????

Your IP : 216.73.216.152


Current Path : C:/Windows/System32/en-US/
Upload File :
Current File : C:/Windows/System32/en-US/IpsmSnap.dll.mui

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$��<߱�R���R���R�U�����R�U�P���R�Rich��R�PEL�!�

���@ �8.rdata�@@.rsrc� �@@���3
T88���3$��8.rdata8x.rdata$zzzdbg �.rsrc$01�5P�.rsrc$02 ��g6f$�!mV� �����0Qh�}$���3x
�8�P�������0��H��`��x������������������� ��8�!P�h�����������?��@�A(�B@�^X�_p�`��a��b��c��~�������0��H��`��x�������9��:��;���� �b8��P�h��
����
����
����
����
����
�����	(	8	H	X	h	x	�	�	�	�	�	�	�	�			(	8	H	X	h	x	�	�	�	�	�	�	�	�					(		8		H		X		h		x		�		�		�		�		�		�		�		�		
	
	(
	8
	H
	X
	h
 +���+��x.��$5<�`6��\7��0<�P=��E�(J�(Lb��P<��V��TX��@Z�X\���]���`���av�c���d��e���g��i`�,j��k<�Pm�doT��o��qj�<rB��s��uB�Pw���z������\�t�Ѓ������ ��
����ܙ��F�<�@�|�v��������T��	�ط�	�X�8	���x	���	����	�MUINTBANNER.GIFSRVR.BMPSRVRROLL.BMPTOOL.BMPTOOLROLL.BMPWLCM.BMPWLCMROLL.BMP����S��_F	m�=�[�f�6A�؋A1�zP3����MUIen-US��@�H
��Auto UpdatesMS Shell Dlg PM	h���&Enable auto refreshP4*���Refresh interval:P|m���&minutes� �PQ(i���6Prlmsctls_updown32Spin1P�+���&seconds� �P�(j���6P�nmsctls_updown32Spin2X<i
����Ena&ble DNS name resolutionP�P������� PA��@̀��GeneralMS Shell DlgP
���Source:P

���Port:P"
����8888P=
���Address:��P_�����P\8
����555.555.555.555P�
����Mask:P�8
����555.555.555.555P&
���Destination:P&
���Port:P"&
����8888P=&
���Address:��P_%�����P\&8
����555.555.555.555P�&
����Mask:P�&8
����555.555.555.555P2&

���Protocol:PF2�
����TCPP=2
���Inbound action:PF=�
����Negotiate SecurityPI9
���Outbound action:PFI�
����Negotiate SecurityPT6
���Connection type:PFT�
����RASP`4
���Mirrored:PF`�
����YesPl4
	���Policy name:��PCk�����P{�
�������The &specific filters expanded from this generic filter:	��P��M�SysListView32List1PA��@̀��GeneralMS Shell DlgP	�
�������&Security methods for this IKE policy:
��P���SysListView32List1@��F����&Properties...��@̀��GeneralMS Shell DlgP
�
�������Q&uick mode policy security methods:	��P���SysListView32List1PA��@̀��GeneralMS Shell DlgP
���Source:P

