5zMaPNZbDs)8hz_X1FFL>IKNDXQdUlG%cFIri@52O z>}@QV%F{Xf*aer1)O#^>GAG&jaHNK+*AM+M4?b!qg8g&RTdX)J6WQMViCsJ-%a6Dr z6{z&-{J#sorAPfu96@)o0uo_dTJL~8yW zi*5gvgy8=tb>zRuEWxd-QZ);V1);#SbkDBo6EBvipT9M;MN?Ja$*>QGb;5LLj*G;7 ztZ6c6zvpp#ZkUaH4^_*e44%`-b%ajPFR*jL9 zts4a@Esiw!nSs(t^o=A*yS8K$Hb3NUM$63M)YzixhS>5GT8k&GuikD_NypjZH!Aq} z$s9>|>*7hpY;P>r`{V4(vcp5!0kKK5JaR4NP5q7UN~THU@`ZIFVT+%TixFdSk-u)` zu^jRisA#%4 z=3mSb*KImAoL-I4Afgt~n5dx0VkpO7#%DgzR)||U0q_0ryWE*f&G%xJWBQVpIxn@p zg$$G99xdIRTEr%2qnmCdeOLrME*(V3bgC7uoa)R5YmmUo?_$38EAV8c|E7GF6y)N#08Wt+Kn|8PrE{rEAp z$zM#yvZ1R<-p2cj>bq*ZH<16QvNMf`a_!@Iwvi^=AZwPIkR!=XWS?det+&a(md0srddG7c3tNU~RuJ85# z|F7@G{q6JnIuB}-EFRf5P+~eC>>WM*Mz)Dc*$wuqAMm*tzWv2t@P&ipn7x}pjJo*H zmsYB;+|!1pUfxHvvZq2r0UL5GIRJd%am!nTp@ckcPIgVoYYUI<87-H?P|q%EVMxZg z42yGdS})%?vd%msIYod9I=%*ZXODoIO%}-tlIV^Yqv@}LIy8it5RkU-7cHL-NT+fG zG)wz8&H6A52Q5e$+;m-pJqF-R5jRJ_c@TN7cM@SeU*GA7G6o3gsKZlN|cBLdD0 zK$!Y24`D@77YcxlkUhEPdoRQM=)qSNPqtYza0qwU-*=5r>zWN0o?8iAp{=4fAD3cS ztQ1O$W2{M$ux;JSm^Fzf!oHuhenLOF0BP1RsDkfN`IIpNaiF|PCOGNDnAh5C4{nk4 z%9Qgv$>UUSZ<$;gR7hfR;r#i=$i@#@p!2w4szP&i7v64lxH?I#)JY`ul~@}f8Eh%^ zD0U8|=p3HWmlaI|3>~J0>mpICsr65RM|Gp7Hj#D=x9ZXypK^uy&fOVaFWkFhg&Rmk z%#JF0%%pGY5<#)CN&Hz>_Mdl!k0boYCQknTIy6=3K?@O96bqU_0KcH*C))zp3+?h* z=UVBH+1F|iC9F7_ZEBZS<;V5FR@OpWIS-DSTWQUD`^ zH$^>(e;<+YHtIgv2Zw`ub0Fn$?SMuOTD*GxLs}&O*wDikvQHtv{!V}3pwu(EQ-=G^&d~~kbGl@xB!W!+b>GQ{|UkW z!BdQ!1oj%9`jdI%VLDP5lJT2B;sTRUYkT`_KY`aB0N$6&2f(W{`qKxh{QuM-yb-FC zsU7L@2^b7&%0~4Gngu-uzF1g=gqDrGG8A~IkTzdOvQf>+xtV8G5(DOpiZucnap%Ay zC3bAhhWTiy9>FU9ek@!Vt*;E>F`sU*c=-0pUokT1yz7c0N4ct#A+e3@+GRbTc|oR$ z$eV{}e#9bEte>{@=!VHvpf*nyPkPpPA5fA4q57d1!O~LVsiF8wfMAq44L@}M)zNg% z-`jL~sxA=UIX*E|q_($z^J@5&ov91YVJBtEmhqwUwL`bR8tI5{zx)=Kt>5C3C_rzJ zKgL7+gPeS82yFJ`ZV5NK8jRe@NSt%?&>fMIvDlckdeUY)q!3h$j=$E-5LuXZ0tQCL zmli$IajeSznO3;#)H_8xeQADBx=hN%ign8@A(aCtluU;^^Ji*Jt%@Np%cK}(EGjEq zXecnUdB$mpt?j~|F;NkHa7yo^^d}<)yElGs1&aAZo2q^j+YCs1S? znp8o2qMp-dUe2tjNW)mJy}Gmw?t;h$qR}Yz6PmcJ}nXvmQen*e?YQz)PVdSa@zGXBYKJ_zGoQ0u%*E4%Q*ElK1 zo80&>&K4TejJ#d#c**q~mrC^vwrM}c2-FCm7dqVA%jzE=8fW59XPsbf8|=+1^CZK| z%9PrBofr|>mj2<90qk1oDmF7ouZI&s1{?-m;a$8`g8(o2w?4KjBQ+e@qJhNW-9}7G zUH4ZCUk-}~y}8WzZ7$IvuBBz293o*Y4c09mc5Hs%ElX-wGW{8|0;{jul~GrXvG$a< zFzxzU_x&m`OaX-uM!O=^9$(QsrHEGV@(;e4qdy?qi9*2G) z%69g$Vj5Gk>N@eqH9`K1Kl(V;+ONb--pVr%sYTHT7Axk>%z!>mT)&N~ zzYSaihD+<>YwLHb=LoaPlCXm=;Tcfd;#!!z>CnN9NmT_bAv5jJ z{u^&&nBRnq90P5 cVlaQn++!YzHq7LIatL@3=2m7D6ZiZ70`85`CjbBd literal 0 HcmV?d00001 From 243cddff062db69a4d5999467e0ff56ece7b857d Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 30 Jun 2017 20:48:24 +0000 Subject: [PATCH 5/8] Merged PR 2027: Merge maricia-whatsnew to master --- ...onfiguration-service-provider-reference.md | 31 + .../client-management/mdm/policy-ddf-file.md | 28034 ++++++++++++---- 2 files changed, 21876 insertions(+), 6189 deletions(-) diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index 92227beb06..f5bba14384 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -2305,6 +2305,37 @@ Footnotes: + + +[WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md) + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark3check mark3check mark3check mark3cross markcross mark
+ + + + + + [WindowsLicensing CSP](windowslicensing-csp.md) diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 1d12982cbe..ec16e08ca7 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -7,11 +7,14 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/19/2017 +ms.date: 06/30/2017 --- # Policy DDF file +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic shows the OMA DM device description framework (DDF) for the **Policy** configuration service provider. DDF files are used only with OMA DM provisioning XML. You can download the DDF files from the links below: @@ -20,7 +23,7 @@ You can download the DDF files from the links below: - [Download the Policy DDF file for Windows 10, version 1607](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml) - [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip) -The XML below is the DDF for Windows 10, version 1703. +The XML below is the DDF for Windows 10, version 1709. ``` syntax @@ -442,6 +445,100 @@ The XML below is the DDF for Windows 10, version 1703. + + Education + + + + + + + + + + + + + + + + + + + + + AllowUserPrinterInstallation + + + + + + + + Boolean that specifies whether or not to allow user to install new printers + + + + + + + + + + + text/plain + + + + + DefaultPrinterName + + + + + + + + This policy sets user's default printer + + + + + + + + + + + text/plain + + + + + PrinterNames + + + + + + + + This policy provisions per-user network printers + + + + + + + + + + + text/plain + + + + EnterpriseCloudPrint @@ -891,6 +988,78 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowAutoComplete + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + + + text/plain + + + AllowEnhancedProtectedMode @@ -1251,6 +1420,30 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowSoftwareWhenSignatureIsInvalid + + + + + + + + + + + + + + + + + + + text/plain + + + AllowsRestrictedSitesZoneTemplate @@ -1323,6 +1516,78 @@ The XML below is the DDF for Windows 10, version 1703. + + CheckServerCertificateRevocation + + + + + + + + + + + + + + + + + + + text/plain + + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + + + text/plain + + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + DisableAdobeFlash @@ -1347,6 +1612,30 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableBlockingOfOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + DisableBypassOfSmartScreenWarnings @@ -1395,6 +1684,54 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + + + text/plain + + + DisableCustomerExperienceImprovementProgramParticipation @@ -1419,6 +1756,30 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + + + text/plain + + + DisableEnclosureDownloading @@ -1539,6 +1900,78 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DisableProxyChange @@ -1611,6 +2044,54 @@ The XML below is the DDF for Windows 10, version 1703. + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + + + text/plain + + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DoNotBlockOutdatedActiveXControls @@ -1779,6 +2260,54 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowFontDownloads @@ -1827,6 +2356,30 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowLoadingOfXAMLFilesWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowNETFrameworkReliantComponents @@ -1851,6 +2404,102 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowScriptlets @@ -1899,6 +2548,30 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowUserDataPersistence @@ -1923,6 +2596,246 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneInitializeAndScriptActiveXControls @@ -1947,6 +2860,126 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneNavigateWindowsAndFrames @@ -1971,6 +3004,126 @@ The XML below is the DDF for Windows 10, version 1703. + + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneAllowAccessToDataSources @@ -2451,6 +3604,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneInitializeAndScriptActiveXControls @@ -2475,6 +3652,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneNavigateWindowsAndFrames @@ -2739,6 +3940,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownInternetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownInternetZoneNavigateWindowsAndFrames @@ -3267,6 +4492,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownLocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames @@ -3531,6 +4780,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownRestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames @@ -3795,6 +5068,30 @@ The XML below is the DDF for Windows 10, version 1703. + + LockedDownTrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames @@ -3819,6 +5116,198 @@ The XML below is the DDF for Windows 10, version 1703. + + MimeSniffingSafetyFeatureInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAccessToDataSources @@ -3843,6 +5332,30 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowActiveScripting + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls @@ -3892,7 +5405,127 @@ The XML below is the DDF for Windows 10, version 1703. - RestrictedSitesZoneAllowFontDownloads + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG2 @@ -3939,6 +5572,54 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowLoadingOfXAMLFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents @@ -3963,6 +5644,102 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowScriptlets @@ -4011,6 +5788,30 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowUserDataPersistence @@ -4035,6 +5836,174 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneInitializeAndScriptActiveXControls @@ -4059,6 +6028,78 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneNavigateWindowsAndFrames @@ -4083,6 +6124,270 @@ The XML below is the DDF for Windows 10, version 1703. + + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + SearchProviderList @@ -4107,6 +6412,30 @@ The XML below is the DDF for Windows 10, version 1703. + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneAllowAccessToDataSources @@ -4347,6 +6676,30 @@ The XML below is the DDF for Windows 10, version 1703. + + TrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneNavigateWindowsAndFrames @@ -4371,6 +6724,54 @@ The XML below is the DDF for Windows 10, version 1703. + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + Notifications @@ -4642,10 +7043,10 @@ The XML below is the DDF for Windows 10, version 1703. - RequirePrivateStoreOnly - + RequirePrivateStoreOnly + - + 0 @@ -4653,15 +7054,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -4684,10 +7085,10 @@ The XML below is the DDF for Windows 10, version 1703. - DoNotPreserveZoneInformation - + DoNotPreserveZoneInformation + - + @@ -4695,25 +7096,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_MarkZoneOnSavedAtttachments - + - HideZoneInfoMechanism - + HideZoneInfoMechanism + - + @@ -4721,25 +7122,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_RemoveZoneInfo - + - NotifyAntivirusPrograms - + NotifyAntivirusPrograms + - + @@ -4747,19 +7148,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AttachmentManager.admx AttachmentManager~AT~WindowsComponents~AM_AM AM_CallIOfficeAntiVirus - + @@ -4782,10 +7183,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowEAPCertSSO - + AllowEAPCertSSO + - + 0 @@ -4793,15 +7194,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -4824,10 +7225,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisallowAutoplayForNonVolumeDevices - + DisallowAutoplayForNonVolumeDevices + - + @@ -4835,25 +7236,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume - + - SetDefaultAutoRunBehavior - + SetDefaultAutoRunBehavior + - + @@ -4861,25 +7262,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun - + - TurnOffAutoPlay - + TurnOffAutoPlay + - + @@ -4887,19 +7288,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun - + @@ -4922,10 +7323,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisablePasswordReveal - + DisablePasswordReveal + - + @@ -4933,19 +7334,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal - + @@ -4968,10 +7369,10 @@ The XML below is the DDF for Windows 10, version 1703. - PreventUserRedirectionOfProfileFolders - + PreventUserRedirectionOfProfileFolders + - + @@ -4979,19 +7380,105 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone desktop.admx desktop~AT~Desktop DisablePersonalDirChange - + + + + + Education + + + + + + + + + + + + + + + + + + + AllowUserPrinterInstallation + + + + + Boolean that specifies whether or not to allow user to install new printers + + + + + + + + + + + + text/plain + + + + + DefaultPrinterName + + + + + This policy sets user's default printer + + + + + + + + + + + + text/plain + + + + + PrinterNames + + + + + This policy provisions per-user network printers + + + + + + + + + + + + text/plain + + @@ -5014,10 +7501,10 @@ The XML below is the DDF for Windows 10, version 1703. - CloudPrinterDiscoveryEndPoint - + CloudPrinterDiscoveryEndPoint + - + This policy provisions per-user discovery end point to discover cloud printers @@ -5025,21 +7512,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintOAuthAuthority - + CloudPrintOAuthAuthority + - + Authentication endpoint for acquiring OAuth tokens @@ -5047,21 +7534,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintOAuthClientId - + CloudPrintOAuthClientId + - + A GUID identifying the client application authorized to retrieve OAuth tokens from the OAuthAuthority E1CF1107-FF90-4228-93BF-26052DD2C714 @@ -5069,21 +7556,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - CloudPrintResourceId - + CloudPrintResourceId + - + Resource URI for which access is being requested by the Enterprise Cloud Print client during OAuth authentication @@ -5091,21 +7578,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - DiscoveryMaxPrinterLimit - + DiscoveryMaxPrinterLimit + - + Defines the maximum number of printers that should be queried from discovery end point 20 @@ -5113,21 +7600,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - MopriaDiscoveryResourceId - + MopriaDiscoveryResourceId + - + Resource URI for which access is being requested by the Mopria discovery client during OAuth authentication @@ -5135,15 +7622,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -5166,10 +7653,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowTailoredExperiencesWithDiagnosticData - + AllowTailoredExperiencesWithDiagnosticData + - + 1 @@ -5177,21 +7664,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - AllowThirdPartySuggestionsInWindowsSpotlight - + AllowThirdPartySuggestionsInWindowsSpotlight + - + 1 @@ -5199,22 +7686,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsConsumerFeatures - + AllowWindowsConsumerFeatures + - + 0 @@ -5222,22 +7709,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsSpotlight - + AllowWindowsSpotlight + - + 1 @@ -5245,22 +7732,22 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + - AllowWindowsSpotlightOnActionCenter - + AllowWindowsSpotlightOnActionCenter + - + 1 @@ -5268,21 +7755,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - AllowWindowsSpotlightWindowsWelcomeExperience - + AllowWindowsSpotlightWindowsWelcomeExperience + - + 1 @@ -5290,21 +7777,21 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + - ConfigureWindowsSpotlightOnLockScreen - + ConfigureWindowsSpotlightOnLockScreen + - + 1 @@ -5312,16 +7799,16 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + @@ -5344,10 +7831,10 @@ The XML below is the DDF for Windows 10, version 1703. - AddSearchProvider - + AddSearchProvider + - + @@ -5355,25 +7842,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider - + - AllowActiveXFiltering - + AllowActiveXFiltering + - + @@ -5381,25 +7868,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering - + - AllowAddOnList - + AllowAddOnList + - + @@ -5407,25 +7894,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList - + - AllowEnhancedProtectedMode - + AllowAutoComplete + - + @@ -5433,25 +7920,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictFormSuggestPW + + + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage + IZ_PolicyWarnCertMismatch + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteOnExit + + + + AllowEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode - + - AllowEnterpriseModeFromToolsMenu - + AllowEnterpriseModeFromToolsMenu + - + @@ -5459,25 +8024,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable - + - AllowEnterpriseModeSiteList - + AllowEnterpriseModeSiteList + - + @@ -5485,25 +8050,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList - + - AllowInternetExplorer7PolicyList - + AllowInternetExplorer7PolicyList + - + @@ -5511,25 +8076,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList - + - AllowInternetExplorerStandardsMode - + AllowInternetExplorerStandardsMode + - + @@ -5537,25 +8102,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites - + - AllowInternetZoneTemplate - + AllowInternetZoneTemplate + - + @@ -5563,25 +8128,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate - + - AllowIntranetZoneTemplate - + AllowIntranetZoneTemplate + - + @@ -5589,25 +8154,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate - + - AllowLocalMachineZoneTemplate - + AllowLocalMachineZoneTemplate + - + @@ -5615,25 +8180,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate - + - AllowLockedDownInternetZoneTemplate - + AllowLockedDownInternetZoneTemplate + - + @@ -5641,25 +8206,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate - + - AllowLockedDownIntranetZoneTemplate - + AllowLockedDownIntranetZoneTemplate + - + @@ -5667,25 +8232,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate - + - AllowLockedDownLocalMachineZoneTemplate - + AllowLockedDownLocalMachineZoneTemplate + - + @@ -5693,25 +8258,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate - + - AllowLockedDownRestrictedSitesZoneTemplate - + AllowLockedDownRestrictedSitesZoneTemplate + - + @@ -5719,25 +8284,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate - + - AllowOneWordEntry - + AllowOneWordEntry + - + @@ -5745,25 +8310,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry - + - AllowSiteToZoneAssignmentList - + AllowSiteToZoneAssignmentList + - + @@ -5771,25 +8336,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps - + - AllowsLockedDownTrustedSitesZoneTemplate - + AllowsLockedDownTrustedSitesZoneTemplate + - + @@ -5797,25 +8362,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate - + - AllowsRestrictedSitesZoneTemplate - + AllowSoftwareWhenSignatureIsInvalid + - + @@ -5823,25 +8388,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_InvalidSignatureBlock + + + + AllowsRestrictedSitesZoneTemplate + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate - + - AllowSuggestedSites - + AllowSuggestedSites + - + @@ -5849,25 +8440,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites - + - AllowTrustedSitesZoneTemplate - + AllowTrustedSitesZoneTemplate + - + @@ -5875,25 +8466,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate - + - DisableAdobeFlash - + CheckServerCertificateRevocation + - + @@ -5901,25 +8492,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_CertificateRevocation + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DownloadSignatures + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction + IESF_PolicyExplorerProcesses_2 + + + + DisableAdobeFlash + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE - + - DisableBypassOfSmartScreenWarnings - + DisableBlockingOfOutdatedActiveXControls + - + @@ -5927,311 +8596,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - DisableSafetyFilterOverride - - - - DisableBypassOfSmartScreenWarningsAboutUncommonFiles - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - DisableSafetyFilterOverrideForAppRepUnknown - - - - DisableCustomerExperienceImprovementProgramParticipation - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SQM_DisableCEIP - - - - DisableEnclosureDownloading - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~RSS_Feeds - Disable_Downloading_of_Enclosures - - - - DisableEncryptionSupport - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_SetWinInetProtocols - - - - DisableFirstRunWizard - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoFirstRunCustomise - - - - DisableFlipAheadFeature - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_DisableFlipAhead - - - - DisableHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - RestrictHomePage - - - - DisableProxyChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - RestrictProxy - - - - DisableSearchProviderChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoSearchProvider - - - - DisableSecondaryHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SecondaryHomePages - - - - DoNotBlockOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable - + - DoNotBlockOutdatedActiveXControlsOnSpecificDomains - + DisableBypassOfSmartScreenWarnings + - + @@ -6239,25 +8622,545 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverride + + + + DisableBypassOfSmartScreenWarningsAboutUncommonFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisableSafetyFilterOverrideForAppRepUnknown + + + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + RestrictHistory + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + AddonManagement_RestrictCrashDetection + + + + DisableCustomerExperienceImprovementProgramParticipation + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SQM_DisableCEIP + + + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteHistory + + + + DisableEnclosureDownloading + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~RSS_Feeds + Disable_Downloading_of_Enclosures + + + + DisableEncryptionSupport + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_SetWinInetProtocols + + + + DisableFirstRunWizard + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoFirstRunCustomise + + + + DisableFlipAheadFeature + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableFlipAhead + + + + DisableHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictHomePage + + + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL + NoCertError + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy + DisableInPrivateBrowsing + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_EnableEnhancedProtectedMode64Bit + + + + DisableProxyChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + RestrictProxy + + + + DisableSearchProviderChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoSearchProvider + + + + DisableSecondaryHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SecondaryHomePages + + + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Disable_Security_Settings_Check + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableEPMCompat + + + + DoNotBlockOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisable + + + + DoNotBlockOutdatedActiveXControlsOnSpecificDomains + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist - + - IncludeAllLocalSites - + IncludeAllLocalSites + - + @@ -6265,25 +9168,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites - + - IncludeAllNetworkPaths - + IncludeAllNetworkPaths + - + @@ -6291,25 +9194,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet - + - InternetZoneAllowAccessToDataSources - + InternetZoneAllowAccessToDataSources + - + @@ -6317,25 +9220,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 - + - InternetZoneAllowAutomaticPromptingForActiveXControls - + InternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6343,25 +9246,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 - + - InternetZoneAllowAutomaticPromptingForFileDownloads - + InternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6369,25 +9272,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 - + - InternetZoneAllowFontDownloads - + InternetZoneAllowCopyPasteViaScript + - + @@ -6395,25 +9298,77 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowPasteViaScript_1 + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDropOrPasteFiles_1 + + + + InternetZoneAllowFontDownloads + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 - + - InternetZoneAllowLessPrivilegedSites - + InternetZoneAllowLessPrivilegedSites + - + @@ -6421,25 +9376,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 - + - InternetZoneAllowNETFrameworkReliantComponents - + InternetZoneAllowLoadingOfXAMLFilesWRONG + - + @@ -6447,25 +9402,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_XAML_1 + + + + InternetZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - + - InternetZoneAllowScriptlets - + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -6473,25 +9454,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyAllowTDCControl_Both_LocalMachine + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_WebBrowserControl_1 + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyWindowsRestrictionsURLaction_6 + + + + InternetZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 - + - InternetZoneAllowSmartScreenIE - + InternetZoneAllowSmartScreenIE + - + @@ -6499,25 +9584,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 - + - InternetZoneAllowUserDataPersistence - + InternetZoneAllowUpdatesToStatusBarViaScript + - + @@ -6525,25 +9610,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_ScriptStatusBar_1 + + + + InternetZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 - + - InternetZoneInitializeAndScriptActiveXControls - + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + - + @@ -6551,25 +9662,285 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyDownloadSignedActiveX_3 + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadUnsignedActiveX_1 + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyMimeSniffingURLaction_1 + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_Policy_TurnOnProtectedMode_2 + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_LocalPathForUpload_1 + + + + InternetZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 - + - InternetZoneNavigateWindowsAndFrames - + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + - + @@ -6577,25 +9948,155 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXNotMarkedSafe_1 + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyJavaPermissions_1 + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLogon_1 + + + + InternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 - + - IntranetZoneAllowAccessToDataSources - + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + - + @@ -6603,25 +10104,155 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicySignedFrameworkComponentsURLaction_1 + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_UnsafeFiles_1 + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBlockPopupWindows_1 + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyZoneElevationURLaction_1 + + + + IntranetZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 - + - IntranetZoneAllowAutomaticPromptingForActiveXControls - + IntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6629,25 +10260,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 - + - IntranetZoneAllowAutomaticPromptingForFileDownloads - + IntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6655,25 +10286,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 - + - IntranetZoneAllowFontDownloads - + IntranetZoneAllowFontDownloads + - + @@ -6681,25 +10312,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 - + - IntranetZoneAllowLessPrivilegedSites - + IntranetZoneAllowLessPrivilegedSites + - + @@ -6707,25 +10338,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 - + - IntranetZoneAllowNETFrameworkReliantComponents - + IntranetZoneAllowNETFrameworkReliantComponents + - + @@ -6733,25 +10364,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 - + - IntranetZoneAllowScriptlets - + IntranetZoneAllowScriptlets + - + @@ -6759,25 +10390,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 - + - IntranetZoneAllowSmartScreenIE - + IntranetZoneAllowSmartScreenIE + - + @@ -6785,25 +10416,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 - + - IntranetZoneAllowUserDataPersistence - + IntranetZoneAllowUserDataPersistence + - + @@ -6811,25 +10442,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 - + - IntranetZoneInitializeAndScriptActiveXControls - + IntranetZoneInitializeAndScriptActiveXControls + - + @@ -6837,25 +10468,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 - + - IntranetZoneNavigateWindowsAndFrames - + IntranetZoneNavigateWindowsAndFrames + - + @@ -6863,25 +10494,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 - + - LocalMachineZoneAllowAccessToDataSources - + LocalMachineZoneAllowAccessToDataSources + - + @@ -6889,25 +10520,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 - + - LocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -6915,25 +10546,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 - + - LocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -6941,25 +10572,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 - + - LocalMachineZoneAllowFontDownloads - + LocalMachineZoneAllowFontDownloads + - + @@ -6967,25 +10598,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 - + - LocalMachineZoneAllowLessPrivilegedSites - + LocalMachineZoneAllowLessPrivilegedSites + - + @@ -6993,25 +10624,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 - + - LocalMachineZoneAllowNETFrameworkReliantComponents - + LocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -7019,25 +10650,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 - + - LocalMachineZoneAllowScriptlets - + LocalMachineZoneAllowScriptlets + - + @@ -7045,25 +10676,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 - + - LocalMachineZoneAllowSmartScreenIE - + LocalMachineZoneAllowSmartScreenIE + - + @@ -7071,25 +10702,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 - + - LocalMachineZoneAllowUserDataPersistence - + LocalMachineZoneAllowUserDataPersistence + - + @@ -7097,25 +10728,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 - + - LocalMachineZoneInitializeAndScriptActiveXControls - + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -7123,25 +10754,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + + + + LocalMachineZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 - + - LocalMachineZoneNavigateWindowsAndFrames - + LocalMachineZoneJavaPermissions + - + @@ -7149,25 +10806,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyJavaPermissions_9 + + + + LocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 - + - LockedDownInternetZoneAllowAccessToDataSources - + LockedDownInternetZoneAllowAccessToDataSources + - + @@ -7175,25 +10858,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7201,25 +10884,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7227,25 +10910,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 - + - LockedDownInternetZoneAllowFontDownloads - + LockedDownInternetZoneAllowFontDownloads + - + @@ -7253,25 +10936,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 - + - LockedDownInternetZoneAllowLessPrivilegedSites - + LockedDownInternetZoneAllowLessPrivilegedSites + - + @@ -7279,25 +10962,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 - + - LockedDownInternetZoneAllowNETFrameworkReliantComponents - + LockedDownInternetZoneAllowNETFrameworkReliantComponents + - + @@ -7305,25 +10988,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 - + - LockedDownInternetZoneAllowScriptlets - + LockedDownInternetZoneAllowScriptlets + - + @@ -7331,25 +11014,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 - + - LockedDownInternetZoneAllowSmartScreenIE - + LockedDownInternetZoneAllowSmartScreenIE + - + @@ -7357,25 +11040,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 - + - LockedDownInternetZoneAllowUserDataPersistence - + LockedDownInternetZoneAllowUserDataPersistence + - + @@ -7383,25 +11066,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 - + - LockedDownInternetZoneInitializeAndScriptActiveXControls - + LockedDownInternetZoneInitializeAndScriptActiveXControls + - + @@ -7409,25 +11092,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 - + - LockedDownInternetZoneNavigateWindowsAndFrames - + LockedDownInternetZoneJavaPermissions + - + @@ -7435,25 +11118,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_PolicyJavaPermissions_2 + + + + LockedDownInternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 - + - LockedDownIntranetZoneAllowAccessToDataSources - + LockedDownIntranetZoneAllowAccessToDataSources + - + @@ -7461,25 +11170,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7487,25 +11196,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7513,25 +11222,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 - + - LockedDownIntranetZoneAllowFontDownloads - + LockedDownIntranetZoneAllowFontDownloads + - + @@ -7539,25 +11248,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 - + - LockedDownIntranetZoneAllowLessPrivilegedSites - + LockedDownIntranetZoneAllowLessPrivilegedSites + - + @@ -7565,25 +11274,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 - + - LockedDownIntranetZoneAllowNETFrameworkReliantComponents - + LockedDownIntranetZoneAllowNETFrameworkReliantComponents + - + @@ -7591,25 +11300,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 - + - LockedDownIntranetZoneAllowScriptlets - + LockedDownIntranetZoneAllowScriptlets + - + @@ -7617,25 +11326,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 - + - LockedDownIntranetZoneAllowSmartScreenIE - + LockedDownIntranetZoneAllowSmartScreenIE + - + @@ -7643,25 +11352,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 - + - LockedDownIntranetZoneAllowUserDataPersistence - + LockedDownIntranetZoneAllowUserDataPersistence + - + @@ -7669,25 +11378,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 - + - LockedDownIntranetZoneInitializeAndScriptActiveXControls - + LockedDownIntranetZoneInitializeAndScriptActiveXControls + - + @@ -7695,25 +11404,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 - + - LockedDownIntranetZoneNavigateWindowsAndFrames - + LockedDownIntranetZoneNavigateWindowsAndFrames + - + @@ -7721,25 +11430,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 - + - LockedDownLocalMachineZoneAllowAccessToDataSources - + LockedDownLocalMachineZoneAllowAccessToDataSources + - + @@ -7747,25 +11456,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -7773,25 +11482,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -7799,25 +11508,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 - + - LockedDownLocalMachineZoneAllowFontDownloads - + LockedDownLocalMachineZoneAllowFontDownloads + - + @@ -7825,25 +11534,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 - + - LockedDownLocalMachineZoneAllowLessPrivilegedSites - + LockedDownLocalMachineZoneAllowLessPrivilegedSites + - + @@ -7851,25 +11560,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 - + - LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents - + LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -7877,25 +11586,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 - + - LockedDownLocalMachineZoneAllowScriptlets - + LockedDownLocalMachineZoneAllowScriptlets + - + @@ -7903,25 +11612,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 - + - LockedDownLocalMachineZoneAllowSmartScreenIE - + LockedDownLocalMachineZoneAllowSmartScreenIE + - + @@ -7929,25 +11638,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 - + - LockedDownLocalMachineZoneAllowUserDataPersistence - + LockedDownLocalMachineZoneAllowUserDataPersistence + - + @@ -7955,25 +11664,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 - + - LockedDownLocalMachineZoneInitializeAndScriptActiveXControls - + LockedDownLocalMachineZoneInitializeAndScriptActiveXControls + - + @@ -7981,25 +11690,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 - + - LockedDownLocalMachineZoneNavigateWindowsAndFrames - + LockedDownLocalMachineZoneJavaPermissions + - + @@ -8007,25 +11716,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown + IZ_PolicyJavaPermissions_10 + + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 - + - LockedDownRestrictedSitesZoneAllowAccessToDataSources - + LockedDownRestrictedSitesZoneAllowAccessToDataSources + - + @@ -8033,25 +11768,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8059,25 +11794,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8085,25 +11820,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 - + - LockedDownRestrictedSitesZoneAllowFontDownloads - + LockedDownRestrictedSitesZoneAllowFontDownloads + - + @@ -8111,25 +11846,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 - + - LockedDownRestrictedSitesZoneAllowLessPrivilegedSites - + LockedDownRestrictedSitesZoneAllowLessPrivilegedSites + - + @@ -8137,25 +11872,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 - + - LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -8163,25 +11898,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 - + - LockedDownRestrictedSitesZoneAllowScriptlets - + LockedDownRestrictedSitesZoneAllowScriptlets + - + @@ -8189,25 +11924,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 - + - LockedDownRestrictedSitesZoneAllowSmartScreenIE - + LockedDownRestrictedSitesZoneAllowSmartScreenIE + - + @@ -8215,25 +11950,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 - + - LockedDownRestrictedSitesZoneAllowUserDataPersistence - + LockedDownRestrictedSitesZoneAllowUserDataPersistence + - + @@ -8241,25 +11976,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 - + - LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls - + LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls + - + @@ -8267,25 +12002,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 - + - LockedDownRestrictedSitesZoneNavigateWindowsAndFrames - + LockedDownRestrictedSitesZoneJavaPermissions + - + @@ -8293,25 +12028,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown + IZ_PolicyJavaPermissions_8 + + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 - + - LockedDownTrustedSitesZoneAllowAccessToDataSources - + LockedDownTrustedSitesZoneAllowAccessToDataSources + - + @@ -8319,25 +12080,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8345,25 +12106,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8371,25 +12132,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 - + - LockedDownTrustedSitesZoneAllowFontDownloads - + LockedDownTrustedSitesZoneAllowFontDownloads + - + @@ -8397,25 +12158,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 - + - LockedDownTrustedSitesZoneAllowLessPrivilegedSites - + LockedDownTrustedSitesZoneAllowLessPrivilegedSites + - + @@ -8423,25 +12184,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 - + - LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -8449,25 +12210,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 - + - LockedDownTrustedSitesZoneAllowScriptlets - + LockedDownTrustedSitesZoneAllowScriptlets + - + @@ -8475,25 +12236,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 - + - LockedDownTrustedSitesZoneAllowSmartScreenIE - + LockedDownTrustedSitesZoneAllowSmartScreenIE + - + @@ -8501,25 +12262,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 - + - LockedDownTrustedSitesZoneAllowUserDataPersistence - + LockedDownTrustedSitesZoneAllowUserDataPersistence + - + @@ -8527,25 +12288,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 - + - LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls - + LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -8553,25 +12314,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 - + - LockedDownTrustedSitesZoneNavigateWindowsAndFrames - + LockedDownTrustedSitesZoneJavaPermissions + - + @@ -8579,25 +12340,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyJavaPermissions_6 + + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 - + - RestrictedSitesZoneAllowAccessToDataSources - + MimeSniffingSafetyFeatureInternetExplorerProcesses + - + @@ -8605,25 +12392,233 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature + IESF_PolicyExplorerProcesses_6 + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction + IESF_PolicyExplorerProcesses_3 + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar + IESF_PolicyExplorerProcesses_10 + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisablePerUserActiveXInstall + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation + IESF_PolicyAllProcesses_9 + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisableRunThisTime + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall + IESF_PolicyAllProcesses_11 + + + + RestrictedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + RestrictedSitesZoneAllowActiveScripting + - + @@ -8631,25 +12626,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyActiveScripting_1 + + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8657,25 +12678,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 - + - RestrictedSitesZoneAllowFontDownloads - + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + - + @@ -8683,25 +12704,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBinaryBehaviors_1 + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowPasteViaScript_7 + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDropOrPasteFiles_7 + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFileDownload_1 + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - + - RestrictedSitesZoneAllowLessPrivilegedSites - + RestrictedSitesZoneAllowFontDownloadsWRONG2 + - + @@ -8709,25 +12834,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFontDownload_1 + + + + RestrictedSitesZoneAllowLessPrivilegedSites + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 - + - RestrictedSitesZoneAllowNETFrameworkReliantComponents - + RestrictedSitesZoneAllowLoadingOfXAMLFiles + - + @@ -8735,25 +12886,77 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_XAML_7 + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowMETAREFRESH_1 + + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 - + - RestrictedSitesZoneAllowScriptlets - + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -8761,25 +12964,129 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowTDCControl_Both_Restricted + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_WebBrowserControl_7 + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyWindowsRestrictionsURLaction_7 + + + + RestrictedSitesZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 - + - RestrictedSitesZoneAllowSmartScreenIE - + RestrictedSitesZoneAllowSmartScreenIE + - + @@ -8787,25 +13094,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 - + - RestrictedSitesZoneAllowUserDataPersistence - + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + - + @@ -8813,25 +13120,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_ScriptStatusBar_7 + + + + RestrictedSitesZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 - + - RestrictedSitesZoneInitializeAndScriptActiveXControls - + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -8839,25 +13172,207 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadSignedActiveX_7 + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadUnsignedActiveX_7 + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyMimeSniffingURLaction_7 + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_LocalPathForUpload_7 + + + + RestrictedSitesZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 - + - RestrictedSitesZoneNavigateWindowsAndFrames - + RestrictedSitesZoneJavaPermissions + - + @@ -8865,25 +13380,103 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyJavaPermissions_7 + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLogon_7 + + + + RestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 - + - SearchProviderList - + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + - + @@ -8891,25 +13484,311 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyNavigateSubframesAcrossDomains_1 + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyRunActiveXControls_1 + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicySignedFrameworkComponentsURLaction_7 + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXMarkedSafe_1 + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyScriptingOfJavaApplets_6 + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_UnsafeFiles_7 + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_TurnOnProtectedMode_7 + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBlockPopupWindows_7 + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload + IESF_PolicyAllProcesses_12 + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions + IESF_PolicyAllProcesses_8 + + + + SearchProviderList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider - + - TrustedSitesZoneAllowAccessToDataSources - + SpecifyUseOfActiveXInstallerService + - + @@ -8917,25 +13796,51 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + OnlyUseAXISForActiveXInstall + + + + TrustedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 - + - TrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + TrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -8943,25 +13848,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 - + - TrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + TrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -8969,25 +13874,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 - + - TrustedSitesZoneAllowFontDownloads - + TrustedSitesZoneAllowFontDownloads + - + @@ -8995,25 +13900,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 - + - TrustedSitesZoneAllowLessPrivilegedSites - + TrustedSitesZoneAllowLessPrivilegedSites + - + @@ -9021,25 +13926,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 - + - TrustedSitesZoneAllowNETFrameworkReliantComponents - + TrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -9047,25 +13952,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 - + - TrustedSitesZoneAllowScriptlets - + TrustedSitesZoneAllowScriptlets + - + @@ -9073,25 +13978,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 - + - TrustedSitesZoneAllowSmartScreenIE - + TrustedSitesZoneAllowSmartScreenIE + - + @@ -9099,25 +14004,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 - + - TrustedSitesZoneAllowUserDataPersistence - + TrustedSitesZoneAllowUserDataPersistence + - + @@ -9125,25 +14030,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 - + - TrustedSitesZoneInitializeAndScriptActiveXControls - + TrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -9151,25 +14056,25 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 - + - TrustedSitesZoneNavigateWindowsAndFrames - + TrustedSitesZoneJavaPermissions + - + @@ -9177,19 +14082,97 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyJavaPermissions_5 + + + + TrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - + + + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + @@ -9212,10 +14195,10 @@ The XML below is the DDF for Windows 10, version 1703. - DisallowNotificationMirroring - + DisallowNotificationMirroring + - + 0 @@ -9223,15 +14206,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9254,10 +14237,10 @@ The XML below is the DDF for Windows 10, version 1703. - PointAndPrintRestrictions_User - + PointAndPrintRestrictions_User + - + @@ -9265,19 +14248,19 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions - + @@ -9300,10 +14283,10 @@ The XML below is the DDF for Windows 10, version 1703. - ConfigureTaskbarCalendar - + ConfigureTaskbarCalendar + - + 0 @@ -9311,15 +14294,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9342,10 +14325,10 @@ The XML below is the DDF for Windows 10, version 1703. - StartLayout - + StartLayout + - + @@ -9353,16 +14336,16 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain phone - + @@ -9385,10 +14368,10 @@ The XML below is the DDF for Windows 10, version 1703. - AllowTelemetry - + AllowTelemetry + - + 3 @@ -9396,15 +14379,15 @@ The XML below is the DDF for Windows 10, version 1703. - + - + - text/plain + text/plain - + @@ -9659,6 +14642,87 @@ The XML below is the DDF for Windows 10, version 1703. + + AccountPolicies + + + + + + + + + + + + + + + + + + + + + MinDevicePasswordLength + + + + + + + + This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. + + + + + + + + + + + text/plain + + + + + PasswordMustMeetComplexityRequirement + + + + + + + + This security setting determines whether passwords must meet complexity requirements. + +If this policy is enabled, passwords must meet the following minimum requirements: + +Not contain the user's account name or parts of the user's full name that exceed two consecutive characters +Be at least six characters in length +Contain characters from three of the following four categories: +English uppercase characters (A through Z) +English lowercase characters (a through z) +Base 10 digits (0 through 9) +Non-alphabetic characters (for example, !, $, #, %) +Complexity requirements are enforced when passwords are changed or created. + + + + + + + + + + + text/plain + + + + Accounts @@ -10870,6 +15934,30 @@ The XML below is the DDF for Windows 10, version 1703. + + AllowFidoDeviceSignon + + + + + + + + Specifies whether FIDO device can be used to sign on. + + + + + + + + + + + text/plain + + + AllowSecondaryAuthenticationDevice @@ -11449,7 +16537,7 @@ The XML below is the DDF for Windows 10, version 1703. This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. @@ -11760,7 +16848,7 @@ Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. @@ -12072,6 +17160,52 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + Cellular + + + + + + + + + + + + + + + + + + + + + ShowAppCellularAccessUI + + + + + + + + + + + + + + + + + + + text/plain + + + + Connectivity @@ -12285,6 +17419,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DiablePrintingOverHTTP + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableDownloadingOfPrintDriversOverHTTP + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards + + + + + + + + + + + + + + + + + + + text/plain + + + DisallowNetworkConnectivityActiveTests @@ -12333,6 +17539,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ProhibitInstallationAndConfigurationOfNetworkBridge + + + + + + + + + + + + + + + + + + + text/plain + + + CredentialProviders @@ -13017,6 +18247,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AttackSurfaceReductionOnlyExclusions + + + + + + + + + + + + + + + + + + + text/plain + + + + + AttackSurfaceReductionRules + + + + + + + + + + + + + + + + + + + text/plain + + + AvgCPULoadFactor @@ -13041,6 +18319,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + CloudBlockLevel + + + + + + + + + + + + + + + + + + + text/plain + + + + + CloudExtendedTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + DaysToRetainCleanedMalware @@ -13065,6 +18391,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + EnableGuardMyFolders + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableNetworkProtection + + + + + + + + + + + + + + + + + + + text/plain + + + ExcludedExtensions @@ -13137,6 +18511,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + GuardedFoldersAllowedApplications + + + + + + + + + + + + + + + + + + + text/plain + + + + + GuardedFoldersList + + + + + + + + + + + + + + + + + + + text/plain + + + PUAProtection @@ -13760,6 +19182,100 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DeviceGuard + + + + + + + + + + + + + + + + + + + + + EnableVirtualizationBasedSecurity + + + + + + + + Turns On Virtualization Based Security(VBS) + + + + + + + + + + + text/plain + + + + + LsaCfgFlags + + + + + + + + Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if configured previously without UEFI Lock, 1 - Turns on CredentialGuard with UEFI lock. 2 - Turns on CredentialGuard without UEFI lock. + + + + + + + + + + + text/plain + + + + + RequirePlatformSecurityFeatures + + + + + + + + Select Platform Security Level: 1 - Turns on VBS with Secure Boot, 3 - Turns on VBS with Secure Boot and DMA. DMA requires hardware support. + + + + + + + + + + + text/plain + + + + DeviceInstallation @@ -14004,7 +19520,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. @@ -14187,6 +19703,34 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + MinimumPasswordAge + + + + + + + + This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. + +The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. + +Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. + + + + + + + + + + + text/plain + + + PreventLockScreenSlideShow @@ -15063,6 +20607,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowCertificateAddressMismatchWarning + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + + + text/plain + + + AllowEnhancedProtectedMode @@ -15135,6 +20727,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowFallbackToSSL3 + + + + + + + + + + + + + + + + + + + text/plain + + + AllowInternetExplorer7PolicyList @@ -15423,6 +21039,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowSoftwareWhenSignatureIsInvalid + + + + + + + + + + + + + + + + + + + text/plain + + + AllowsRestrictedSitesZoneTemplate @@ -15495,6 +21135,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + CheckServerCertificateRevocation + + + + + + + + + + + + + + + + + + + text/plain + + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + + + text/plain + + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + DisableAdobeFlash @@ -15519,6 +21231,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableBlockingOfOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + DisableBypassOfSmartScreenWarnings @@ -15567,6 +21303,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + + + text/plain + + + DisableCustomerExperienceImprovementProgramParticipation @@ -15591,6 +21375,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + + + text/plain + + + DisableEnclosureDownloading @@ -15687,6 +21495,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DisableProxyChange @@ -15759,6 +21639,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + + + text/plain + + + DisableUpdateCheck @@ -15783,6 +21687,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + DoNotAllowUsersToAddSites @@ -15999,6 +21927,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowFontDownloads @@ -16047,6 +22023,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowLoadingOfXAMLFilesWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowNETFrameworkReliantComponents @@ -16071,6 +22071,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowScriptlets @@ -16119,6 +22215,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneAllowUserDataPersistence @@ -16143,6 +22263,246 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneInitializeAndScriptActiveXControls @@ -16167,6 +22527,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + InternetZoneNavigateWindowsAndFrames @@ -16191,6 +22671,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + + + text/plain + + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + + + text/plain + + + IntranetZoneAllowAccessToDataSources @@ -16671,6 +23271,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneInitializeAndScriptActiveXControls @@ -16695,6 +23319,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LocalMachineZoneNavigateWindowsAndFrames @@ -16959,6 +23607,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownInternetZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownInternetZoneNavigateWindowsAndFrames @@ -17487,6 +24159,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownLocalMachineZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames @@ -17751,6 +24447,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownRestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames @@ -18015,6 +24735,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LockedDownTrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames @@ -18039,6 +24783,198 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + MimeSniffingSafetyFeatureInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + + + text/plain + + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAccessToDataSources @@ -18063,6 +24999,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowActiveScripting + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls @@ -18112,7 +25072,127 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - RestrictedSitesZoneAllowFontDownloads + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowFontDownloadsWRONG2 @@ -18159,6 +25239,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowLoadingOfXAMLFiles + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents @@ -18183,6 +25311,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowScriptlets @@ -18231,6 +25455,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneAllowUserDataPersistence @@ -18255,6 +25503,174 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneInitializeAndScriptActiveXControls @@ -18279,6 +25695,78 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + + + text/plain + + + RestrictedSitesZoneNavigateWindowsAndFrames @@ -18303,6 +25791,270 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + + + text/plain + + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + SearchProviderList @@ -18327,6 +26079,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + SecurityZonesUseOnlyMachineSettings + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneAllowAccessToDataSources @@ -18567,6 +26367,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + TrustedSitesZoneJavaPermissions + + + + + + + + + + + + + + + + + + + text/plain + + + TrustedSitesZoneNavigateWindowsAndFrames @@ -18591,6 +26415,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + + + text/plain + + + Kerberos @@ -18804,6 +26676,897 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LocalPoliciesSecurityOptions + + + + + + + + + + + + + + + + + + + + + Accounts_BlockMicrosoftAccounts + + + + + + + + This policy setting prevents users from adding new Microsoft accounts on this computer. + +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. + +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. + +If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. + + + + + + + + + + + text/plain + + + + + Accounts_EnableAdministratorAccountStatus + + + + + + + + This security setting determines whether the local Administrator account is enabled or disabled. + +Notes + +If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. +Disabling the Administrator account can become a maintenance issue under certain circumstances. + +Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Accounts_EnableGuestAccountStatus + + + + + + + + This security setting determines if the Guest account is enabled or disabled. + +Default: Disabled. + +Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. + + + + + + + + + + + text/plain + + + + + Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly + + + + + + + + Accounts: Limit local account use of blank passwords to console logon only + +This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. + +Default: Enabled. + + +Warning: + +Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. +If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. + +Notes + +This setting does not affect logons that use domain accounts. +It is possible for applications that use remote interactive logons to bypass this setting. + + + + + + + + + + + text/plain + + + + + Accounts_RenameAdministratorAccount + + + + + + + + Accounts: Rename administrator account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. + +Default: Administrator. + + + + + + + + + + + text/plain + + + + + Accounts_RenameGuestAccount + + + + + + + + Accounts: Rename guest account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. + +Default: Guest. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked + + + + + + + + Interactive Logon:Display user information when the session is locked +User display name, domain and user names (1) +User display name only (2) +Do not display user information (3) + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotDisplayLastSignedIn + + + + + + + + Interactive logon: Don't display last signed-in +This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotDisplayUsernameAtSignIn + + + + + + + + Interactive logon: Don't display username at sign-in +This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + Interactivelogon_DoNotRequireCTRLALTDEL + + + + + + + + Interactive logon: Do not require CTRL+ALT+DEL + +This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. + +If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. + +If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. + +Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. +Default on stand-alone computers: Enabled. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MachineInactivityLimit + + + + + + + + Interactive logon: Machine inactivity limit. + +Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. + +Default: not enforced. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTextForUsersAttemptingToLogOn + + + + + + + + Interactive logon: Message text for users attempting to log on + +This security setting specifies a text message that is displayed to users when they log on. + +This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. + +Default: No message. + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTitleForUsersAttemptingToLogOn + + + + + + + + Interactive logon: Message title for users attempting to log on + +This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. + +Default: No message. + + + + + + + + + + + text/plain + + + + + NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares + + + + + + + + Network access: Do not allow anonymous enumeration of SAM accounts and shares + +This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. + +Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares + + + + + + + + Network access: Restrict anonymous access to Named Pipes and Shares + +When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: + +Network access: Named pipes that can be accessed anonymously +Network access: Shares that can be accessed anonymously +Default: Enabled. + + + + + + + + + + + text/plain + + + + + NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM + + + + + + + + Network access: Restrict clients allowed to make remote calls to SAM + +This policy setting allows you to restrict remote rpc connections to SAM. + +If not selected, the default security descriptor will be used. + +This policy is supported on at least Windows Server 2016. + + + + + + + + + + + text/plain + + + + + NetworkSecurity_AllowPKU2UAuthenticationRequests + + + + + + + + Network security: Allow PKU2U authentication requests to this computer to use online identities. + +This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. + + + + + + + + + + + text/plain + + + + + RecoveryConsole_AllowAutomaticAdministrativeLogon + + + + + + + + Recovery console: Allow automatic administrative logon + +This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. + +Default: This policy is not defined and automatic administrative logon is not allowed. + + + + + + + + + + + text/plain + + + + + Shutdown_ClearVirtualMemoryPageFile + + + + + + + + Shutdown: Clear virtual memory pagefile + +This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. + +Virtual memory support uses a system pagefile to swap pages of memory to disk when they are not used. On a running system, this pagefile is opened exclusively by the operating system, and it is well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile is not available to an unauthorized user who manages to directly access the pagefile. + +When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. + +Default: Disabled. + + + + + + + + + + + text/plain + + + + + UserAccountControl_AllowUIAccessApplicationsToPromptForElevation + + + + + + + + User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. + +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. + +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + + + + + + + + + + + text/plain + + + + + UserAccountControl_BehaviorOfTheElevationPromptForAdministrators + + + + + + + + User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +This policy setting controls the behavior of the elevation prompt for administrators. + +The options are: + +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. + +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers + + + + + + + + User Account Control: Behavior of the elevation prompt for standard users +This policy setting controls the behavior of the elevation prompt for standard users. + +The options are: + +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated + + + + + + + + User Account Control: Only elevate executable files that are signed and validated + +This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. + +The options are: + +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. + +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. + + + + + + + + + + + text/plain + + + + + UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + + + + + + + + User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: + +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. + + + + + + + + + + + text/plain + + + + + UserAccountControl_RunAllAdministratorsInAdminApprovalMode + + + + + + + + User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: + +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. + + + + + + + + + + + text/plain + + + + + UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation + + + + + + + + User Account Control: Switch to the secure desktop when prompting for elevation + +This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. + +The options are: + +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. + +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. + + + + + + + + + + + text/plain + + + + + UserAccountControl_UseAdminApprovalMode + + + + + + + + User Account Control: Use Admin Approval Mode for the built-in Administrator account + +This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. + +The options are: + +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. + +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. + + + + + + + + + + + text/plain + + + + + UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations + + + + + + + + User Account Control: Virtualize file and registry write failures to per-user locations + +This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. + +The options are: + +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. + +• Disabled: Applications that write data to protected locations fail. + + + + + + + + + + + text/plain + + + + Location @@ -19319,6 +28082,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + DisplayOffTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisplayOffTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + + + HibernateTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + HibernateTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + RequirePasswordWhenComputerWakesOnBattery @@ -19367,6 +28226,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + StandbyTimeoutOnBattery + + + + + + + + + + + + + + + + + + + text/plain + + + + + StandbyTimeoutPluggedIn + + + + + + + + + + + + + + + + + + + text/plain + + + Printers @@ -19531,6 +28438,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + EnableActivityFeed + + + + + + + + Enables ActivityFeed, which is responsible for mirroring different activity types (as applicable) across device graph of the user. + + + + + + + + + + + text/plain + + + LetAppsAccessAccountInfo @@ -19915,6 +28846,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + LetAppsAccessCellularData + + + + + + + + This policy setting specifies whether Windows apps can access cellular data. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + text/plain + + + LetAppsAccessContacts @@ -21259,6 +30286,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + PublishUserActivities + + + + + + + + Allows apps/system to publish 'User Activities' into ActivityFeed. + + + + + + + + + + + text/plain + + + RemoteAssistance @@ -21544,6 +30595,388 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RemoteManagement + + + + + + + + + + + + + + + + + + + + + AllowBasicAuthentication_Client + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowBasicAuthentication_Service + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCredSSPAuthenticationClient + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowCredSSPAuthenticationService + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowRemoteServerManagement + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowUnencryptedTraffic_Client + + + + + + + + + + + + + + + + + + + text/plain + + + + + AllowUnencryptedTraffic_Service + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowDigestAuthentication + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowNegotiateAuthenticationClient + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowNegotiateAuthenticationService + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowStoringOfRunAsCredentials + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyChannelBindingTokenHardeningLevel + + + + + + + + + + + + + + + + + + + text/plain + + + + + TrustedHosts + + + + + + + + + + + + + + + + + + + text/plain + + + + + TurnOnCompatibilityHTTPListener + + + + + + + + + + + + + + + + + + + text/plain + + + + + TurnOnCompatibilityHTTPSListener + + + + + + + + + + + + + + + + + + + text/plain + + + + RemoteProcedureCall @@ -21614,6 +31047,196 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + RemoteShell + + + + + + + + + + + + + + + + + + + + + AllowRemoteShellAccess + + + + + + + + + + + + + + + + + + + text/plain + + + + + MaxConcurrentUsers + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyIdleTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxMemory + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxProcesses + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyMaxRemoteShells + + + + + + + + + + + + + + + + + + + text/plain + + + + + SpecifyShellTimeout + + + + + + + + + + + + + + + + + + + text/plain + + + + Search @@ -22017,6 +31640,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ClearTPMIfNotReady + + + + + + + + + + + + + + + + + + + text/plain + + + PreventAutomaticDeviceEncryptionForAzureADJoinedDevices @@ -22969,6 +32616,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + HidePeopleBar + + + + + + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + + + + + + + + + + + text/plain + + + HidePowerButton @@ -23550,7 +33221,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. @@ -24087,6 +33758,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowAutoWindowsUpdateDownloadOverMeteredNetwork + + + + + + + + + + + + + + + + + + + text/plain + + + AllowMUUpdateService @@ -24543,6 +34238,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ManageBuildPreview + + + + + + + + + + + + + + + + + + + text/plain + + + PauseDeferrals @@ -24759,6 +34478,126 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + ScheduledInstallEveryWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallFirstWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallFourthWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallSecondWeek + + + + + + + + + + + + + + + + + + + text/plain + + + + + ScheduledInstallThirdWeek + + + + + + + + + + + + + + + + + + + text/plain + + + ScheduledInstallTime @@ -25094,6 +34933,364 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + WindowsDefenderSecurityCenter + + + + + + + + + + + + + + + + + + + + + CompanyName + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableAppBrowserUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableEnhancedNotifications + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableFamilyUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableHealthUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableNetworkUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableNotifications + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisableVirusUI + + + + + + + + + + + + + + + + + + + text/plain + + + + + DisallowExploitProtectionOverride + + + + + + + + + + + + + + + + + + + text/plain + + + + + Email + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableCustomizedToasts + + + + + + + + + + + + + + + + + + + text/plain + + + + + EnableInAppCustomization + + + + + + + + + + + + + + + + + + + text/plain + + + + + Phone + + + + + + + + + + + + + + + + + + + text/plain + + + + + URL + + + + + + + + + + + + + + + + + + + text/plain + + + + WindowsInkWorkspace @@ -25279,6 +35476,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on + + AllowMdnsAdvertisement + + + + + + + + This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. + + + + + + + + + + + text/plain + + + + + AllowMdnsDiscovery + + + + + + + + This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. + + + + + + + + + + + text/plain + + + AllowProjectionFromPC @@ -25474,10 +35719,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowActionCenterNotifications - + AllowActionCenterNotifications + - + 1 @@ -25485,22 +35730,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCortanaAboveLock - + AllowCortanaAboveLock + - + 1 @@ -25508,21 +35753,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowToasts - + AllowToasts + - + 1 @@ -25530,15 +35775,92 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + AccountPolicies + + + + + + + + + + + + + + + + + + + MinDevicePasswordLength + + + + + This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. + 7 + + + + + + + + + + + text/plain + + phone + + + + PasswordMustMeetComplexityRequirement + + + + + This security setting determines whether passwords must meet complexity requirements. + +If this policy is enabled, passwords must meet the following minimum requirements: + +Not contain the user's account name or parts of the user's full name that exceed two consecutive characters +Be at least six characters in length +Contain characters from three of the following four categories: +English uppercase characters (A through Z) +English lowercase characters (a through z) +Base 10 digits (0 through 9) +Non-alphabetic characters (for example, !, $, #, %) +Complexity requirements are enforced when passwords are changed or created. + 0 + + + + + + + + + + + text/plain + + phone + @@ -25561,10 +35883,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddingNonMicrosoftAccountsManually - + AllowAddingNonMicrosoftAccountsManually + - + 1 @@ -25572,21 +35894,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftAccountConnection - + AllowMicrosoftAccountConnection + - + 1 @@ -25594,21 +35916,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftAccountSignInAssistant - + AllowMicrosoftAccountSignInAssistant + - + 1 @@ -25616,21 +35938,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DomainNamesForEmailSync - + DomainNamesForEmailSync + - + @@ -25638,15 +35960,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -25669,10 +35991,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ApprovedInstallationSites - + ApprovedInstallationSites + - + @@ -25680,19 +36002,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ActiveXInstallService.admx ActiveXInstallService~AT~WindowsComponents~AxInstSv ApprovedActiveXInstallSites - + @@ -25715,10 +36037,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DefaultAssociationsConfiguration - + DefaultAssociationsConfiguration + - + @@ -25726,16 +36048,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -25758,10 +36080,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAllTrustedApps - + AllowAllTrustedApps + - + 65535 @@ -25769,21 +36091,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowAppStoreAutoUpdate - + AllowAppStoreAutoUpdate + - + 2 @@ -25791,21 +36113,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeveloperUnlock - + AllowDeveloperUnlock + - + 65535 @@ -25813,21 +36135,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowGameDVR - + AllowGameDVR + - + 1 @@ -25835,22 +36157,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowSharedUserAppData - + AllowSharedUserAppData + - + 0 @@ -25858,21 +36180,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStore - + AllowStore + - + 1 @@ -25880,22 +36202,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - ApplicationRestrictions - + ApplicationRestrictions + - + @@ -25903,22 +36225,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - DisableStoreOriginatedApps - + DisableStoreOriginatedApps + - + 0 @@ -25926,21 +36248,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RestrictAppDataToSystemVolume - + RestrictAppDataToSystemVolume + - + 0 @@ -25948,21 +36270,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RestrictAppToSystemVolume - + RestrictAppToSystemVolume + - + 0 @@ -25970,15 +36292,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26001,10 +36323,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAppVClient - + AllowAppVClient + - + @@ -26012,25 +36334,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV EnableAppV - + - AllowDynamicVirtualization - + AllowDynamicVirtualization + - + @@ -26038,25 +36360,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVEnable - + - AllowPackageCleanup - + AllowPackageCleanup + - + @@ -26064,25 +36386,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_PackageManagement PackageManagement_AutoCleanupEnable - + - AllowPackageScripts - + AllowPackageScripts + - + @@ -26090,25 +36412,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Scripting Scripting_Enable_Package_Scripts - + - AllowPublishingRefreshUX - + AllowPublishingRefreshUX + - + @@ -26116,25 +36438,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Enable_Publishing_Refresh_UX - + - AllowReportingServer - + AllowReportingServer + - + @@ -26142,25 +36464,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Reporting Reporting_Server_Policy - + - AllowRoamingFileExclusions - + AllowRoamingFileExclusions + - + @@ -26168,25 +36490,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_File_Exclusions - + - AllowRoamingRegistryExclusions - + AllowRoamingRegistryExclusions + - + @@ -26194,25 +36516,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Roaming_Registry_Exclusions - + - AllowStreamingAutoload - + AllowStreamingAutoload + - + @@ -26220,25 +36542,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Steaming_Autoload - + - ClientCoexistenceAllowMigrationmode - + ClientCoexistenceAllowMigrationmode + - + @@ -26246,25 +36568,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Client_Coexistence Client_Coexistence_Enable_Migration_mode - + - IntegrationAllowRootGlobal - + IntegrationAllowRootGlobal + - + @@ -26272,25 +36594,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_User - + - IntegrationAllowRootUser - + IntegrationAllowRootUser + - + @@ -26298,25 +36620,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Integration Integration_Root_Global - + - PublishingAllowServer1 - + PublishingAllowServer1 + - + @@ -26324,25 +36646,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server1_Policy - + - PublishingAllowServer2 - + PublishingAllowServer2 + - + @@ -26350,25 +36672,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server2_Policy - + - PublishingAllowServer3 - + PublishingAllowServer3 + - + @@ -26376,25 +36698,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server3_Policy - + - PublishingAllowServer4 - + PublishingAllowServer4 + - + @@ -26402,25 +36724,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server4_Policy - + - PublishingAllowServer5 - + PublishingAllowServer5 + - + @@ -26428,25 +36750,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Publishing Publishing_Server5_Policy - + - StreamingAllowCertificateFilterForClient_SSL - + StreamingAllowCertificateFilterForClient_SSL + - + @@ -26454,25 +36776,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Certificate_Filter_For_Client_SSL - + - StreamingAllowHighCostLaunch - + StreamingAllowHighCostLaunch + - + @@ -26480,25 +36802,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Allow_High_Cost_Launch - + - StreamingAllowLocationProvider - + StreamingAllowLocationProvider + - + @@ -26506,25 +36828,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Location_Provider - + - StreamingAllowPackageInstallationRoot - + StreamingAllowPackageInstallationRoot + - + @@ -26532,25 +36854,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Installation_Root - + - StreamingAllowPackageSourceRoot - + StreamingAllowPackageSourceRoot + - + @@ -26558,25 +36880,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Package_Source_Root - + - StreamingAllowReestablishmentInterval - + StreamingAllowReestablishmentInterval + - + @@ -26584,25 +36906,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Interval - + - StreamingAllowReestablishmentRetries - + StreamingAllowReestablishmentRetries + - + @@ -26610,25 +36932,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Reestablishment_Retries - + - StreamingSharedContentStoreMode - + StreamingSharedContentStoreMode + - + @@ -26636,25 +36958,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Shared_Content_Store_Mode - + - StreamingSupportBranchCache - + StreamingSupportBranchCache + - + @@ -26662,25 +36984,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Support_Branch_Cache - + - StreamingVerifyCertificateRevocationList - + StreamingVerifyCertificateRevocationList + - + @@ -26688,25 +37010,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Streaming Streaming_Verify_Certificate_Revocation_List - + - VirtualComponentsAllowList - + VirtualComponentsAllowList + - + @@ -26714,19 +37036,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone appv.admx appv~AT~System~CAT_AppV~CAT_Virtualization Virtualization_JITVAllowList - + @@ -26749,10 +37071,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowFastReconnect - + AllowFastReconnect + - + 1 @@ -26760,21 +37082,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSecondaryAuthenticationDevice - + AllowFidoDeviceSignon + - + + + Specifies whether FIDO device can be used to sign on. + 0 + + + + + + + + + + + text/plain + + phone + + + + AllowSecondaryAuthenticationDevice + + + 0 @@ -26782,15 +37127,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26813,10 +37158,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisallowAutoplayForNonVolumeDevices - + DisallowAutoplayForNonVolumeDevices + - + @@ -26824,25 +37169,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutoplayfornonVolume - + - SetDefaultAutoRunBehavior - + SetDefaultAutoRunBehavior + - + @@ -26850,25 +37195,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay NoAutorun - + - TurnOffAutoPlay - + TurnOffAutoPlay + - + @@ -26876,19 +37221,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone AutoPlay.admx AutoPlay~AT~WindowsComponents~AutoPlay Autorun - + @@ -26911,10 +37256,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EncryptionMethod - + EncryptionMethod + - + 6 @@ -26922,15 +37267,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -26953,10 +37298,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAdvertising - + AllowAdvertising + - + 1 @@ -26964,21 +37309,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDiscoverableMode - + AllowDiscoverableMode + - + 1 @@ -26986,21 +37331,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowPrepairing - + AllowPrepairing + - + 1 @@ -27008,21 +37353,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LocalDeviceName - + LocalDeviceName + - + @@ -27030,21 +37375,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ServicesAllowedList - + ServicesAllowedList + - + @@ -27052,15 +37397,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -27083,10 +37428,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddressBarDropdown - + AllowAddressBarDropdown + - + This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. 1 @@ -27094,22 +37439,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowAutofill - + AllowAutofill + - + This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge. 0 @@ -27117,21 +37462,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowBrowser - + AllowBrowser + - + 1 @@ -27139,22 +37484,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCookies - + AllowCookies + - + This setting lets you configure how your company deals with cookies. 2 @@ -27162,21 +37507,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeveloperTools - + AllowDeveloperTools + - + This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge. 1 @@ -27184,22 +37529,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowDoNotTrack - + AllowDoNotTrack + - + This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info. 0 @@ -27207,21 +37552,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowExtensions - + AllowExtensions + - + This setting lets you decide whether employees can load extensions in Microsoft Edge. 1 @@ -27229,22 +37574,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFlash - + AllowFlash + - + This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge. 1 @@ -27252,22 +37597,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFlashClickToRun - + AllowFlashClickToRun + - + Configure the Adobe Flash Click-to-Run setting. 1 @@ -27275,22 +37620,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowInPrivate - + AllowInPrivate + - + This setting lets you decide whether employees can browse using InPrivate website browsing. 1 @@ -27298,25 +37643,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMicrosoftCompatibilityList - + AllowMicrosoftCompatibilityList + - + This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat. -If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. +If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly. If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation. 1 @@ -27324,21 +37669,21 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain - + - AllowPasswordManager - + AllowPasswordManager + - + This setting lets you decide whether employees can save their passwords locally, using Password Manager. 1 @@ -27346,21 +37691,21 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain - + - AllowPopups - + AllowPopups + - + This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows. 0 @@ -27368,22 +37713,22 @@ If you disable this setting, the Microsoft Compatibility List will not be used d - + - + - text/plain + text/plain phone - + - AllowSearchEngineCustomization - + AllowSearchEngineCustomization + - + Allow search engine customization for MDM enrolled devices. Users can change their default search engine. @@ -27396,21 +37741,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - AllowSearchSuggestionsinAddressBar - + AllowSearchSuggestionsinAddressBar + - + This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge. 1 @@ -27418,21 +37763,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - AllowSmartScreen - + AllowSmartScreen + - + This setting lets you decide whether to turn on Windows Defender SmartScreen. 1 @@ -27440,21 +37785,21 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain - + - ClearBrowsingDataOnExit - + ClearBrowsingDataOnExit + - + Specifies whether to always clear browsing history on exiting Microsoft Edge. 0 @@ -27462,22 +37807,22 @@ This policy will only apply on domain joined machines or when the device is MDM - + - + - text/plain + text/plain phone - + - ConfigureAdditionalSearchEngines - + ConfigureAdditionalSearchEngines + - + Allows you to add up to 5 additional search engines for MDM-enrolled devices. @@ -27491,21 +37836,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableLockdownOfStartPages - + DisableLockdownOfStartPages + - + Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect. @@ -27518,22 +37863,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - EnterpriseModeSiteList - + EnterpriseModeSiteList + - + This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites. @@ -27541,22 +37886,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - EnterpriseSiteListServiceUrl - + EnterpriseSiteListServiceUrl + - + @@ -27564,22 +37909,22 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain phone - + - FirstRunURL - + FirstRunURL + - + Configure first run URL. @@ -27587,50 +37932,50 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo - + - + - text/plain + text/plain desktop - + - HomePages - + HomePages + - + Configure the Start page URLs for your employees. Example: If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support. Encapsulate each string with greater than and less than characters like any other XML tag. -Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. +Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL. - + - + - text/plain + text/plain phone - + - PreventAccessToAboutFlagsInMicrosoftEdge - + PreventAccessToAboutFlagsInMicrosoftEdge + - + Prevent access to the about:flags page in Microsoft Edge. 0 @@ -27638,21 +37983,21 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, you ca - + - + - text/plain + text/plain - + - PreventFirstRunPage - + PreventFirstRunPage + - + Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop. @@ -27662,22 +38007,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - PreventLiveTileDataCollection - + PreventLiveTileDataCollection + - + This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu. @@ -27687,34 +38032,32 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + PreventSmartScreenPromptOverride - - - Don't allow Windows Defender SmartScreen warning overrides + 0 - + - + text/plain @@ -27725,20 +38068,18 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on PreventSmartScreenPromptOverrideForFiles - - - Don't allow Windows Defender SmartScreen warning overrides for unverified files. + 0 - + - + text/plain @@ -27746,10 +38087,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PreventUsingLocalHostIPAddressForWebRTC - + PreventUsingLocalHostIPAddressForWebRTC + - + Prevent using localhost IP address for WebRTC 0 @@ -27757,21 +38098,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SendIntranetTraffictoInternetExplorer - + SendIntranetTraffictoInternetExplorer + - + Sends all intranet traffic over to Internet Explorer. 0 @@ -27779,22 +38120,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SetDefaultSearchEngine - + SetDefaultSearchEngine + - + Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine. @@ -27808,21 +38149,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ShowMessageWhenOpeningSitesInInternetExplorer - + ShowMessageWhenOpeningSitesInInternetExplorer + - + Show message when opening sites in Internet Explorer 0 @@ -27830,22 +38171,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SyncFavoritesBetweenIEAndMicrosoftEdge - + SyncFavoritesBetweenIEAndMicrosoftEdge + - + Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. 0 @@ -27853,16 +38194,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -27885,10 +38226,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowCamera - + AllowCamera + - + 1 @@ -27896,15 +38237,60 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + Cellular + + + + + + + + + + + + + + + + + + + ShowAppCellularAccessUI + + + + + + + + + + + + + + + + + text/plain + + wwansvc.admx + wwansvc~AT~Network~WwanSvc_Category~UISettings_Category + ShowAppCellularAccessUI + @@ -27927,10 +38313,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowBluetooth - + AllowBluetooth + - + 2 @@ -27938,21 +38324,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowCellularData - + AllowCellularData + - + 1 @@ -27960,21 +38346,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowCellularDataRoaming - + AllowCellularDataRoaming + - + 1 @@ -27982,21 +38368,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowConnectedDevices - + AllowConnectedDevices + - + 1 @@ -28004,21 +38390,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowNFC - + AllowNFC + - + 1 @@ -28026,22 +38412,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowUSBConnection - + AllowUSBConnection + - + 1 @@ -28049,22 +38435,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowVPNOverCellular - + AllowVPNOverCellular + - + 1 @@ -28072,21 +38458,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowVPNRoamingOverCellular - + AllowVPNRoamingOverCellular + - + 1 @@ -28094,43 +38480,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisallowNetworkConnectivityActiveTests - + DiablePrintingOverHTTP + - - - - 0 - - - - - - - - - - - text/plain - - - - - HardenedUNCPaths - - - + @@ -28138,19 +38502,145 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + DisableHTTPPrinting_2 + + + + DisableDownloadingOfPrintDriversOverHTTP + + + + + + + + + + + + + + + + + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + DisableWebPnPDownload_2 + + + + DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards + + + + + + + + + + + + + + + + + text/plain + + phone + ICM.admx + ICM~AT~System~InternetManagement~InternetManagement_Settings + ShellPreventWPWDownload_2 + + + + DisallowNetworkConnectivityActiveTests + + + + + + 0 + + + + + + + + + + + text/plain + + + + + HardenedUNCPaths + + + + + + + + + + + + + + + + + text/plain phone networkprovider.admx NetworkProvider~AT~Network~Cat_NetworkProvider Pol_HardenedPaths - + + + + ProhibitInstallationAndConfigurationOfNetworkBridge + + + + + + + + + + + + + + + + + text/plain + + phone + NetworkConnections.admx + NetworkConnections~AT~Network~NetworkConnections + NC_AllowNetBridge_NLA + @@ -28173,10 +38663,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowPINLogon - + AllowPINLogon + - + @@ -28184,25 +38674,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credentialproviders.admx CredentialProviders~AT~System~Logon AllowDomainPINLogon - + - BlockPicturePassword - + BlockPicturePassword + - + @@ -28210,19 +38700,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credentialproviders.admx CredentialProviders~AT~System~Logon BlockDomainPicturePassword - + @@ -28245,10 +38735,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisablePasswordReveal - + DisablePasswordReveal + - + @@ -28256,25 +38746,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI DisablePasswordReveal - + - EnumerateAdministrators - + EnumerateAdministrators + - + @@ -28282,19 +38772,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone credui.admx CredUI~AT~WindowsComponents~CredUI EnumerateAdministrators - + @@ -28317,10 +38807,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowFipsAlgorithmPolicy - + AllowFipsAlgorithmPolicy + - + 0 @@ -28328,21 +38818,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - TLSCipherSuites - + TLSCipherSuites + - + @@ -28350,15 +38840,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -28381,10 +38871,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowDirectMemoryAccess - + AllowDirectMemoryAccess + - + 1 @@ -28392,21 +38882,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LegacySelectiveWipeID - + LegacySelectiveWipeID + - + @@ -28414,15 +38904,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -28445,10 +38935,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - SetCost3G - + SetCost3G + - + @@ -28456,24 +38946,24 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost3G - + - SetCost4G - + SetCost4G + - + @@ -28481,18 +38971,18 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain wwansvc.admx wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category SetCost4G - + @@ -28515,10 +39005,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowArchiveScanning - + AllowArchiveScanning + - + 1 @@ -28526,22 +39016,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowBehaviorMonitoring - + AllowBehaviorMonitoring + - + 1 @@ -28549,22 +39039,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowCloudProtection - + AllowCloudProtection + - + 1 @@ -28572,22 +39062,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowEmailScanning - + AllowEmailScanning + - + 0 @@ -28595,22 +39085,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFullScanOnMappedNetworkDrives - + AllowFullScanOnMappedNetworkDrives + - + 0 @@ -28618,22 +39108,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowFullScanRemovableDriveScanning - + AllowFullScanRemovableDriveScanning + - + 1 @@ -28641,22 +39131,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIntrusionPreventionSystem - + AllowIntrusionPreventionSystem + - + 1 @@ -28664,22 +39154,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIOAVProtection - + AllowIOAVProtection + - + 1 @@ -28687,22 +39177,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowOnAccessProtection - + AllowOnAccessProtection + - + 1 @@ -28710,22 +39200,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowRealtimeMonitoring - + AllowRealtimeMonitoring + - + 1 @@ -28733,22 +39223,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowScanningNetworkFiles - + AllowScanningNetworkFiles + - + 0 @@ -28756,22 +39246,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowScriptScanning - + AllowScriptScanning + - + 1 @@ -28779,22 +39269,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowUserUIAccess - + AllowUserUIAccess + - + 1 @@ -28802,22 +39292,68 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AvgCPULoadFactor - + AttackSurfaceReductionOnlyExclusions + - + + + + + + + + + + + + + + + text/plain + + phone + + + + AttackSurfaceReductionRules + + + + + + + + + + + + + + + + + text/plain + + phone + + + + AvgCPULoadFactor + + + 50 @@ -28825,22 +39361,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DaysToRetainCleanedMalware - + CloudBlockLevel + - + 0 @@ -28848,91 +39384,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludedExtensions - + CloudExtendedTimeout + - - - - - - - - - - - - - - - text/plain - - phone - - - - ExcludedPaths - - - - - - - - - - - - - - - - - text/plain - - phone - - - - ExcludedProcesses - - - - - - - - - - - - - - - - - text/plain - - phone - - - - PUAProtection - - - + 0 @@ -28940,22 +39407,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - RealTimeScanDirection - + DaysToRetainCleanedMalware + - + 0 @@ -28963,22 +39430,229 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScanParameter - + EnableGuardMyFolders + - + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + EnableNetworkProtection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + ExcludedExtensions + + + + + + + + + + + + + + + + + text/plain + + phone + + + + ExcludedPaths + + + + + + + + + + + + + + + + + text/plain + + phone + + + + ExcludedProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + + + + GuardedFoldersAllowedApplications + + + + + + + + + + + + + + + + + text/plain + + phone + + + + GuardedFoldersList + + + + + + + + + + + + + + + + + text/plain + + phone + + + + PUAProtection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + RealTimeScanDirection + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + ScanParameter + + + 1 @@ -28986,22 +39660,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleQuickScanTime - + ScheduleQuickScanTime + - + 120 @@ -29009,22 +39683,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleScanDay - + ScheduleScanDay + - + 0 @@ -29032,22 +39706,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ScheduleScanTime - + ScheduleScanTime + - + 120 @@ -29055,22 +39729,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SignatureUpdateInterval - + SignatureUpdateInterval + - + 8 @@ -29078,22 +39752,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - SubmitSamplesConsent - + SubmitSamplesConsent + - + 1 @@ -29101,22 +39775,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ThreatSeverityDefaultAction - + ThreatSeverityDefaultAction + - + @@ -29124,16 +39798,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -29156,10 +39830,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DOAbsoluteMaxCacheSize - + DOAbsoluteMaxCacheSize + - + 10 @@ -29167,22 +39841,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOAllowVPNPeerCaching - + DOAllowVPNPeerCaching + - + 0 @@ -29190,22 +39864,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DODownloadMode - + DODownloadMode + - + 1 @@ -29213,22 +39887,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOGroupId - + DOGroupId + - + @@ -29236,22 +39910,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxCacheAge - + DOMaxCacheAge + - + 259200 @@ -29259,22 +39933,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxCacheSize - + DOMaxCacheSize + - + 20 @@ -29282,22 +39956,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxDownloadBandwidth - + DOMaxDownloadBandwidth + - + 0 @@ -29305,22 +39979,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMaxUploadBandwidth - + DOMaxUploadBandwidth + - + 0 @@ -29328,22 +40002,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinBackgroundQos - + DOMinBackgroundQos + - + 500 @@ -29351,22 +40025,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinBatteryPercentageAllowedToUpload - + DOMinBatteryPercentageAllowedToUpload + - + 0 @@ -29374,22 +40048,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinDiskSizeAllowedToPeer - + DOMinDiskSizeAllowedToPeer + - + 32 @@ -29397,22 +40071,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinFileSizeToCache - + DOMinFileSizeToCache + - + 100 @@ -29420,22 +40094,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMinRAMAllowedToPeer - + DOMinRAMAllowedToPeer + - + 4 @@ -29443,22 +40117,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOModifyCacheDrive - + DOModifyCacheDrive + - + %SystemDrive% @@ -29466,22 +40140,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOMonthlyUploadDataCap - + DOMonthlyUploadDataCap + - + 20 @@ -29489,22 +40163,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DOPercentageMaxDownloadBandwidth - + DOPercentageMaxDownloadBandwidth + - + 0 @@ -29512,16 +40186,105 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + + + + + DeviceGuard + + + + + + + + + + + + + + + + + + + EnableVirtualizationBasedSecurity + + + + + Turns On Virtualization Based Security(VBS) + 0 + + + + + + + + + + + text/plain + + phone + + + + LsaCfgFlags + + + + + Credential Guard Configuration: 0 - Turns off CredentialGuard remotely if configured previously without UEFI Lock, 1 - Turns on CredentialGuard with UEFI lock. 2 - Turns on CredentialGuard without UEFI lock. + 0 + + + + + + + + + + + text/plain + + phone + + + + RequirePlatformSecurityFeatures + + + + + Select Platform Security Level: 1 - Turns on VBS with Secure Boot, 3 - Turns on VBS with Secure Boot and DMA. DMA requires hardware support. + 1 + + + + + + + + + + + text/plain + + phone + @@ -29544,10 +40307,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PreventInstallationOfMatchingDeviceIDs - + PreventInstallationOfMatchingDeviceIDs + - + @@ -29555,25 +40318,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_IDs_Deny - + - PreventInstallationOfMatchingDeviceSetupClasses - + PreventInstallationOfMatchingDeviceSetupClasses + - + @@ -29581,19 +40344,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone deviceinstallation.admx DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category DeviceInstall_Classes_Deny - + @@ -29616,10 +40379,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIdleReturnWithoutPassword - + AllowIdleReturnWithoutPassword + - + Specifies whether the user must input a PIN or password when the device resumes from an idle state. 1 @@ -29627,22 +40390,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowScreenTimeoutWhileLockedUserConfig - + AllowScreenTimeoutWhileLockedUserConfig + - + Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. 0 @@ -29650,21 +40413,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSimpleDevicePassword - + AllowSimpleDevicePassword + - + Specifies whether PINs or passwords such as 1111 or 1234 are allowed. For the desktop, it also controls the use of picture passwords. 1 @@ -29672,21 +40435,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AlphanumericDevicePasswordRequired - + AlphanumericDevicePasswordRequired + - + Determines the type of PIN or password required. This policy only applies if the DeviceLock/DevicePasswordEnabled policy is set to 0 2 @@ -29694,21 +40457,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordEnabled - + DevicePasswordEnabled + - + Specifies whether device lock is enabled. 1 @@ -29716,21 +40479,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordExpiration - + DevicePasswordExpiration + - + Specifies when the password expires (in days). 0 @@ -29738,43 +40501,43 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DevicePasswordHistory - + DevicePasswordHistory + - + - Specifies how many passwords can be stored in the history that can’t be used. + Specifies how many passwords can be stored in the history that can’t be used. 0 - + - + - text/plain + text/plain - + - EnforceLockScreenAndLogonImage - + EnforceLockScreenAndLogonImage + - + @@ -29782,22 +40545,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - EnforceLockScreenProvider - + EnforceLockScreenProvider + - + @@ -29805,21 +40568,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxDevicePasswordFailedAttempts - + MaxDevicePasswordFailedAttempts + - + 0 @@ -29827,21 +40590,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxInactivityTimeDeviceLock - + MaxInactivityTimeDeviceLock + - + The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. 0 @@ -29849,21 +40612,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MaxInactivityTimeDeviceLockWithExternalDisplay - + MaxInactivityTimeDeviceLockWithExternalDisplay + - + Sets the maximum timeout value for the external display. 0 @@ -29871,22 +40634,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - MinDevicePasswordComplexCharacters - + MinDevicePasswordComplexCharacters + - + The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. 1 @@ -29894,21 +40657,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - MinDevicePasswordLength - + MinDevicePasswordLength + - + Specifies the minimum number or characters required in the PIN or password. 4 @@ -29916,21 +40679,48 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventLockScreenSlideShow - + MinimumPasswordAge + - + + + This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. + +The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. + +Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. + 1 + + + + + + + + + + + text/plain + + phone + + + + PreventLockScreenSlideShow + + + @@ -29938,25 +40728,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ControlPanelDisplay.admx ControlPanelDisplay~AT~ControlPanel~Personalization CPL_Personalization_NoLockScreenSlideshow - + - ScreenTimeoutWhileLocked - + ScreenTimeoutWhileLocked + - + Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. 10 @@ -29964,15 +40754,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -29995,10 +40785,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - TurnOffGdiDPIScalingForApps - + TurnOffGdiDPIScalingForApps + - + This policy allows to force turn off GDI DPI Scaling for a semicolon separated list of applications. Applications can be specified either by using full path or just filename and extension. @@ -30006,22 +40796,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - TurnOnGdiDPIScalingForApps - + TurnOnGdiDPIScalingForApps + - + This policy allows to turn on GDI DPI Scaling for a semicolon separated list of applications. Applications can be specified either by using full path or just filename and extension. @@ -30029,16 +40819,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -30061,10 +40851,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - CustomizeConsentSettings - + CustomizeConsentSettings + - + @@ -30072,25 +40862,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerConsentCustomize_2 - + - DisableWindowsErrorReporting - + DisableWindowsErrorReporting + - + @@ -30098,25 +40888,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDisable_2 - + - DisplayErrorNotification - + DisplayErrorNotification + - + @@ -30124,25 +40914,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting PCH_ShowUI - + - DoNotSendAdditionalData - + DoNotSendAdditionalData + - + @@ -30150,25 +40940,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerNoSecondLevelData_2 - + - PreventCriticalErrorDisplay - + PreventCriticalErrorDisplay + - + @@ -30176,19 +40966,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone ErrorReporting.admx ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting WerDoNotShowUI - + @@ -30211,10 +41001,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ControlEventLogBehavior - + ControlEventLogBehavior + - + @@ -30222,25 +41012,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_Log_Retention_1 - + - SpecifyMaximumFileSizeApplicationLog - + SpecifyMaximumFileSizeApplicationLog + - + @@ -30248,25 +41038,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application Channel_LogMaxSize_1 - + - SpecifyMaximumFileSizeSecurityLog - + SpecifyMaximumFileSizeSecurityLog + - + @@ -30274,25 +41064,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Security Channel_LogMaxSize_2 - + - SpecifyMaximumFileSizeSystemLog - + SpecifyMaximumFileSizeSystemLog + - + @@ -30300,19 +41090,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone eventlog.admx EventLog~AT~WindowsComponents~EventLogCategory~EventLog_System Channel_LogMaxSize_4 - + @@ -30335,10 +41125,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowCopyPaste - + AllowCopyPaste + - + 1 @@ -30346,22 +41136,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowCortana - + AllowCortana + - + 1 @@ -30369,21 +41159,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDeviceDiscovery - + AllowDeviceDiscovery + - + 1 @@ -30391,21 +41181,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowFindMyDevice - + AllowFindMyDevice + - + 1 @@ -30413,21 +41203,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualMDMUnenrollment - + AllowManualMDMUnenrollment + - + 1 @@ -30435,21 +41225,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSaveAsOfOfficeFiles - + AllowSaveAsOfOfficeFiles + - + 1 @@ -30457,21 +41247,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowScreenCapture - + AllowScreenCapture + - + 1 @@ -30479,21 +41269,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSharingOfOfficeFiles - + AllowSharingOfOfficeFiles + - + 1 @@ -30501,21 +41291,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSIMErrorDialogPromptWhenNoSIM - + AllowSIMErrorDialogPromptWhenNoSIM + - + 1 @@ -30523,21 +41313,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSyncMySettings - + AllowSyncMySettings + - + 1 @@ -30545,21 +41335,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowTaskSwitcher - + AllowTaskSwitcher + - + 1 @@ -30567,22 +41357,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowVoiceRecording - + AllowVoiceRecording + - + 1 @@ -30590,22 +41380,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowWindowsTips - + AllowWindowsTips + - + 1 @@ -30613,22 +41403,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DoNotShowFeedbackNotifications - + DoNotShowFeedbackNotifications + - + 0 @@ -30636,15 +41426,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -30667,10 +41457,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAdvancedGamingServices - + AllowAdvancedGamingServices + - + Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. 