���Address:��P7�����P78
����555.555.555.555Pw
����Mask:P�8
����555.555.555.555P&
���Destination:P&
���Address:��P7%�����P7&8
����555.555.555.555Pw&
����Mask:P�&8
����555.555.555.555P49
���Connection type:PE4�
����RASP@4
���Mirrored:PE@�
����YesPL4
���Policy name:��PCK�����Pg��������Pn�
�������The &specific main mode filters expanded from this generic filter:	��Pz�X�SysListView32List1PA��@̀��Authentication MethodsMS Shell DlgP
��������A&uthentication method preference order:
��P�U�SysListView32List1PA��� Ȑ#lFind Matching Quick Mode FiltersMS Shell DlgP�W�����Source	PG
����&Any	PG
8���&Me	P9c
����A &specific address:#P)(X:���@*FX
2���P��W�����Destination	P�G
����A&ny	P�G
9���M&e	P�9c
����A s&pecific address:#P�(X;���@�FX
3���P`B�����P&rotocol:!P+^CG����� �Ps^"
����7P�^
msctls_updown32Spin2Pr(�����Source Port:	P~+
.���Any Por&t	P�+
/���Spe&cific:� �PL�(����P�r5�����Destination Port:	P�~+
0���An&y Port	P��+
1���Speci&fic:� �P��(����P�.�����Filter direction:P=�B����&InboundP=�C����&OutboundP��0�����Search criteria:	P��]
����Fin&d the best match only	P��C
����Find a&ll matchesP�^�����P�,�����Search Res&ult (only find matching filters that negotiate security):	��P�^2�SysListView32List1P22����Searc&hP2 2���ClosePA��� ȐqFind Matching Main Mode FiltersMS Shell DlgP�\�����Source	PG
����&Any	P"
2���&Me	P<c
����A &specific address:#P),X!6���@)JX4���P��\�����Destination	P�G
����A&ny	P�"
3���M&e	P�<c
����A s&pecific address:#P�,X7���@�JX5���P
h.�����Filter direction:PDhK����&InboundPDwK����&OutboundP�h/�����Match criteria:	P�i]
����&Find the best match only	P�uC
����Fin&d all matchesP�c�����P�������Search Resul&t: 	��P�cc�SysListView32List1P72����Searc&hP7 2���ClosePA��� ȀoAdd ComputerMS Shell DlgP	X�����Add the following computer:	P	=
����&This computer	P	)[
����The &following computer:��P6�����P�6D����&Browse...PR������P�Z2���OKP�Z2���Cancel��@̀��GeneralMS Shell DlgP
���Me:��P_����P�
���Peer:��P�_����P0
���Authentication:P@k���� P")
���Policy name:��P>!�����P0�<,���Selected security methodP<P
���Encryption:P�<k
����BlahPGP
���Integrity:P�Gk
����BlahPRD
���Diffie-Hellman group:P�Rk
����BlahP]L
���Key lifetimes (KB/Sec):P�]k
����BlahPq�
�������Q&uick mode SAs established from this main mode SA:	��P|�V�SysListView32List1PA��@̀��GeneralMS Shell DlgP
���Me:��P'I����P�(
���Peer:��P�I����P'
���My port:P42
����80P�6
���Peer port:P�8
����80P
 ���Protocol:PUk
����TCPP+E
'���My tunnel endpoint:PV+D
����111.111.111.111P7L
(���Peer tunnel endpoint:PV7D
����111.111.111.111PF��������PO?
&���Policy name:��PMM�����P]�W-���Selected security methodPi0
!���AH integrity:P�ik
����BlahPtP
)���ESP confidentiality:P�tk
����BlahP,
"���ESP integrity:P�k
����BlahP�L
#���Key lifetimes (KB/Sec):P��k
����BlahP�,
$���PFS enabled:P��k
����BlahP�:
%���PFS DH Group:P��k
����BlahIP Security MonitorSizeTypeIP Security Monitor
Computer NameCategoryNameGeneric FiltersSource Tunnel EndpointDestination Tunnel EndpointSecurity AssociationsIP Security MonitorSourcePADestination
Quick ModeSpecific FiltersSource PortDestination PortProtocol	Direction	Main ModeNameNumber of Security MethodsIKE PoliciesNameNumber of Security MethodsNegotiation PoliciesIP Security MonitorIP Security Monitor ExtensionGeneric FiltersSpecific FiltersWeight$Main Mode Security Method PropertiesActionAuthentication MethodsAuthentication method bundlesGUID%1 - IP Security Statistics
Parameters
StatisticsNegotiation Policy
IKE PolicyAuthentication MethodsSecurity AssociationsMePeerAuthentication
Encryption	IntegrityDiffie-HellmanConnection TypeOutbound ActionInbound Action
Active PolicyItemDescriptionPolicy NamePolicy DescriptionPolicy Last ModifiedPolicy StoreOrganizational UnitLocal StoreDomain StorePolicy Not AssignedNot ApplicablePolicy PathGroup Policy Object Name
Not AvailableSummaryDetailFThe Internet Key Exchange (IKE) configuration could not be retrieved. iThe Internet Key Exchange (IKE) configuration could not be written to the Security Policy Database (SPD).Domain Store (cached)LThe IP Security Monitor snap-in is used to monitor the status of IP SecurityMicrosoft Corporation1.1Negotiation PolicyAH IntegrityESP Confidentiality
ESP IntegrityMePeerProtocolMy Port	Peer PortMy Tunnel EndpointPeer Tunnel Endpoint%1 (Default Response)%1 Items%1 (Default)PA-&Add Computer...
Adds a computer to the list.,Re&connect
Reconnects the selected computer.N&Statistics...
Displays IP Security statistical information for this computer.(&Taskpad
View the taskpad for this item.PA	DirectionSourceDestinationActionWeight
Encryption	IntegrityDiffie-HellmanSessionsIKE Authentication<None>MD5SHA1<None>DESPA3DES
Preshared KeyCertificate (DSS Signature)Certificate (RSA Signature)Certificate (RSA Encryption)KerberosHMAC-MD5	HMAC-SHA1AH IntegrityESP Confidentiality
ESP IntegrityKey Lifetimes (KB/Sec)PFS EnabledPFS DH GroupLow (1)
Medium (2)High (2048)Key Lifetimes (secs)EFind &Matching Filters...
Finds matching specific quick mode filters.MethodDetailsMeAnyDFind &Matching Filters...
Finds matching specific main mode filters.Negotiation Policy
IKE PolicyDerived from Main Mode
UnassignedPermitBlockNegotiate SecurityAnyICMPGGPTCPEGPPUPUDPHMPXNS-IDPRDPRVDAll connectionsLocal Area Network (LAN)
Remote AccessUnknownYesNoPAInboundOutbound%d/%d<None>$Properties of Authentication MethodsAuthentication MethodsActive Security AssociationsPending Key Operations
Key Additions
Key DeletionsRekeysActive TunnelsBad SPI PacketsPackets Not DecryptedPackets Not AuthenticatedPackets With Replay DetectionOffloaded Security AssociationsConfidential Bytes SentConfidential Bytes ReceivedAuthenticated Bytes SentAuthenticated Bytes ReceivedBytes Sent In TunnelsBytes Received In TunnelsOffloaded Bytes SentOffloaded Bytes ReceivedN/AAnyTransport Bytes SentPA
Total Acquire
IKE Main ModeIKE Quick ModeTransport Bytes Received
Other - %u
Key Deletions8All &Filters
Displays both transport and tunnel filters.8&Transport Filters Only
Displays only transport filters.2Tu&nnel Filters Only
Displays only tunnel filters.OtherInvalid Packets Received%Remove %1 from the list of computers?PAIP Security Monitor TasksGetting startedCHelpful information on getting started with the IP Security MonitorAdd a serverAdd a computer to the listPA
DNS Server(s)WINS Server(s)DHCP ServerDefault GatewayInternet Proxy
HTTP Proxy
My AddressPeer Address	ComponentCategory	Date/TimeMessageLogging InformationFirst Event
Last Event	Events OnPAPThe date/time in View Events From is later than the date/time in View Events To.InformationWarning
Error - %1
Verbose DebugSent IKE payloadReceived IKE payloadResent IKE payload&Clear Log...
Clears the logCookie PairInformationWarningErrorSent IKE PayloadReceived IKE PayloadPAAllResent IKE Payload
My IP AddressAny IP AddressA specific IP AddressA specific IP Subnet
Message ID&Filter ViewFilter ViewA specific DNS NameDo you want to clear the log?Unable to clear the log. A negotiation failure occurred. KAn authentication failure occurred. The certificate signature is not valid.EAn authentication failure occurred. The Kerberos ticket is not valid.CAn authentication failure occurred. The preshared key is not valid.PAQAn authentication failure occurred. The certificate trust could not be validated.KA negotiation failure occurred. The proposed security methods are not validAn unknown error occurred.A data load error occurred.KFor IPsec data to be logged, you must select at least one logging category.MYou must specify a maximum number of records to log in the range of %d to %d.,The logging properties could not be updated.mTo resolve the DNS name to an IP address, click Resolve, and then select the IP address that you want to use.mTo resolve the DNS name to an IP address, click Resolve, and then select the IP address that you want to use.#The DNS name could not be resolved.