1 @@ -30678,15 +41468,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -30709,10 +41499,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AddSearchProvider - + AddSearchProvider + - + @@ -30720,25 +41510,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer AddSearchProvider - + - AllowActiveXFiltering - + AllowActiveXFiltering + - + @@ -30746,25 +41536,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer TurnOnActiveXFiltering - + - AllowAddOnList - + AllowAddOnList + - + @@ -30772,25 +41562,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement AddonManagement_AddOnList - + - AllowEnhancedProtectedMode - + AllowCertificateAddressMismatchWarning + - + @@ -30798,25 +41588,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage + IZ_PolicyWarnCertMismatch + + + + AllowDeletingBrowsingHistoryOnExit + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteOnExit + + + + AllowEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage Advanced_EnableEnhancedProtectedMode - + - AllowEnterpriseModeFromToolsMenu - + AllowEnterpriseModeFromToolsMenu + - + @@ -30824,25 +41666,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeEnable - + - AllowEnterpriseModeSiteList - + AllowEnterpriseModeSiteList + - + @@ -30850,25 +41692,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnterpriseModeSiteList - + - AllowInternetExplorer7PolicyList - + AllowFallbackToSSL3 + - + @@ -30876,25 +41718,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures + Advanced_EnableSSL3Fallback + + + + AllowInternetExplorer7PolicyList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_UsePolicyList - + - AllowInternetExplorerStandardsMode - + AllowInternetExplorerStandardsMode + - + @@ -30902,25 +41770,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView CompatView_IntranetSites - + - AllowInternetZoneTemplate - + AllowInternetZoneTemplate + - + @@ -30928,25 +41796,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneTemplate - + - AllowIntranetZoneTemplate - + AllowIntranetZoneTemplate + - + @@ -30954,25 +41822,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneTemplate - + - AllowLocalMachineZoneTemplate - + AllowLocalMachineZoneTemplate + - + @@ -30980,25 +41848,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneTemplate - + - AllowLockedDownInternetZoneTemplate - + AllowLockedDownInternetZoneTemplate + - + @@ -31006,25 +41874,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyInternetZoneLockdownTemplate - + - AllowLockedDownIntranetZoneTemplate - + AllowLockedDownIntranetZoneTemplate + - + @@ -31032,25 +41900,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyIntranetZoneLockdownTemplate - + - AllowLockedDownLocalMachineZoneTemplate - + AllowLockedDownLocalMachineZoneTemplate + - + @@ -31058,25 +41926,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyLocalMachineZoneLockdownTemplate - + - AllowLockedDownRestrictedSitesZoneTemplate - + AllowLockedDownRestrictedSitesZoneTemplate + - + @@ -31084,25 +41952,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneLockdownTemplate - + - AllowOneWordEntry - + AllowOneWordEntry + - + @@ -31110,25 +41978,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing UseIntranetSiteForOneWordEntry - + - AllowSiteToZoneAssignmentList - + AllowSiteToZoneAssignmentList + - + @@ -31136,25 +42004,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_Zonemaps - + - AllowsLockedDownTrustedSitesZoneTemplate - + AllowsLockedDownTrustedSitesZoneTemplate + - + @@ -31162,25 +42030,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneLockdownTemplate - + - AllowsRestrictedSitesZoneTemplate - + AllowSoftwareWhenSignatureIsInvalid + - + @@ -31188,25 +42056,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_InvalidSignatureBlock + + + + AllowsRestrictedSitesZoneTemplate + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyRestrictedSitesZoneTemplate - + - AllowSuggestedSites - + AllowSuggestedSites + - + @@ -31214,25 +42108,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer EnableSuggestedSites - + - AllowTrustedSitesZoneTemplate - + AllowTrustedSitesZoneTemplate + - + @@ -31240,25 +42134,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_PolicyTrustedSitesZoneTemplate - + - DisableAdobeFlash - + CheckServerCertificateRevocation + - + @@ -31266,25 +42160,103 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_CertificateRevocation + + + + CheckSignaturesOnDownloadedPrograms + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DownloadSignatures + + + + ConsistentMimeHandlingInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction + IESF_PolicyExplorerProcesses_2 + + + + DisableAdobeFlash + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement DisableFlashInIE - + - DisableBypassOfSmartScreenWarnings - + DisableBlockingOfOutdatedActiveXControls + - + @@ -31292,357 +42264,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain - - phone - inetres.admx - - - - DisableBypassOfSmartScreenWarningsAboutUncommonFiles - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - - - - DisableCustomerExperienceImprovementProgramParticipation - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SQM_DisableCEIP - - - - DisableEnclosureDownloading - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~RSS_Feeds - Disable_Downloading_of_Enclosures - - - - DisableEncryptionSupport - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_SetWinInetProtocols - - - - DisableFirstRunWizard - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoFirstRunCustomise - - - - DisableFlipAheadFeature - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage - Advanced_DisableFlipAhead - - - - DisableProxyChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - - - - DisableSearchProviderChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoSearchProvider - - - - DisableSecondaryHomePageChange - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - SecondaryHomePages - - - - DisableUpdateCheck - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - NoUpdateCheck - - - - DoNotAllowUsersToAddSites - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - Security_zones_map_edit - - - - DoNotAllowUsersToChangePolicies - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer - Security_options_edit - - - - DoNotBlockOutdatedActiveXControls - - - - - - - - - - - - - - - - - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDisable - + - DoNotBlockOutdatedActiveXControlsOnSpecificDomains - + DisableBypassOfSmartScreenWarnings + - + @@ -31650,25 +42290,589 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + + + + DisableBypassOfSmartScreenWarningsAboutUncommonFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableConfiguringHistory + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + RestrictHistory + + + + DisableCrashDetection + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableCustomerExperienceImprovementProgramParticipation + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SQM_DisableCEIP + + + + DisableDeletingUserVisitedWebsites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory + DBHDisableDeleteHistory + + + + DisableEnclosureDownloading + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~RSS_Feeds + Disable_Downloading_of_Enclosures + + + + DisableEncryptionSupport + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_SetWinInetProtocols + + + + DisableFirstRunWizard + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoFirstRunCustomise + + + + DisableFlipAheadFeature + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableFlipAhead + + + + DisableIgnoringCertificateErrors + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL + NoCertError + + + + DisableInPrivateBrowsing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy + DisableInPrivateBrowsing + + + + DisableProcessesInEnhancedProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_EnableEnhancedProtectedMode64Bit + + + + DisableProxyChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + + + + DisableSearchProviderChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoSearchProvider + + + + DisableSecondaryHomePageChange + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + SecondaryHomePages + + + + DisableSecuritySettingsCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Disable_Security_Settings_Check + + + + DisableUpdateCheck + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + NoUpdateCheck + + + + DoNotAllowActiveXControlsInProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage + Advanced_DisableEPMCompat + + + + DoNotAllowUsersToAddSites + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_zones_map_edit + + + + DoNotAllowUsersToChangePolicies + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_options_edit + + + + DoNotBlockOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisable + + + + DoNotBlockOutdatedActiveXControlsOnSpecificDomains + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement VerMgmtDomainAllowlist - + - IncludeAllLocalSites - + IncludeAllLocalSites + - + @@ -31676,25 +42880,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_IncludeUnspecifiedLocalSites - + - IncludeAllNetworkPaths - + IncludeAllNetworkPaths + - + @@ -31702,25 +42906,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage IZ_UNCAsIntranet - + - InternetZoneAllowAccessToDataSources - + InternetZoneAllowAccessToDataSources + - + @@ -31728,25 +42932,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyAccessDataSourcesAcrossDomains_1 - + - InternetZoneAllowAutomaticPromptingForActiveXControls - + InternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -31754,25 +42958,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarActiveXURLaction_1 - + - InternetZoneAllowAutomaticPromptingForFileDownloads - + InternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -31780,25 +42984,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNotificationBarDownloadURLaction_1 - + - InternetZoneAllowFontDownloads - + InternetZoneAllowCopyPasteViaScript + - + @@ -31806,25 +43010,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowPasteViaScript_1 + + + + InternetZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDropOrPasteFiles_1 + + + + InternetZoneAllowFontDownloads + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyFontDownload_1 - + - InternetZoneAllowLessPrivilegedSites - + InternetZoneAllowLessPrivilegedSites + - + @@ -31832,25 +43088,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyZoneElevationURLaction_1 - + - InternetZoneAllowNETFrameworkReliantComponents - + InternetZoneAllowLoadingOfXAMLFilesWRONG + - + @@ -31858,25 +43114,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_XAML_1 + + + + InternetZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_1 - + - InternetZoneAllowScriptlets - + InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -31884,25 +43166,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet + + + + InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyAllowTDCControl_Both_LocalMachine + + + + InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_WebBrowserControl_1 + + + + InternetZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyWindowsRestrictionsURLaction_6 + + + + InternetZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_AllowScriptlets_1 - + - InternetZoneAllowSmartScreenIE - + InternetZoneAllowSmartScreenIE + - + @@ -31910,25 +43296,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_Policy_Phishing_1 - + - InternetZoneAllowUserDataPersistence - + InternetZoneAllowUpdatesToStatusBarViaScript + - + @@ -31936,25 +43322,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_ScriptStatusBar_1 + + + + InternetZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyUserdataPersistence_1 - + - InternetZoneInitializeAndScriptActiveXControls - + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1 + - + @@ -31962,25 +43374,285 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_1 + + + + InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_3 + + + + InternetZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyDownloadSignedActiveX_3 + + + + InternetZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadUnsignedActiveX_1 + + + + InternetZoneEnableCrossSiteScriptingFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyTurnOnXSSFilter_Both_LocalMachine + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet + + + + InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet + + + + InternetZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyMimeSniffingURLaction_1 + + + + InternetZoneEnableProtectedMode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_Policy_TurnOnProtectedMode_2 + + + + InternetZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_LocalPathForUpload_1 + + + + InternetZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyScriptActiveXNotMarkedSafe_1 - + - InternetZoneNavigateWindowsAndFrames - + InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe + - + @@ -31988,25 +43660,155 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXNotMarkedSafe_1 + + + + InternetZoneJavaPermissionsWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyJavaPermissions_1 + + + + InternetZoneJavaPermissionsWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone + IZ_PolicyJavaPermissions_3 + + + + InternetZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_1 + + + + InternetZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyLogon_1 + + + + InternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone IZ_PolicyNavigateSubframesAcrossDomains_1 - + - IntranetZoneAllowAccessToDataSources - + InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode + - + @@ -32014,25 +43816,155 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyUnsignedFrameworkComponentsURLaction_1 + + + + InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicySignedFrameworkComponentsURLaction_1 + + + + InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_Policy_UnsafeFiles_1 + + + + InternetZoneUsePopupBlocker + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBlockPopupWindows_1 + + + + InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyZoneElevationURLaction_1 + + + + IntranetZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyAccessDataSourcesAcrossDomains_3 - + - IntranetZoneAllowAutomaticPromptingForActiveXControls - + IntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32040,25 +43972,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarActiveXURLaction_3 - + - IntranetZoneAllowAutomaticPromptingForFileDownloads - + IntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32066,25 +43998,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNotificationBarDownloadURLaction_3 - + - IntranetZoneAllowFontDownloads - + IntranetZoneAllowFontDownloads + - + @@ -32092,25 +44024,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyFontDownload_3 - + - IntranetZoneAllowLessPrivilegedSites - + IntranetZoneAllowLessPrivilegedSites + - + @@ -32118,25 +44050,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyZoneElevationURLaction_3 - + - IntranetZoneAllowNETFrameworkReliantComponents - + IntranetZoneAllowNETFrameworkReliantComponents + - + @@ -32144,25 +44076,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUnsignedFrameworkComponentsURLaction_3 - + - IntranetZoneAllowScriptlets - + IntranetZoneAllowScriptlets + - + @@ -32170,25 +44102,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_AllowScriptlets_3 - + - IntranetZoneAllowSmartScreenIE - + IntranetZoneAllowSmartScreenIE + - + @@ -32196,25 +44128,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_Policy_Phishing_3 - + - IntranetZoneAllowUserDataPersistence - + IntranetZoneAllowUserDataPersistence + - + @@ -32222,25 +44154,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyUserdataPersistence_3 - + - IntranetZoneInitializeAndScriptActiveXControls - + IntranetZoneInitializeAndScriptActiveXControls + - + @@ -32248,25 +44180,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyScriptActiveXNotMarkedSafe_3 - + - IntranetZoneNavigateWindowsAndFrames - + IntranetZoneNavigateWindowsAndFrames + - + @@ -32274,25 +44206,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone IZ_PolicyNavigateSubframesAcrossDomains_3 - + - LocalMachineZoneAllowAccessToDataSources - + LocalMachineZoneAllowAccessToDataSources + - + @@ -32300,25 +44232,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyAccessDataSourcesAcrossDomains_9 - + - LocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32326,25 +44258,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarActiveXURLaction_9 - + - LocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32352,25 +44284,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNotificationBarDownloadURLaction_9 - + - LocalMachineZoneAllowFontDownloads - + LocalMachineZoneAllowFontDownloads + - + @@ -32378,25 +44310,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyFontDownload_9 - + - LocalMachineZoneAllowLessPrivilegedSites - + LocalMachineZoneAllowLessPrivilegedSites + - + @@ -32404,25 +44336,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyZoneElevationURLaction_9 - + - LocalMachineZoneAllowNETFrameworkReliantComponents - + LocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -32430,25 +44362,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUnsignedFrameworkComponentsURLaction_9 - + - LocalMachineZoneAllowScriptlets - + LocalMachineZoneAllowScriptlets + - + @@ -32456,25 +44388,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_AllowScriptlets_9 - + - LocalMachineZoneAllowSmartScreenIE - + LocalMachineZoneAllowSmartScreenIE + - + @@ -32482,25 +44414,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_Policy_Phishing_9 - + - LocalMachineZoneAllowUserDataPersistence - + LocalMachineZoneAllowUserDataPersistence + - + @@ -32508,25 +44440,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyUserdataPersistence_9 - + - LocalMachineZoneInitializeAndScriptActiveXControls - + LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -32534,25 +44466,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_9 + + + + LocalMachineZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyScriptActiveXNotMarkedSafe_9 - + - LocalMachineZoneNavigateWindowsAndFrames - + LocalMachineZoneJavaPermissions + - + @@ -32560,25 +44518,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone + IZ_PolicyJavaPermissions_9 + + + + LocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone IZ_PolicyNavigateSubframesAcrossDomains_9 - + - LockedDownInternetZoneAllowAccessToDataSources - + LockedDownInternetZoneAllowAccessToDataSources + - + @@ -32586,25 +44570,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32612,25 +44596,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_2 - + - LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32638,25 +44622,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_2 - + - LockedDownInternetZoneAllowFontDownloads - + LockedDownInternetZoneAllowFontDownloads + - + @@ -32664,25 +44648,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyFontDownload_2 - + - LockedDownInternetZoneAllowLessPrivilegedSites - + LockedDownInternetZoneAllowLessPrivilegedSites + - + @@ -32690,25 +44674,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyZoneElevationURLaction_2 - + - LockedDownInternetZoneAllowNETFrameworkReliantComponents - + LockedDownInternetZoneAllowNETFrameworkReliantComponents + - + @@ -32716,25 +44700,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_2 - + - LockedDownInternetZoneAllowScriptlets - + LockedDownInternetZoneAllowScriptlets + - + @@ -32742,25 +44726,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_AllowScriptlets_2 - + - LockedDownInternetZoneAllowSmartScreenIE - + LockedDownInternetZoneAllowSmartScreenIE + - + @@ -32768,25 +44752,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_Policy_Phishing_2 - + - LockedDownInternetZoneAllowUserDataPersistence - + LockedDownInternetZoneAllowUserDataPersistence + - + @@ -32794,25 +44778,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyUserdataPersistence_2 - + - LockedDownInternetZoneInitializeAndScriptActiveXControls - + LockedDownInternetZoneInitializeAndScriptActiveXControls + - + @@ -32820,25 +44804,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_2 - + - LockedDownInternetZoneNavigateWindowsAndFrames - + LockedDownInternetZoneJavaPermissions + - + @@ -32846,25 +44830,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown + IZ_PolicyJavaPermissions_2 + + + + LockedDownInternetZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_2 - + - LockedDownIntranetZoneAllowAccessToDataSources - + LockedDownIntranetZoneAllowAccessToDataSources + - + @@ -32872,25 +44882,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls - + LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls + - + @@ -32898,25 +44908,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_4 - + - LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads - + LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads + - + @@ -32924,25 +44934,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_4 - + - LockedDownIntranetZoneAllowFontDownloads - + LockedDownIntranetZoneAllowFontDownloads + - + @@ -32950,25 +44960,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyFontDownload_4 - + - LockedDownIntranetZoneAllowLessPrivilegedSites - + LockedDownIntranetZoneAllowLessPrivilegedSites + - + @@ -32976,25 +44986,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyZoneElevationURLaction_4 - + - LockedDownIntranetZoneAllowNETFrameworkReliantComponents - + LockedDownIntranetZoneAllowNETFrameworkReliantComponents + - + @@ -33002,25 +45012,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_4 - + - LockedDownIntranetZoneAllowScriptlets - + LockedDownIntranetZoneAllowScriptlets + - + @@ -33028,25 +45038,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_AllowScriptlets_4 - + - LockedDownIntranetZoneAllowSmartScreenIE - + LockedDownIntranetZoneAllowSmartScreenIE + - + @@ -33054,25 +45064,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_Policy_Phishing_4 - + - LockedDownIntranetZoneAllowUserDataPersistence - + LockedDownIntranetZoneAllowUserDataPersistence + - + @@ -33080,25 +45090,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyUserdataPersistence_4 - + - LockedDownIntranetZoneInitializeAndScriptActiveXControls - + LockedDownIntranetZoneInitializeAndScriptActiveXControls + - + @@ -33106,25 +45116,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_4 - + - LockedDownIntranetZoneNavigateWindowsAndFrames - + LockedDownIntranetZoneNavigateWindowsAndFrames + - + @@ -33132,25 +45142,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_4 - + - LockedDownLocalMachineZoneAllowAccessToDataSources - + LockedDownLocalMachineZoneAllowAccessToDataSources + - + @@ -33158,25 +45168,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls - + LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33184,25 +45194,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_10 - + - LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads - + LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33210,25 +45220,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_10 - + - LockedDownLocalMachineZoneAllowFontDownloads - + LockedDownLocalMachineZoneAllowFontDownloads + - + @@ -33236,25 +45246,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyFontDownload_10 - + - LockedDownLocalMachineZoneAllowLessPrivilegedSites - + LockedDownLocalMachineZoneAllowLessPrivilegedSites + - + @@ -33262,25 +45272,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyZoneElevationURLaction_10 - + - LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents - + LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents + - + @@ -33288,25 +45298,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_10 - + - LockedDownLocalMachineZoneAllowScriptlets - + LockedDownLocalMachineZoneAllowScriptlets + - + @@ -33314,25 +45324,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_AllowScriptlets_10 - + - LockedDownLocalMachineZoneAllowSmartScreenIE - + LockedDownLocalMachineZoneAllowSmartScreenIE + - + @@ -33340,25 +45350,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_Policy_Phishing_10 - + - LockedDownLocalMachineZoneAllowUserDataPersistence - + LockedDownLocalMachineZoneAllowUserDataPersistence + - + @@ -33366,25 +45376,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyUserdataPersistence_10 - + - LockedDownLocalMachineZoneInitializeAndScriptActiveXControls - + LockedDownLocalMachineZoneInitializeAndScriptActiveXControls + - + @@ -33392,25 +45402,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_10 - + - LockedDownLocalMachineZoneNavigateWindowsAndFrames - + LockedDownLocalMachineZoneJavaPermissions + - + @@ -33418,25 +45428,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown + IZ_PolicyJavaPermissions_10 + + + + LockedDownLocalMachineZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_10 - + - LockedDownRestrictedSitesZoneAllowAccessToDataSources - + LockedDownRestrictedSitesZoneAllowAccessToDataSources + - + @@ -33444,25 +45480,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33470,25 +45506,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_8 - + - LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33496,25 +45532,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_8 - + - LockedDownRestrictedSitesZoneAllowFontDownloads - + LockedDownRestrictedSitesZoneAllowFontDownloads + - + @@ -33522,25 +45558,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyFontDownload_8 - + - LockedDownRestrictedSitesZoneAllowLessPrivilegedSites - + LockedDownRestrictedSitesZoneAllowLessPrivilegedSites + - + @@ -33548,25 +45584,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_8 - + - LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -33574,25 +45610,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_8 - + - LockedDownRestrictedSitesZoneAllowScriptlets - + LockedDownRestrictedSitesZoneAllowScriptlets + - + @@ -33600,25 +45636,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_AllowScriptlets_8 - + - LockedDownRestrictedSitesZoneAllowSmartScreenIE - + LockedDownRestrictedSitesZoneAllowSmartScreenIE + - + @@ -33626,25 +45662,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_Policy_Phishing_8 - + - LockedDownRestrictedSitesZoneAllowUserDataPersistence - + LockedDownRestrictedSitesZoneAllowUserDataPersistence + - + @@ -33652,25 +45688,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyUserdataPersistence_8 - + - LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls - + LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls + - + @@ -33678,25 +45714,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_8 - + - LockedDownRestrictedSitesZoneNavigateWindowsAndFrames - + LockedDownRestrictedSitesZoneJavaPermissions + - + @@ -33704,25 +45740,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown + IZ_PolicyJavaPermissions_8 + + + + LockedDownRestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_8 - + - LockedDownTrustedSitesZoneAllowAccessToDataSources - + LockedDownTrustedSitesZoneAllowAccessToDataSources + - + @@ -33730,25 +45792,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyAccessDataSourcesAcrossDomains_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -33756,25 +45818,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarActiveXURLaction_6 - + - LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -33782,25 +45844,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNotificationBarDownloadURLaction_6 - + - LockedDownTrustedSitesZoneAllowFontDownloads - + LockedDownTrustedSitesZoneAllowFontDownloads + - + @@ -33808,25 +45870,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyFontDownload_6 - + - LockedDownTrustedSitesZoneAllowLessPrivilegedSites - + LockedDownTrustedSitesZoneAllowLessPrivilegedSites + - + @@ -33834,25 +45896,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyZoneElevationURLaction_6 - + - LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents - + LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -33860,25 +45922,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUnsignedFrameworkComponentsURLaction_6 - + - LockedDownTrustedSitesZoneAllowScriptlets - + LockedDownTrustedSitesZoneAllowScriptlets + - + @@ -33886,25 +45948,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_AllowScriptlets_6 - + - LockedDownTrustedSitesZoneAllowSmartScreenIE - + LockedDownTrustedSitesZoneAllowSmartScreenIE + - + @@ -33912,25 +45974,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_Policy_Phishing_6 - + - LockedDownTrustedSitesZoneAllowUserDataPersistence - + LockedDownTrustedSitesZoneAllowUserDataPersistence + - + @@ -33938,25 +46000,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyUserdataPersistence_6 - + - LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls - + LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -33964,25 +46026,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyScriptActiveXNotMarkedSafe_6 - + - LockedDownTrustedSitesZoneNavigateWindowsAndFrames - + LockedDownTrustedSitesZoneJavaPermissions + - + @@ -33990,25 +46052,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyJavaPermissions_6 + + + + LockedDownTrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown IZ_PolicyNavigateSubframesAcrossDomains_6 - + - RestrictedSitesZoneAllowAccessToDataSources - + MimeSniffingSafetyFeatureInternetExplorerProcesses + - + @@ -34016,25 +46104,233 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature + IESF_PolicyExplorerProcesses_6 + + + + MKProtocolSecurityRestrictionInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction + IESF_PolicyExplorerProcesses_3 + + + + NotificationBarInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar + IESF_PolicyExplorerProcesses_10 + + + + PreventManagingSmartScreenFilter + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyDownloadSignedActiveX_1 + + + + PreventPerUserInstallationOfActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + DisablePerUserActiveXInstall + + + + ProtectionFromZoneElevationInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation + IESF_PolicyAllProcesses_9 + + + + RemoveRunThisTimeButtonForOutdatedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement + VerMgmtDisableRunThisTime + + + + RestrictActiveXInstallInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall + IESF_PolicyAllProcesses_11 + + + + RestrictedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls - + RestrictedSitesZoneAllowActiveScripting + - + @@ -34042,25 +46338,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyActiveScripting_1 + + + + RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarActiveXURLaction_7 - + - RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads - + RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -34068,25 +46390,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNotificationBarDownloadURLaction_7 - + - RestrictedSitesZoneAllowFontDownloads - + RestrictedSitesZoneAllowBinaryAndScriptBehaviors + - + @@ -34094,25 +46416,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyBinaryBehaviors_1 + + + + RestrictedSitesZoneAllowCopyPasteViaScript + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowPasteViaScript_7 + + + + RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDropOrPasteFiles_7 + + + + RestrictedSitesZoneAllowFileDownloads + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFileDownload_1 + + + + RestrictedSitesZoneAllowFontDownloadsWRONG1 + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyFontDownload_7 - + - RestrictedSitesZoneAllowLessPrivilegedSites - + RestrictedSitesZoneAllowFontDownloadsWRONG2 + - + @@ -34120,25 +46546,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyFontDownload_1 + + + + RestrictedSitesZoneAllowLessPrivilegedSites + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyZoneElevationURLaction_7 - + - RestrictedSitesZoneAllowNETFrameworkReliantComponents - + RestrictedSitesZoneAllowLoadingOfXAMLFiles + - + @@ -34146,25 +46598,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_XAML_7 + + + + RestrictedSitesZoneAllowMETAREFRESH + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyAllowMETAREFRESH_1 + + + + RestrictedSitesZoneAllowNETFrameworkReliantComponents + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_7 - + - RestrictedSitesZoneAllowScriptlets - + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls + - + @@ -34172,25 +46676,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted + + + + RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAllowTDCControl_Both_Restricted + + + + RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_WebBrowserControl_7 + + + + RestrictedSitesZoneAllowScriptInitiatedWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyWindowsRestrictionsURLaction_7 + + + + RestrictedSitesZoneAllowScriptlets + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_AllowScriptlets_7 - + - RestrictedSitesZoneAllowSmartScreenIE - + RestrictedSitesZoneAllowSmartScreenIE + - + @@ -34198,25 +46806,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_Policy_Phishing_7 - + - RestrictedSitesZoneAllowUserDataPersistence - + RestrictedSitesZoneAllowUpdatesToStatusBarViaScript + - + @@ -34224,25 +46832,51 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_ScriptStatusBar_7 + + + + RestrictedSitesZoneAllowUserDataPersistence + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyUserdataPersistence_7 - + - RestrictedSitesZoneInitializeAndScriptActiveXControls - + RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls + - + @@ -34250,25 +46884,207 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_7 + + + + RestrictedSitesZoneDownloadSignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadSignedActiveX_7 + + + + RestrictedSitesZoneDownloadUnsignedActiveXControls + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDownloadUnsignedActiveX_7 + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted + + + + RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted + + + + RestrictedSitesZoneEnableMIMESniffing + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyMimeSniffingURLaction_7 + + + + RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_LocalPathForUpload_7 + + + + RestrictedSitesZoneInitializeAndScriptActiveXControls + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_7 - + - RestrictedSitesZoneNavigateWindowsAndFrames - + RestrictedSitesZoneJavaPermissions + - + @@ -34276,25 +47092,103 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyJavaPermissions_7 + + + + RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLaunchAppsAndFilesInIFRAME_7 + + + + RestrictedSitesZoneLogonOptions + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyLogon_7 + + + + RestrictedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_7 - + - SearchProviderList - + RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains + - + @@ -34302,25 +47196,311 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyNavigateSubframesAcrossDomains_1 + + + + RestrictedSitesZoneRunActiveXControlsAndPlugins + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyRunActiveXControls_1 + + + + RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicySignedFrameworkComponentsURLaction_7 + + + + RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone + IZ_PolicyScriptActiveXMarkedSafe_1 + + + + RestrictedSitesZoneWRONG + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown + IZ_PolicyScriptingOfJavaApplets_6 + + + + RestrictedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_UnsafeFiles_7 + + + + RestrictedSitesZoneWRONG3 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyTurnOnXSSFilter_Both_Restricted + + + + RestrictedSitesZoneWRONG4 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_Policy_TurnOnProtectedMode_7 + + + + RestrictedSitesZoneWRONG5 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone + IZ_PolicyBlockPopupWindows_7 + + + + RestrictFileDownloadInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload + IESF_PolicyAllProcesses_12 + + + + ScriptedWindowSecurityRestrictionsInternetExplorerProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions + IESF_PolicyAllProcesses_8 + + + + SearchProviderList + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer SpecificSearchProvider - + - TrustedSitesZoneAllowAccessToDataSources - + SecurityZonesUseOnlyMachineSettings + - + @@ -34328,25 +47508,77 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + Security_HKLM_only + + + + SpecifyUseOfActiveXInstallerService + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer + OnlyUseAXISForActiveXInstall + + + + TrustedSitesZoneAllowAccessToDataSources + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyAccessDataSourcesAcrossDomains_5 - + - TrustedSitesZoneAllowAutomaticPromptingForActiveXControls - + TrustedSitesZoneAllowAutomaticPromptingForActiveXControls + - + @@ -34354,25 +47586,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarActiveXURLaction_5 - + - TrustedSitesZoneAllowAutomaticPromptingForFileDownloads - + TrustedSitesZoneAllowAutomaticPromptingForFileDownloads + - + @@ -34380,25 +47612,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNotificationBarDownloadURLaction_5 - + - TrustedSitesZoneAllowFontDownloads - + TrustedSitesZoneAllowFontDownloads + - + @@ -34406,25 +47638,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyFontDownload_5 - + - TrustedSitesZoneAllowLessPrivilegedSites - + TrustedSitesZoneAllowLessPrivilegedSites + - + @@ -34432,25 +47664,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyZoneElevationURLaction_5 - + - TrustedSitesZoneAllowNETFrameworkReliantComponents - + TrustedSitesZoneAllowNETFrameworkReliantComponents + - + @@ -34458,25 +47690,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUnsignedFrameworkComponentsURLaction_5 - + - TrustedSitesZoneAllowScriptlets - + TrustedSitesZoneAllowScriptlets + - + @@ -34484,25 +47716,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_AllowScriptlets_5 - + - TrustedSitesZoneAllowSmartScreenIE - + TrustedSitesZoneAllowSmartScreenIE + - + @@ -34510,25 +47742,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_Policy_Phishing_5 - + - TrustedSitesZoneAllowUserDataPersistence - + TrustedSitesZoneAllowUserDataPersistence + - + @@ -34536,25 +47768,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyUserdataPersistence_5 - + - TrustedSitesZoneInitializeAndScriptActiveXControls - + TrustedSitesZoneInitializeAndScriptActiveXControls + - + @@ -34562,25 +47794,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyScriptActiveXNotMarkedSafe_5 - + - TrustedSitesZoneNavigateWindowsAndFrames - + TrustedSitesZoneJavaPermissions + - + @@ -34588,19 +47820,97 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyJavaPermissions_5 + + + + TrustedSitesZoneNavigateWindowsAndFrames + + + + + + + + + + + + + + + + + text/plain phone inetres.admx inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone IZ_PolicyNavigateSubframesAcrossDomains_5 - + + + + TrustedSitesZoneWRONG1 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyAntiMalwareCheckingOfActiveXControls_5 + + + + TrustedSitesZoneWRONG2 + + + + + + + + + + + + + + + + + text/plain + + phone + inetres.admx + inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone + IZ_PolicyScriptActiveXNotMarkedSafe_5 + @@ -34623,10 +47933,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowForestSearchOrder - + AllowForestSearchOrder + - + @@ -34634,25 +47944,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ForestSearch - + - KerberosClientSupportsClaimsCompoundArmor - + KerberosClientSupportsClaimsCompoundArmor + - + @@ -34660,25 +47970,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos EnableCbacAndArmor - + - RequireKerberosArmoring - + RequireKerberosArmoring + - + @@ -34686,25 +47996,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ClientRequireFast - + - RequireStrictKDCValidation - + RequireStrictKDCValidation + - + @@ -34712,25 +48022,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos ValidateKDC - + - SetMaximumContextTokenSize - + SetMaximumContextTokenSize + - + @@ -34738,19 +48048,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Kerberos.admx Kerberos~AT~System~kerberos MaxTokenSize - + @@ -34773,10 +48083,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowWindowsEntitlementReactivation - + AllowWindowsEntitlementReactivation + - + 1 @@ -34784,22 +48094,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - DisallowKMSClientOnlineAVSValidation - + DisallowKMSClientOnlineAVSValidation + - + 0 @@ -34807,16 +48117,876 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + + + + + LocalPoliciesSecurityOptions + + + + + + + + + + + + + + + + + + + Accounts_BlockMicrosoftAccounts + + + + + This policy setting prevents users from adding new Microsoft accounts on this computer. + +If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. + +If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system. + +If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows. + 0 + + + + + + + + + + + text/plain + + phone + + + + Accounts_EnableAdministratorAccountStatus + + + + + This security setting determines whether the local Administrator account is enabled or disabled. + +Notes + +If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. +Disabling the Administrator account can become a maintenance issue under certain circumstances. + +Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + desktop + + + + Accounts_EnableGuestAccountStatus + + + + + This security setting determines if the Guest account is enabled or disabled. + +Default: Disabled. + +Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. + 0 + + + + + + + + + + + text/plain + + desktop + + + + Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly + + + + + Accounts: Limit local account use of blank passwords to console logon only + +This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. + +Default: Enabled. + + +Warning: + +Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers. +If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services. + +Notes + +This setting does not affect logons that use domain accounts. +It is possible for applications that use remote interactive logons to bypass this setting. + 1 + + + + + + + + + + + text/plain + + phone + + + + Accounts_RenameAdministratorAccount + + + + + Accounts: Rename administrator account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. + +Default: Administrator. + + + + + + + + + + + + text/plain + + phone + + + + Accounts_RenameGuestAccount + + + + + Accounts: Rename guest account + +This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. + +Default: Guest. + + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked + + + + + Interactive Logon:Display user information when the session is locked +User display name, domain and user names (1) +User display name only (2) +Do not display user information (3) + 1 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotDisplayLastSignedIn + + + + + Interactive logon: Don't display last signed-in +This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotDisplayUsernameAtSignIn + + + + + Interactive logon: Don't display username at sign-in +This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. +If this policy is enabled, the username will not be shown. + +If this policy is disabled, the username will be shown. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + Interactivelogon_DoNotRequireCTRLALTDEL + + + + + Interactive logon: Do not require CTRL+ALT+DEL + +This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. + +If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords. + +If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows. + +Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. +Default on stand-alone computers: Enabled. + 1 + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_MachineInactivityLimit + + + + + Interactive logon: Machine inactivity limit. + +Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. + +Default: not enforced. + 0 + + + + + + + + + + + text/plain + + + + + InteractiveLogon_MessageTextForUsersAttemptingToLogOn + + + + + Interactive logon: Message text for users attempting to log on + +This security setting specifies a text message that is displayed to users when they log on. + +This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. + +Default: No message. + + + + + + + + + + + + text/plain + + phone + + + + InteractiveLogon_MessageTitleForUsersAttemptingToLogOn + + + + + Interactive logon: Message title for users attempting to log on + +This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. + +Default: No message. + + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccountsAndShares + + + + + Network access: Do not allow anonymous enumeration of SAM accounts and shares + +This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. + +Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This is convenient, for example, when an administrator wants to grant access to users in a trusted domain that does not maintain a reciprocal trust. If you do not want to allow anonymous enumeration of SAM accounts and shares, then enable this policy. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares + + + + + Network access: Restrict anonymous access to Named Pipes and Shares + +When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: + +Network access: Named pipes that can be accessed anonymously +Network access: Shares that can be accessed anonymously +Default: Enabled. + 1 + + + + + + + + + + + text/plain + + phone + + + + NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM + + + + + Network access: Restrict clients allowed to make remote calls to SAM + +This policy setting allows you to restrict remote rpc connections to SAM. + +If not selected, the default security descriptor will be used. + +This policy is supported on at least Windows Server 2016. + + + + + + + + + + + + text/plain + + phone + + + + NetworkSecurity_AllowPKU2UAuthenticationRequests + + + + + Network security: Allow PKU2U authentication requests to this computer to use online identities. + +This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. + 1 + + + + + + + + + + + text/plain + + phone + + + + RecoveryConsole_AllowAutomaticAdministrativeLogon + + + + + Recovery console: Allow automatic administrative logon + +This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. + +Default: This policy is not defined and automatic administrative logon is not allowed. + 0 + + + + + + + + + + + text/plain + + phone + + + + Shutdown_ClearVirtualMemoryPageFile + + + + + Shutdown: Clear virtual memory pagefile + +This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. + +Virtual memory support uses a system pagefile to swap pages of memory to disk when they are not used. On a running system, this pagefile is opened exclusively by the operating system, and it is well protected. However, systems that are configured to allow booting to other operating systems might have to make sure that the system pagefile is wiped clean when this system shuts down. This ensures that sensitive information from process memory that might go into the pagefile is not available to an unauthorized user who manages to directly access the pagefile. + +When this policy is enabled, it causes the system pagefile to be cleared upon clean shutdown. If you enable this security option, the hibernation file (hiberfil.sys) is also zeroed out when hibernation is disabled. + +Default: Disabled. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_AllowUIAccessApplicationsToPromptForElevation + + + + + User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. + +This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. + +• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. + +• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_BehaviorOfTheElevationPromptForAdministrators + + + + + User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode + +This policy setting controls the behavior of the elevation prompt for administrators. + +The options are: + +• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. + +• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + +• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers + + + + + User Account Control: Behavior of the elevation prompt for standard users +This policy setting controls the behavior of the elevation prompt for standard users. + +The options are: + +• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + +• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls. + +• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated + + + + + User Account Control: Only elevate executable files that are signed and validated + +This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. + +The options are: + +• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run. + +• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations + + + + + User Account Control: Only elevate UIAccess applications that are installed in secure locations + +This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: + +- …\Program Files\, including subfolders +- …\Windows\system32\ +- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows + +Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting. + +The options are: + +• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity. + +• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_RunAllAdministratorsInAdminApprovalMode + + + + + User Account Control: Turn on Admin Approval Mode + +This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. + +The options are: + +• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode. + +• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced. + 0 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation + + + + + User Account Control: Switch to the secure desktop when prompting for elevation + +This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. + +The options are: + +• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users. + +• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_UseAdminApprovalMode + + + + + User Account Control: Use Admin Approval Mode for the built-in Administrator account + +This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. + +The options are: + +• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation. + +• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. + 1 + + + + + + + + + + + text/plain + + phone + + + + UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations + + + + + User Account Control: Virtualize file and registry write failures to per-user locations + +This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. + +The options are: + +• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. + +• Disabled: Applications that write data to protected locations fail. + 1 + + + + + + + + + + + text/plain + + phone + @@ -34839,10 +49009,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableLocation - + EnableLocation + - + 0 @@ -34850,15 +49020,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -34881,10 +49051,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowEdgeSwipe - + AllowEdgeSwipe + - + 1 @@ -34892,16 +49062,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -34924,10 +49094,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowOfflineMapsDownloadOverMeteredConnection - + AllowOfflineMapsDownloadOverMeteredConnection + - + 65535 @@ -34935,21 +49105,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnableOfflineMapsAutoUpdate - + EnableOfflineMapsAutoUpdate + - + 65535 @@ -34957,15 +49127,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -34988,10 +49158,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowMessageSync - + AllowMessageSync + - + 1 @@ -34999,22 +49169,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowMMS - + AllowMMS + - + 1 @@ -35022,22 +49192,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowRCS - + AllowRCS + - + 1 @@ -35045,16 +49215,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -35077,10 +49247,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnterpriseCloudResources - + EnterpriseCloudResources + - + @@ -35088,21 +49258,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseInternalProxyServers - + EnterpriseInternalProxyServers + - + @@ -35110,21 +49280,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseIPRange - + EnterpriseIPRange + - + @@ -35132,21 +49302,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseIPRangesAreAuthoritative - + EnterpriseIPRangesAreAuthoritative + - + 0 @@ -35154,21 +49324,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseNetworkDomainNames - + EnterpriseNetworkDomainNames + - + @@ -35176,21 +49346,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseProxyServers - + EnterpriseProxyServers + - + @@ -35198,21 +49368,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EnterpriseProxyServersAreAuthoritative - + EnterpriseProxyServersAreAuthoritative + - + 0 @@ -35220,21 +49390,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - NeutralResources - + NeutralResources + - + @@ -35242,15 +49412,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -35273,10 +49443,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowStandbyWhenSleepingPluggedIn - + AllowStandbyWhenSleepingPluggedIn + - + @@ -35284,25 +49454,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat AllowStandbyStatesAC_2 - + - RequirePasswordWhenComputerWakesOnBattery - + DisplayOffTimeoutOnBattery + - + @@ -35310,25 +49480,129 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerVideoSettingsCat + VideoPowerDownTimeOutDC_2 + + + + DisplayOffTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerVideoSettingsCat + VideoPowerDownTimeOutAC_2 + + + + HibernateTimeoutOnBattery + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + DCHibernateTimeOut_2 + + + + HibernateTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + ACHibernateTimeOut_2 + + + + RequirePasswordWhenComputerWakesOnBattery + + + + + + + + + + + + + + + + + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat DCPromptForPasswordOnResume_2 - + - RequirePasswordWhenComputerWakesPluggedIn - + RequirePasswordWhenComputerWakesPluggedIn + - + @@ -35336,19 +49610,71 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone power.admx Power~AT~System~PowerManagementCat~PowerSleepSettingsCat ACPromptForPasswordOnResume_2 - + + + + StandbyTimeoutOnBattery + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + DCStandbyTimeOut_2 + + + + StandbyTimeoutPluggedIn + + + + + + + + + + + + + + + + + text/plain + + phone + power.admx + Power~AT~System~PowerManagementCat~PowerSleepSettingsCat + ACStandbyTimeOut_2 + @@ -35371,10 +49697,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - PointAndPrintRestrictions - + PointAndPrintRestrictions + - + @@ -35382,25 +49708,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Printing.admx Printing~AT~ControlPanel~CplPrinters PointAndPrint_Restrictions_Win7 - + - PublishPrinters - + PublishPrinters + - + @@ -35408,19 +49734,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone Printing2.admx Printing2~AT~Printers PublishPrinters - + @@ -35443,10 +49769,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoAcceptPairingAndPrivacyConsentPrompts - + AllowAutoAcceptPairingAndPrivacyConsentPrompts + - + 0 @@ -35454,22 +49780,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowInputPersonalization - + AllowInputPersonalization + - + 1 @@ -35477,22 +49803,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain 10.0.10240 - + - DisableAdvertisingId - + DisableAdvertisingId + - + 65535 @@ -35500,21 +49826,43 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo - + EnableActivityFeed + - + + + Enables ActivityFeed, which is responsible for mirroring different activity types (as applicable) across device graph of the user. + 1 + + + + + + + + + + + text/plain + + + + + LetAppsAccessAccountInfo + + + This policy setting specifies whether Windows apps can access account information. 