%1 PropertiesMy address: %1 %2Peer address: %1 %2Cookie pair: %1 %2PAMessage ID: %1 %2Category: %1 %2Time: %1 %2Details: %1	No mode: Base mode: Main mode: Authentication only mode: Aggressive mode: 
ISAKMP info: Quick mode: New group mode: ISAKMP Unknown: Hash, KE, Nonce, SA, 
Proposal, Transform, ID, Cert, 	CertReq, Notify, Delete, 
VendorID, SSPI, NAT discovery, NAT original address, Signature, payloadpayload chainsNo matching filters foundAuthentication FailuresMy IDPeer IDS&tart Logging
Sto&p Logging&Save Log File As...
Out of memory$There are no viewed records to save.KFor IPsec data to be viewed, you must select at least one logging category.An unknown error occurred.  %d,You must enter a number from %d through %u. PYou must enter a number that is greater than zero for the auto refresh interval.$The computer is already in the list.�This console file was saved with a previous version of the IP Security Monitor snap-in that is not compatible with the current version.  The settings could not be restored.No status available.<The following error occurred while contacting the server %1:9You must enter a protocol number in the range of 0 to %u."The source port number is invalid.'The destination port number is invalid.LocalSystem�The specified user account does not have administrative permissions on the computer %1. Verify that the user name and password for the user account are correct, and that the user account has administrative permissions on computer %1.DThe user %1 already has administrative permissions on this computer.2The user %1 is already authorized for this device.�Account changes will take effect the next time the 'IPSEC Services' service is started.  Do you want to start the 'IPSEC Services' service now?bNeither inbound filters nor outbound filters are selected. You must select at least one direction.�The System Service Manager could not determine whether the account %1 has the 'Log On As A Service' right.  This service may not run correctly under the %1 account.�The account %1 could not be granted the 'Log On As A Service' right.  The 'IPSEC services' service may not run correctly under the %1 account.@The account %1 has been granted the 'Log On As A Service' right.!You must specify a computer name.AA multicast address is not a valid destination or source address.YYou must enter that is greater than zero in the first octet of this IP address or subnet.\You must enter a number that is greater than zero in the network portion of this IP address.YYou must enter a number that is greater than zero in the host portion of this IP address.BThe source address has been adjusted by the specified subnet mask.GThe destination address has been adjusted by the specified subnet mask.^You must enter a number that is less than 224 in the first octet of this IP address or subnet.5This is an invalid mask for the specified IP address.tThe description for the source IP subnet is being changed to "%1" because the subnet mask does not specify a subnet.yThe description for the destination IP subnet is being changed to "%1" because the subnet mask does not specify a subnet.7The source and destination address cannot be the same. Invalid character-Enter a valid IPv4 or IPv6 address or subnet.PAAn error occurred.jThere is not enough memory available to open this dialog box. Close some applications, and then try again.IP Security MonitorPAODummy error message corresponding to the first error message stored in our DLL.!The IPsec service is not running.xThe Security Policy Database component of the IPsec service is unavailable or incompatible with the IP Security Monitor.%1  %2%2