0 @@ -35522,21 +49870,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_ForceAllowTheseApps - + LetAppsAccessAccountInfo_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35544,21 +49892,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_ForceDenyTheseApps - + LetAppsAccessAccountInfo_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35566,21 +49914,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessAccountInfo_UserInControlOfTheseApps - + LetAppsAccessAccountInfo_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -35588,21 +49936,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar - + LetAppsAccessCalendar + - + This policy setting specifies whether Windows apps can access the calendar. 0 @@ -35610,21 +49958,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_ForceAllowTheseApps - + LetAppsAccessCalendar_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35632,21 +49980,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_ForceDenyTheseApps - + LetAppsAccessCalendar_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35654,21 +50002,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCalendar_UserInControlOfTheseApps - + LetAppsAccessCalendar_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -35676,21 +50024,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory - + LetAppsAccessCallHistory + - + This policy setting specifies whether Windows apps can access call history. 0 @@ -35698,21 +50046,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_ForceAllowTheseApps - + LetAppsAccessCallHistory_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35720,21 +50068,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_ForceDenyTheseApps - + LetAppsAccessCallHistory_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35742,21 +50090,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCallHistory_UserInControlOfTheseApps - + LetAppsAccessCallHistory_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -35764,21 +50112,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera - + LetAppsAccessCamera + - + This policy setting specifies whether Windows apps can access the camera. 0 @@ -35786,21 +50134,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_ForceAllowTheseApps - + LetAppsAccessCamera_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35808,21 +50156,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_ForceDenyTheseApps - + LetAppsAccessCamera_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35830,21 +50178,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessCamera_UserInControlOfTheseApps - + LetAppsAccessCamera_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -35852,21 +50200,109 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts - + LetAppsAccessCellularData + - + + + This policy setting specifies whether Windows apps can access cellular data. + 0 + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceAllowTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_ForceDenyTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessCellularData_UserInControlOfTheseApps + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. + + + + + + + + + + + + text/plain + + + + + LetAppsAccessContacts + + + This policy setting specifies whether Windows apps can access contacts. 0 @@ -35874,21 +50310,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_ForceAllowTheseApps - + LetAppsAccessContacts_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35896,21 +50332,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_ForceDenyTheseApps - + LetAppsAccessContacts_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35918,21 +50354,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessContacts_UserInControlOfTheseApps - + LetAppsAccessContacts_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -35940,21 +50376,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail - + LetAppsAccessEmail + - + This policy setting specifies whether Windows apps can access email. 0 @@ -35962,21 +50398,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_ForceAllowTheseApps - + LetAppsAccessEmail_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -35984,21 +50420,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_ForceDenyTheseApps - + LetAppsAccessEmail_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -36006,21 +50442,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessEmail_UserInControlOfTheseApps - + LetAppsAccessEmail_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -36028,21 +50464,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation - + LetAppsAccessLocation + - + This policy setting specifies whether Windows apps can access location. 0 @@ -36050,21 +50486,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_ForceAllowTheseApps - + LetAppsAccessLocation_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36072,21 +50508,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_ForceDenyTheseApps - + LetAppsAccessLocation_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36094,21 +50530,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessLocation_UserInControlOfTheseApps - + LetAppsAccessLocation_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -36116,21 +50552,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging - + LetAppsAccessMessaging + - + This policy setting specifies whether Windows apps can read or send messages (text or MMS). 0 @@ -36138,21 +50574,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_ForceAllowTheseApps - + LetAppsAccessMessaging_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36160,21 +50596,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_ForceDenyTheseApps - + LetAppsAccessMessaging_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36182,21 +50618,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMessaging_UserInControlOfTheseApps - + LetAppsAccessMessaging_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -36204,21 +50640,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone - + LetAppsAccessMicrophone + - + This policy setting specifies whether Windows apps can access the microphone. 0 @@ -36226,21 +50662,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_ForceAllowTheseApps - + LetAppsAccessMicrophone_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36248,21 +50684,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_ForceDenyTheseApps - + LetAppsAccessMicrophone_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36270,21 +50706,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMicrophone_UserInControlOfTheseApps - + LetAppsAccessMicrophone_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -36292,21 +50728,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion - + LetAppsAccessMotion + - + This policy setting specifies whether Windows apps can access motion data. 0 @@ -36314,21 +50750,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_ForceAllowTheseApps - + LetAppsAccessMotion_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36336,21 +50772,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_ForceDenyTheseApps - + LetAppsAccessMotion_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36358,21 +50794,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessMotion_UserInControlOfTheseApps - + LetAppsAccessMotion_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -36380,21 +50816,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications - + LetAppsAccessNotifications + - + This policy setting specifies whether Windows apps can access notifications. 0 @@ -36402,21 +50838,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_ForceAllowTheseApps - + LetAppsAccessNotifications_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36424,21 +50860,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_ForceDenyTheseApps - + LetAppsAccessNotifications_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36446,21 +50882,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessNotifications_UserInControlOfTheseApps - + LetAppsAccessNotifications_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -36468,21 +50904,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone - + LetAppsAccessPhone + - + This policy setting specifies whether Windows apps can make phone calls 0 @@ -36490,21 +50926,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_ForceAllowTheseApps - + LetAppsAccessPhone_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36512,21 +50948,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_ForceDenyTheseApps - + LetAppsAccessPhone_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36534,21 +50970,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessPhone_UserInControlOfTheseApps - + LetAppsAccessPhone_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -36556,21 +50992,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios - + LetAppsAccessRadios + - + This policy setting specifies whether Windows apps have access to control radios. 0 @@ -36578,21 +51014,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_ForceAllowTheseApps - + LetAppsAccessRadios_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36600,21 +51036,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_ForceDenyTheseApps - + LetAppsAccessRadios_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36622,21 +51058,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessRadios_UserInControlOfTheseApps - + LetAppsAccessRadios_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -36644,21 +51080,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks - + LetAppsAccessTasks + - + This policy setting specifies whether Windows apps can access tasks. 0 @@ -36666,21 +51102,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_ForceAllowTheseApps - + LetAppsAccessTasks_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36688,21 +51124,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_ForceDenyTheseApps - + LetAppsAccessTasks_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36710,21 +51146,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTasks_UserInControlOfTheseApps - + LetAppsAccessTasks_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -36732,21 +51168,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices - + LetAppsAccessTrustedDevices + - + This policy setting specifies whether Windows apps can access trusted devices. 0 @@ -36754,21 +51190,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_ForceAllowTheseApps - + LetAppsAccessTrustedDevices_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36776,21 +51212,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_ForceDenyTheseApps - + LetAppsAccessTrustedDevices_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36798,21 +51234,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsAccessTrustedDevices_UserInControlOfTheseApps - + LetAppsAccessTrustedDevices_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -36820,21 +51256,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo - + LetAppsGetDiagnosticInfo + - + This policy setting specifies whether Windows apps can get diagnostic information about other apps, including user names. 0 @@ -36842,21 +51278,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_ForceAllowTheseApps - + LetAppsGetDiagnosticInfo_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed to get diagnostic information about other apps, including user names. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36864,21 +51300,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_ForceDenyTheseApps - + LetAppsGetDiagnosticInfo_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are not allowed to get diagnostic information about other apps, including user names. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36886,21 +51322,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsGetDiagnosticInfo_UserInControlOfTheseApps - + LetAppsGetDiagnosticInfo_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the app diagnostics privacy setting for the listed Windows apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified Windows apps. @@ -36908,21 +51344,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground - + LetAppsRunInBackground + - + This policy setting specifies whether Windows apps can run in the background. 0 @@ -36930,21 +51366,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_ForceAllowTheseApps - + LetAppsRunInBackground_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36952,21 +51388,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_ForceDenyTheseApps - + LetAppsRunInBackground_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are not allowed to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36974,21 +51410,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsRunInBackground_UserInControlOfTheseApps - + LetAppsRunInBackground_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the background apps privacy setting for the listed Windows apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified Windows apps. @@ -36996,21 +51432,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices - + LetAppsSyncWithDevices + - + This policy setting specifies whether Windows apps can sync with devices. 0 @@ -37018,21 +51454,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_ForceAllowTheseApps - + LetAppsSyncWithDevices_ForceAllowTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37040,21 +51476,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_ForceDenyTheseApps - + LetAppsSyncWithDevices_ForceDenyTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37062,21 +51498,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - LetAppsSyncWithDevices_UserInControlOfTheseApps - + LetAppsSyncWithDevices_UserInControlOfTheseApps + - + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -37084,15 +51520,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + PublishUserActivities + + + + + Allows apps/system to publish 'User Activities' into ActivityFeed. + 1 + + + + + + + + + + + text/plain + + @@ -37115,10 +51573,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - CustomizeWarningMessages - + CustomizeWarningMessages + - + @@ -37126,25 +51584,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Options - + - SessionLogging - + SessionLogging + - + @@ -37152,25 +51610,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Logging - + - SolicitedRemoteAssistance - + SolicitedRemoteAssistance + - + @@ -37178,25 +51636,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Solicit - + - UnsolicitedRemoteAssistance - + UnsolicitedRemoteAssistance + - + @@ -37204,19 +51662,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone remoteassistance.admx RemoteAssistance~AT~System~RemoteAssist RA_Unsolicit - + @@ -37239,10 +51697,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowUsersToConnectRemotely - + AllowUsersToConnectRemotely + - + @@ -37250,25 +51708,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_CONNECTIONS TS_DISABLE_CONNECTIONS - + - ClientConnectionEncryptionLevel - + ClientConnectionEncryptionLevel + - + @@ -37276,25 +51734,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_ENCRYPTION_POLICY - + - DoNotAllowDriveRedirection - + DoNotAllowDriveRedirection + - + @@ -37302,25 +51760,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_REDIRECTION TS_CLIENT_DRIVE_M - + - DoNotAllowPasswordSaving - + DoNotAllowPasswordSaving + - + @@ -37328,25 +51786,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_CLIENT TS_CLIENT_DISABLE_PASSWORD_SAVING_2 - + - PromptForPasswordUponConnection - + PromptForPasswordUponConnection + - + @@ -37354,25 +51812,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_PASSWORD - + - RequireSecureRPCCommunication - + RequireSecureRPCCommunication + - + @@ -37380,19 +51838,429 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone terminalserver.admx TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY TS_RPC_ENCRYPTION - + + + + + RemoteManagement + + + + + + + + + + + + + + + + + + + AllowBasicAuthentication_Client + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + AllowBasic_2 + + + + AllowBasicAuthentication_Service + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowBasic_1 + + + + AllowCredSSPAuthenticationClient + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowCredSSP_1 + + + + AllowCredSSPAuthenticationService + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowCredSSP_2 + + + + AllowRemoteServerManagement + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowAutoConfig + + + + AllowUnencryptedTraffic_Client + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + AllowUnencrypted_2 + + + + AllowUnencryptedTraffic_Service + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + AllowUnencrypted_1 + + + + DisallowDigestAuthentication + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + DisallowDigest + + + + DisallowNegotiateAuthenticationClient + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + DisallowNegotiate_1 + + + + DisallowNegotiateAuthenticationService + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + DisallowNegotiate_2 + + + + DisallowStoringOfRunAsCredentials + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + DisableRunAs + + + + SpecifyChannelBindingTokenHardeningLevel + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + CBTHardeningLevel_1 + + + + TrustedHosts + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient + TrustedHosts + + + + TurnOnCompatibilityHTTPListener + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + HttpCompatibilityListener + + + + TurnOnCompatibilityHTTPSListener + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteManagement.admx + WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService + HttpsCompatibilityListener + @@ -37415,10 +52283,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - RestrictUnauthenticatedRPCClients - + RestrictUnauthenticatedRPCClients + - + @@ -37426,25 +52294,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone rpc.admx RPC~AT~System~Rpc RpcRestrictRemoteClients - + - RPCEndpointMapperClientAuthentication - + RPCEndpointMapperClientAuthentication + - + @@ -37452,19 +52320,221 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone rpc.admx RPC~AT~System~Rpc RpcEnableAuthEpResolution - + + + + + RemoteShell + + + + + + + + + + + + + + + + + + + AllowRemoteShellAccess + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + AllowRemoteShellAccess + + + + MaxConcurrentUsers + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxConcurrentUsers + + + + SpecifyIdleTimeout + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + IdleTimeout + + + + SpecifyMaxMemory + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxMemoryPerShellMB + + + + SpecifyMaxProcesses + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxProcessesPerShell + + + + SpecifyMaxRemoteShells + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + MaxShellsPerUser + + + + SpecifyShellTimeout + + + + + + + + + + + + + + + + + text/plain + + phone + WindowsRemoteShell.admx + WindowsRemoteShell~AT~WindowsComponents~WinRS + ShellTimeOut + @@ -37487,10 +52557,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIndexingEncryptedStoresOrItems - + AllowIndexingEncryptedStoresOrItems + - + 0 @@ -37498,21 +52568,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowSearchToUseLocation - + AllowSearchToUseLocation + - + 1 @@ -37520,21 +52590,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStoringImagesFromVisionSearch - + AllowStoringImagesFromVisionSearch + - + 1 @@ -37542,21 +52612,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUsingDiacritics - + AllowUsingDiacritics + - + 0 @@ -37564,21 +52634,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWindowsIndexer - + AllowWindowsIndexer + - + 3 @@ -37586,21 +52656,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AlwaysUseAutoLangDetection - + AlwaysUseAutoLangDetection + - + 0 @@ -37608,21 +52678,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableBackoff - + DisableBackoff + - + 0 @@ -37630,21 +52700,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DisableRemovableDriveIndexing - + DisableRemovableDriveIndexing + - + 0 @@ -37652,21 +52722,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventIndexingLowDiskSpaceMB - + PreventIndexingLowDiskSpaceMB + - + 1 @@ -37674,21 +52744,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PreventRemoteQueries - + PreventRemoteQueries + - + 1 @@ -37696,21 +52766,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SafeSearchPermissions - + SafeSearchPermissions + - + 1 @@ -37718,16 +52788,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -37750,10 +52820,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAddProvisioningPackage - + AllowAddProvisioningPackage + - + 1 @@ -37761,21 +52831,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualRootCertificateInstallation - + AllowManualRootCertificateInstallation + - + 1 @@ -37783,22 +52853,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - AllowRemoveProvisioningPackage - + AllowRemoveProvisioningPackage + - + 1 @@ -37806,21 +52876,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AntiTheftMode - + AntiTheftMode + - + 1 @@ -37828,22 +52898,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + - PreventAutomaticDeviceEncryptionForAzureADJoinedDevices - + ClearTPMIfNotReady + - + 0 @@ -37851,21 +52921,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + phone + - RequireDeviceEncryption - + PreventAutomaticDeviceEncryptionForAzureADJoinedDevices + - + 0 @@ -37873,21 +52944,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequireProvisioningPackageSignature - + RequireDeviceEncryption + - + 0 @@ -37895,21 +52966,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequireRetrieveHealthCertificateOnBoot - + RequireProvisioningPackageSignature + - + 0 @@ -37917,15 +52988,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + RequireRetrieveHealthCertificateOnBoot + + + + + + 0 + + + + + + + + + + + text/plain + + @@ -37948,10 +53041,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoPlay - + AllowAutoPlay + - + 1 @@ -37959,22 +53052,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowDataSense - + AllowDataSense + - + 1 @@ -37982,21 +53075,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowDateTime - + AllowDateTime + - + 1 @@ -38004,21 +53097,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowEditDeviceName - + AllowEditDeviceName + - + 1 @@ -38026,21 +53119,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLanguage - + AllowLanguage + - + 1 @@ -38048,22 +53141,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPowerSleep - + AllowPowerSleep + - + 1 @@ -38071,22 +53164,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowRegion - + AllowRegion + - + 1 @@ -38094,22 +53187,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowSignInOptions - + AllowSignInOptions + - + 1 @@ -38117,22 +53210,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowVPN - + AllowVPN + - + 1 @@ -38140,21 +53233,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWorkplace - + AllowWorkplace + - + 1 @@ -38162,22 +53255,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowYourAccount - + AllowYourAccount + - + 1 @@ -38185,21 +53278,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PageVisibilityList - + PageVisibilityList + - + @@ -38207,15 +53300,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -38238,10 +53331,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnableAppInstallControl - + EnableAppInstallControl + - + 0 @@ -38249,22 +53342,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - EnableSmartScreenInShell - + EnableSmartScreenInShell + - + 1 @@ -38272,22 +53365,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - PreventOverrideForFilesInShell - + PreventOverrideForFilesInShell + - + 0 @@ -38295,16 +53388,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -38327,10 +53420,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSpeechModelUpdate - + AllowSpeechModelUpdate + - + 1 @@ -38338,15 +53431,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -38369,10 +53462,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowPinnedFolderDocuments - + AllowPinnedFolderDocuments + - + This policy controls the visibility of the Documents shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38380,22 +53473,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderDownloads - + AllowPinnedFolderDownloads + - + This policy controls the visibility of the Downloads shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38403,22 +53496,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderFileExplorer - + AllowPinnedFolderFileExplorer + - + This policy controls the visibility of the File Explorer shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38426,22 +53519,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderHomeGroup - + AllowPinnedFolderHomeGroup + - + This policy controls the visibility of the HomeGroup shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38449,22 +53542,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderMusic - + AllowPinnedFolderMusic + - + This policy controls the visibility of the Music shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38472,22 +53565,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderNetwork - + AllowPinnedFolderNetwork + - + This policy controls the visibility of the Network shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38495,22 +53588,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderPersonalFolder - + AllowPinnedFolderPersonalFolder + - + This policy controls the visibility of the PersonalFolder shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38518,22 +53611,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderPictures - + AllowPinnedFolderPictures + - + This policy controls the visibility of the Pictures shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38541,22 +53634,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderSettings - + AllowPinnedFolderSettings + - + This policy controls the visibility of the Settings shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38564,22 +53657,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowPinnedFolderVideos - + AllowPinnedFolderVideos + - + This policy controls the visibility of the Videos shortcut on the Start menu. The possible values are 0 - means that the shortcut should be hidden and grays out the corresponding toggle in the Settings app, 1 - means that the shortcut should be visible and grays out the corresponding toggle in the Settings app, 65535 - means that there is no enforced configuration and the setting can be changed by the user. 65535 @@ -38587,22 +53680,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ForceStartSize - + ForceStartSize + - + 0 @@ -38610,22 +53703,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideAppList - + HideAppList + - + Setting the value of this policy to 1 or 2 collapses the app list. Setting the value of this policy to 3 removes the app list entirely. Setting the value of this policy to 2 or 3 disables the corresponding toggle in the Settings app. 0 @@ -38633,22 +53726,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideChangeAccountSettings - + HideChangeAccountSettings + - + Enabling this policy hides "Change account settings" from appearing in the user tile in the start menu. 0 @@ -38656,21 +53749,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideFrequentlyUsedApps - + HideFrequentlyUsedApps + - + Enabling this policy hides the most used apps from appearing on the start menu and disables the corresponding toggle in the Settings app. 0 @@ -38678,22 +53771,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideHibernate - + HideHibernate + - + Enabling this policy hides "Hibernate" from appearing in the power button in the start menu. 0 @@ -38701,21 +53794,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideLock - + HideLock + - + Enabling this policy hides "Lock" from appearing in the user tile in the start menu. 0 @@ -38723,21 +53816,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HidePowerButton - + HidePeopleBar + - + + + Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. + 0 + + + + + + + + + + + text/plain + + phone + + + + HidePowerButton + + + Enabling this policy hides the power button from appearing in the start menu. 0 @@ -38745,21 +53861,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideRecentJumplists - + HideRecentJumplists + - + Enabling this policy hides recent jumplists from appearing on the start menu/taskbar and disables the corresponding toggle in the Settings app. 0 @@ -38767,22 +53883,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideRecentlyAddedApps - + HideRecentlyAddedApps + - + Enabling this policy hides recently added apps from appearing on the start menu and disables the corresponding toggle in the Settings app. 0 @@ -38790,22 +53906,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - HideRestart - + HideRestart + - + Enabling this policy hides "Restart/Update and restart" from appearing in the power button in the start menu. 0 @@ -38813,21 +53929,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideShutDown - + HideShutDown + - + Enabling this policy hides "Shut down/Update and shut down" from appearing in the power button in the start menu. 0 @@ -38835,21 +53951,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSignOut - + HideSignOut + - + Enabling this policy hides "Sign out" from appearing in the user tile in the start menu. 0 @@ -38857,21 +53973,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSleep - + HideSleep + - + Enabling this policy hides "Sleep" from appearing in the power button in the start menu. 0 @@ -38879,21 +53995,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideSwitchAccount - + HideSwitchAccount + - + Enabling this policy hides "Switch account" from appearing in the user tile in the start menu. 0 @@ -38901,21 +54017,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - HideUserTile - + HideUserTile + - + Enabling this policy hides the user tile from appearing in the start menu. 0 @@ -38923,21 +54039,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ImportEdgeAssets - + ImportEdgeAssets + - + This policy setting allows you to import Edge assets to be used with StartLayout policy. Start layout can contain secondary tile from Edge app which looks for Edge local asset file. Edge local asset would not exist and cause Edge secondary tile to appear empty in this case. This policy only gets applied when StartLayout policy is modified. @@ -38945,22 +54061,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - NoPinningToTaskbar - + NoPinningToTaskbar + - + This policy setting allows you to control pinning programs to the Taskbar. If you enable this policy setting, users cannot change the programs currently pinned to the Taskbar. If any programs are already pinned to the Taskbar, these programs continue to show in the Taskbar. However, users cannot unpin these programs already pinned to the Taskbar, and they cannot pin new programs to the Taskbar. If you disable or do not configure this policy setting, users can change the programs currently pinned to the Taskbar. 0 @@ -38968,22 +54084,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - StartLayout - + StartLayout + - + @@ -38991,16 +54107,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -39023,10 +54139,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - EnhancedStorageDevices - + EnhancedStorageDevices + - + @@ -39034,19 +54150,19 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone enhancedstorage.admx EnhancedStorage~AT~System~EnStorDeviceAccess TCGSecurityActivationDisabled - + @@ -39069,10 +54185,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowBuildPreview - + AllowBuildPreview + - + 2 @@ -39080,21 +54196,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowEmbeddedMode - + AllowEmbeddedMode + - + 0 @@ -39102,21 +54218,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowExperimentation - + AllowExperimentation + - + 1 @@ -39124,21 +54240,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowFontProviders - + AllowFontProviders + - + 1 @@ -39146,21 +54262,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLocation - + AllowLocation + - + 1 @@ -39168,21 +54284,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowStorageCard - + AllowStorageCard + - + 1 @@ -39190,21 +54306,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowTelemetry - + AllowTelemetry + - + 3 @@ -39212,21 +54328,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUserToResetPhone - + AllowUserToResetPhone + - + 1 @@ -39234,21 +54350,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - BootStartDriverInitialization - + BootStartDriverInitialization + - + @@ -39256,47 +54372,47 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone earlylauncham.admx EarlyLaunchAM~AT~System~ELAMCategory POL_DriverLoadPolicy_Name - + - DisableOneDriveFileSync - + DisableOneDriveFileSync + - + - This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. + This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. 0 - + - + - text/plain + text/plain - + - DisableSystemRestore - + DisableSystemRestore + - + @@ -39304,25 +54420,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone systemrestore.admx SystemRestore~AT~System~SR SR_DisableSR - + - TelemetryProxy - + TelemetryProxy + - + @@ -39330,15 +54446,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -39361,10 +54477,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowIMELogging - + AllowIMELogging + - + 1 @@ -39372,22 +54488,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowIMENetworkAccess - + AllowIMENetworkAccess + - + 1 @@ -39395,22 +54511,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowInputPanel - + AllowInputPanel + - + 1 @@ -39418,22 +54534,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseIMESurrogatePairCharacters - + AllowJapaneseIMESurrogatePairCharacters + - + 1 @@ -39441,22 +54557,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseIVSCharacters - + AllowJapaneseIVSCharacters + - + 1 @@ -39464,22 +54580,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseNonPublishingStandardGlyph - + AllowJapaneseNonPublishingStandardGlyph + - + 1 @@ -39487,22 +54603,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowJapaneseUserDictionary - + AllowJapaneseUserDictionary + - + 1 @@ -39510,22 +54626,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowKeyboardTextSuggestions - + AllowKeyboardTextSuggestions + - + 1 @@ -39533,21 +54649,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowLanguageFeaturesUninstall - + AllowLanguageFeaturesUninstall + - + 1 @@ -39555,22 +54671,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludeJapaneseIMEExceptJIS0208 - + ExcludeJapaneseIMEExceptJIS0208 + - + 0 @@ -39578,21 +54694,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ExcludeJapaneseIMEExceptJIS0208andEUDC - + ExcludeJapaneseIMEExceptJIS0208andEUDC + - + 0 @@ -39600,22 +54716,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - ExcludeJapaneseIMEExceptShiftJIS - + ExcludeJapaneseIMEExceptShiftJIS + - + 0 @@ -39623,16 +54739,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -39655,10 +54771,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSet24HourClock - + AllowSet24HourClock + - + 0 @@ -39666,16 +54782,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain desktop - + @@ -39698,10 +54814,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - ActiveHoursEnd - + ActiveHoursEnd + - + 17 @@ -39709,21 +54825,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ActiveHoursMaxRange - + ActiveHoursMaxRange + - + 18 @@ -39731,21 +54847,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ActiveHoursStart - + ActiveHoursStart + - + 8 @@ -39753,21 +54869,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowAutoUpdate - + AllowAutoUpdate + - + 2 @@ -39775,21 +54891,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowMUUpdateService - + AllowAutoWindowsUpdateDownloadOverMeteredNetwork + - + 0 @@ -39797,22 +54913,44 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + + + + AllowMUUpdateService + + + + + + 0 + + + + + + + + + + + text/plain phone - + - AllowNonMicrosoftSignedUpdate - + AllowNonMicrosoftSignedUpdate + - + 1 @@ -39820,21 +54958,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUpdateService - + AllowUpdateService + - + 1 @@ -39842,21 +54980,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartDeadlinePeriodInDays - + AutoRestartDeadlinePeriodInDays + - + 7 @@ -39864,21 +55002,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartNotificationSchedule - + AutoRestartNotificationSchedule + - + 15 @@ -39886,21 +55024,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AutoRestartRequiredNotificationDismissal - + AutoRestartRequiredNotificationDismissal + - + 1 @@ -39908,21 +55046,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - BranchReadinessLevel - + BranchReadinessLevel + - + 16 @@ -39930,21 +55068,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferFeatureUpdatesPeriodInDays - + DeferFeatureUpdatesPeriodInDays + - + 0 @@ -39952,21 +55090,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferQualityUpdatesPeriodInDays - + DeferQualityUpdatesPeriodInDays + - + 0 @@ -39974,21 +55112,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferUpdatePeriod - + DeferUpdatePeriod + - + 0 @@ -39996,21 +55134,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DeferUpgradePeriod - + DeferUpgradePeriod + - + 0 @@ -40018,21 +55156,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - DetectionFrequency - + DetectionFrequency + - + 22 @@ -40040,21 +55178,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartDeadline - + EngagedRestartDeadline + - + 14 @@ -40062,21 +55200,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartSnoozeSchedule - + EngagedRestartSnoozeSchedule + - + 3 @@ -40084,21 +55222,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - EngagedRestartTransitionSchedule - + EngagedRestartTransitionSchedule + - + 7 @@ -40106,21 +55244,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ExcludeWUDriversInQualityUpdate - + ExcludeWUDriversInQualityUpdate + - + 0 @@ -40128,21 +55266,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - FillEmptyContentUrls - + FillEmptyContentUrls + - + 0 @@ -40150,21 +55288,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - IgnoreMOAppDownloadLimit - + IgnoreMOAppDownloadLimit + - + 0 @@ -40172,21 +55310,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - IgnoreMOUpdateDownloadLimit - + IgnoreMOUpdateDownloadLimit + - + 0 @@ -40194,219 +55332,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - PauseDeferrals - + ManageBuildPreview + - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseFeatureUpdates - - - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseFeatureUpdatesStartTime - - - - - - - - - - - - - - - - - text/plain - - - - - PauseQualityUpdates - - - - - - 0 - - - - - - - - - - - text/plain - - - - - PauseQualityUpdatesStartTime - - - - - - - - - - - - - - - - - text/plain - - - - - PhoneUpdateRestrictions - - - - - - 4 - - - - - - - - - - - text/plain - - - - - RequireDeferUpgrade - - - - - - 0 - - - - - - - - - - - text/plain - - - - - RequireUpdateApproval - - - - - - 0 - - - - - - - - - - - text/plain - - - - - ScheduledInstallDay - - - - - - 0 - - - - - - - - - - - text/plain - - - - - ScheduledInstallTime - - - + 3 @@ -40414,65 +55354,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - ScheduleImminentRestartWarning - + PauseDeferrals + - - - - 15 - - - - - - - - - - - text/plain - - - - - ScheduleRestartWarning - - - - - - 4 - - - - - - - - - - - text/plain - - - - - SetAutoRestartNotificationDisable - - - + 0 @@ -40480,21 +55376,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - SetEDURestart - + PauseFeatureUpdates + - + 0 @@ -40502,43 +55398,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - UpdateServiceUrl - + PauseFeatureUpdatesStartTime + - - - - CorpWSUS - - - - - - - - - - - text/plain - - - - - UpdateServiceUrlAlternate - - - + @@ -40546,16 +55420,412 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain + + + + + PauseQualityUpdates + + + + + + 0 + + + + + + + + + + + text/plain + + + + + PauseQualityUpdatesStartTime + + + + + + + + + + + + + + + + + text/plain + + + + + PhoneUpdateRestrictions + + + + + + 4 + + + + + + + + + + + text/plain + + + + + RequireDeferUpgrade + + + + + + 0 + + + + + + + + + + + text/plain + + + + + RequireUpdateApproval + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallDay + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallEveryWeek + + + + + + 1 + + + + + + + + + + + text/plain + + + + + ScheduledInstallFirstWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallFourthWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallSecondWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallThirdWeek + + + + + + 0 + + + + + + + + + + + text/plain + + + + + ScheduledInstallTime + + + + + + 3 + + + + + + + + + + + text/plain + + + + + ScheduleImminentRestartWarning + + + + + + 15 + + + + + + + + + + + text/plain + + + + + ScheduleRestartWarning + + + + + + 4 + + + + + + + + + + + text/plain + + + + + SetAutoRestartNotificationDisable + + + + + + 0 + + + + + + + + + + + text/plain + + + + + SetEDURestart + + + + + + 0 + + + + + + + + + + + text/plain + + + + + UpdateServiceUrl + + + + + + CorpWSUS + + + + + + + + + + + text/plain + + + + + UpdateServiceUrlAlternate + + + + + + + + + + + + + + + + + text/plain phone - + @@ -40578,10 +55848,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowAutoConnectToWiFiSenseHotspots - + AllowAutoConnectToWiFiSenseHotspots + - + 1 @@ -40589,21 +55859,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowInternetSharing - + AllowInternetSharing + - + 1 @@ -40611,21 +55881,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowManualWiFiConfiguration - + AllowManualWiFiConfiguration + - + 1 @@ -40633,21 +55903,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWiFi - + AllowWiFi + - + 1 @@ -40655,21 +55925,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowWiFiDirect - + AllowWiFiDirect + - + 1 @@ -40677,21 +55947,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - WLANScanMode - + WLANScanMode + - + 0 @@ -40699,15 +55969,357 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + + + + + WindowsDefenderSecurityCenter + + + + + + + + + + + + + + + + + + + CompanyName + + + + + + + + + + + + + + + + + text/plain + + phone + + + + DisableAppBrowserUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableEnhancedNotifications + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableFamilyUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableHealthUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableNetworkUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableNotifications + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisableVirusUI + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + DisallowExploitProtectionOverride + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + Email + + + + + + + + + + + + + + + + + text/plain + + phone + + + + EnableCustomizedToasts + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + EnableInAppCustomization + + + + + + 0 + + + + + + + + + + + text/plain + + phone + + + + Phone + + + + + + + + + + + + + + + + + text/plain + + phone + + + + URL + + + + + + + + + + + + + + + + + text/plain + + phone + @@ -40730,10 +56342,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowSuggestedAppsInWindowsInkWorkspace - + AllowSuggestedAppsInWindowsInkWorkspace + - + 1 @@ -40741,22 +56353,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowWindowsInkWorkspace - + AllowWindowsInkWorkspace + - + 2 @@ -40764,16 +56376,16 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + @@ -40796,10 +56408,10 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - DisableLockScreenAppNotifications - + DisableLockScreenAppNotifications + - + @@ -40807,25 +56419,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone logon.admx Logon~AT~System~Logon DisableLockScreenAppNotifications - + - DontDisplayNetworkSelectionUI - + DontDisplayNetworkSelectionUI + - + @@ -40833,25 +56445,25 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone logon.admx Logon~AT~System~Logon DontDisplayNetworkSelectionUI - + - HideFastUserSwitching - + HideFastUserSwitching + - + This policy setting allows you to hide the Switch User interface in the Logon UI, the Start menu and the Task Manager. If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged on to the computer that has this policy applied. The locations that Switch User interface appear are in the Logon UI, the Start menu and the Task Manager. If you disable or do not configure this policy setting, the Switch User interface is accessible to the user in the three locations. 0 @@ -40859,15 +56471,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + @@ -40890,10 +56502,54 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - AllowProjectionFromPC - + AllowMdnsAdvertisement + - + + + This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. + 1 + + + + + + + + + + + text/plain + + + + + AllowMdnsDiscovery + + + + + This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. + 1 + + + + + + + + + + + text/plain + + + + + AllowProjectionFromPC + + + This policy allows you to turn off projection from a PC. If you set it to 0, your PC cannot discover or project to other devices. @@ -40903,21 +56559,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowProjectionFromPCOverInfrastructure - + AllowProjectionFromPCOverInfrastructure + - + This policy allows you to turn off projection from a PC over infrastructure. If you set it to 0, your PC cannot discover or project to other infrastructure devices, though it may still be possible to discover and project over WiFi Direct. @@ -40927,21 +56583,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowProjectionToPC - + AllowProjectionToPC + - + This policy setting allows you to turn off projection to a PC If you set it to 0, your PC isn't discoverable and can't be projected to @@ -40951,22 +56607,22 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain phone - + - AllowProjectionToPCOverInfrastructure - + AllowProjectionToPCOverInfrastructure + - + This policy setting allows you to turn off projection to a PC over infrastructure. If you set it to 0, your PC cannot be discoverable and can't be projected to over infrastructure, though it may still be possible to project over WiFi Direct. @@ -40976,21 +56632,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - AllowUserInputFromWirelessDisplayReceiver - + AllowUserInputFromWirelessDisplayReceiver + - + 1 @@ -40998,21 +56654,21 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + - RequirePinForPairing - + RequirePinForPairing + - + This policy setting allows you to require a pin for pairing. If you turn this on, the pairing ceremony for new devices will always require a PIN @@ -41022,15 +56678,15 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on - + - + - text/plain + text/plain - + From bc3964add18e7e88a17959a20cba170a854c859c Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 30 Jun 2017 20:55:12 +0000 Subject: [PATCH 6/8] Merged PR 2029: 12586663 VPNv2 CSP, updated the code sample for CryptographySuite 12586663 VPNv2 CSP, updated the code sample for CryptographySuite --- windows/client-management/mdm/vpnv2-csp.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/vpnv2-csp.md b/windows/client-management/mdm/vpnv2-csp.md index 9e26467563..c982bb06b0 100644 --- a/windows/client-management/mdm/vpnv2-csp.md +++ b/windows/client-management/mdm/vpnv2-csp.md @@ -1215,7 +1215,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/EncryptionMethod - PFS2048 + AES128 @@ -1224,7 +1224,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/IntegrityCheckMethod - Eap + SHA256 @@ -1233,7 +1233,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/DHGroup - SHA256 + Group2 @@ -1242,7 +1242,7 @@ Servers ./Vendor/MSFT/VPNv2/VPNProfileName/NativeProfile/Authentication/CryptographySuite/PfsGroup - AES128 + PFS2048 From bf0bdafa5bbf36e19ffa9599c103d532f19483cc Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Fri, 30 Jun 2017 14:16:26 -0700 Subject: [PATCH 7/8] updates from review --- education/windows/get-minecraft-device-promotion.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/education/windows/get-minecraft-device-promotion.md b/education/windows/get-minecraft-device-promotion.md index b50cdc323f..7f9fedb193 100644 --- a/education/windows/get-minecraft-device-promotion.md +++ b/education/windows/get-minecraft-device-promotion.md @@ -64,9 +64,9 @@ After that, we’ll add the appropriate number of Minecraft: Education Edition l ![Proof of purchase page with Invoice area highlighted.](images/msfe-device-promo-success.png) -6. Choose a group of subscription, click **Actions**, and then click **Manage** to distribute licenses. +6. Click **Actions** and then click **Manage** to go to the management page for **Minecraft: Education Edition** and distribute licenses. ## Distribute Minecraft: Education Edition licenses Teachers or admins can distribute the licenses: -- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md) -- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md) \ No newline at end of file +- [Learn how teachers can distribute **Minecraft: Education Edition**](teacher-get-minecraft.md#distribute-minecraft) +- [Learn how IT administrators can distribute **Minecraft: Education Edition**](school-get-minecraft.md#distribute-minecraft) \ No newline at end of file From 327f3a4bed92330b0c06a63259d3b075d37568b8 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 30 Jun 2017 21:29:50 +0000 Subject: [PATCH 8/8] Merged PR 2031: Fixed future release reference --- windows/deployment/windows-10-auto-pilot.md | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/windows/deployment/windows-10-auto-pilot.md b/windows/deployment/windows-10-auto-pilot.md index 9d8881dce7..7413ecc71c 100644 --- a/windows/deployment/windows-10-auto-pilot.md +++ b/windows/deployment/windows-10-auto-pilot.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: deploy author: DaniHalfin ms.author: daniha -ms.date: 06/28/2017 +ms.date: 06/30/2017 --- # Overview of Windows AutoPilot @@ -86,10 +86,7 @@ Options available for Windows 10, Version 1703: * Skipping privacy settings * Preventing the account used to set-up the device from getting local administrator permissions -Additional options we are working on for the next Windows 10 release: -* Skipping EULA -* Personalizing the setup experience -* MDM Support +We are working to add additional options to further personalize and streamline the setup experience in future releases. To see additional details on how to customize the OOBE experience and how to follow this process, see guidance for Microsoft Store for Business or [Partner Center](https://msdn.microsoft.com/partner-center/autopilot).