%1An error has occurred: %1!d!+This is the last possible message number +1PA�4VS_VERSION_INFO��
|O
|O?StringFileInfo�040904B0LCompanyNameMicrosoft Corporation`FileDescriptionIP Security Monitor Snap-inh$FileVersion10.0.20348.1 (WinBuild.160101.0800):
InternalNameipsmsnap.dll�.LegalCopyright� Microsoft Corporation. All rights reserved.JOriginalFilenameipsmsnap.dll.muij%ProductNameMicrosoft� Windows� Operating System>
ProductVersion10.0.20348.1DVarFileInfo$Translation	�GIF89a<��������������������������������������������������������ƽ���������ֽ��������ε�������量��眶眶Ɯ�������������献猦�������{��{��{��{��{y{s��s��s��sqskikc��c��cy�cacZ��Z��Zq{Zi{J��Jy�9��9i�1��1��1a�,<@��F�����������ED���������������������������������������������9�C�4��#�������������������������Ɇ�����=�Ń�*�A����@�.|���׆G8|������GT���?H�pP���Ǐ C�I��ɓ(;�+4��9_���'�� ��Oб�@(@)"Q"��T�F!
'���IWSj�ʵ�ׯ`Êۉ�ٳhӪ]˶�۷f�wȝKw����ʝ@ �޿z?�Mp���*^̸��ǐ#K�L���˘3k�̹��ϠC�M���ӨS7�������Wv�‡��(�@-�->��7�������Z�t�3�|xq�ȓ�Vͽ����ËO������w�+��
�ki�ݮ��,��X��}l���h��DZ�n�i�V�z
x�&�zf��v�� �("x
���|�F_c0xX��5t��p�Z���\.���[3�f�Z9ҵ�H&��L6��P�$�R.C֕Xf��\v���Pi9�"�0�89���=�XI"HxTɝx⠧%}� D%YER(��&�袌6�(�b�T�F�� kʃLM���O�$�%���T��$%�`�X�譸�뮼��
�+��J`��6@,  �����@l,��ö��`�T���v0���:�˭�;A	+|k�fEp��$�0��%�C
&�k�'���7���G,��Wl��g���w��� �,��$�l��(������Y�͵b_*:�`%��7�@An9!p��x���,�Z�%CZB�XtZE�%�Pf���\w��`s� �����1�,Y�-�hV�m���YU�uÍL�N�w�}���an��'���^��Vӆ�]scN�mi����'օw�;���7�a���9]�;���.�촣'��"������/<,����'����7�<�����!=MFѦ��S�Kժ���o���}9�@�N�)���L@��/�)��Q��, V�� 0��$� �{� }aA� %����(LaJ�7L�@�B��z��8<�F*�D0"���PP�*`V�ġTH�*Z�X��>�'4Ğ�|�O�J@�
@�R	�@���Q&a(n�VỴ���>Jb��p�1�1mj8�D��aTR�E�+	
��J�0�@#~/�.��T�(E<Bb��.��V��T�c���?�k���B6��v��0�I�bI�9R��d�%eC�p>����5�̦6���nz�ji�
z����E��>0[�Eim{v�R9�n12���Nx�L��K=�΂�M(��C:����;�c�l.ǚS#���#P�r0̏��_N':i��\:�Q�)�0��Lg*�1���1gN+����.9�iirj$���/,�Z>����e�4��T�Jժ:�u�ʍ�$��
4�Ѐa̲����,e�K�X�T��%��A�p6W�m�����U��׾�5�X%k�t�"�8���Y��O�v-G�X����(tP��f7���z���
�hG�Y㙶J�L�jW���^ⴰ�E�\K����%��n1[����
�������0��[�roBp��k*�Z�����)��"�%5��!Q��@�xˆ)����׺��/fx������m4�H����0,Y���"�(�MAA#=���""�G�"�8�$D�@v23�$��X�JV&~ƫ�����,�!��2*x�C�a����
H�@bO����#(���T���U��_*���X���8�B�;�q����⥊$�w�I���)�d�L������>��w��� 
��0����" 		QE1�Z� $��Z�$b��R>�Ϡ���H#X.��Ĭ)(:�F#
	 ���
_�+�i�~zʿ���Ml��Z��`��K?B��R��k��O��D��8�"C���]�r���a�҂��eE�نs��l����&�%R����4ॉ����D�+�風���ħQjAȷ�2���+u�@������
���6�A�=�Y�R���gNsS̒�g)g3s�ٵP@���AFIK���=�.un��*�M�+ҧN��[���[�q�t����q��;�N�����k���Sy����Zz����S�,����9͟mB1r�pZ��P����[����-��;Y�7�[���k۰YΈ�1���
�NVń�0,{^�T�]-*����z���Ͻ�w����f�GK.g&��ɠCG��&����/b]�YH�巭�����y��{ߘр5Ŏ�.oo�E�v��u.��`��[�S���=ZK7O�|����� %@�U��	�T�aKї���|�d3S�x�R7��V; ��D|�"8�KR"��Y�$Mǁؗ�W@Rŀc�H�<؃>"�3{	h~C�Py�tj�����=V-�W:8P��X��ZH��s��y)L:Dw�~ ���u�!v�39���[8�tX���U'U���3�u;@��s����q�o1�_�u!�gA�z�ze��8���EQ(R����g�6]�}r��DWk1P-#��U��؊����Q�t~p�����(�z���g�o���ы������(��' �x�'wI،�!����֔w�մ�(��w@!�i�|���׍����V丌���8��X���!�;BM�	�(00A\A\���������������������������������������~}~wvwpopjhjcac



	
	
		
	
















			
	


			


	
		

	

		


		



	BM�	~(00A\A\������������������ڱ�ԥ�Θ�ɋ��ݼrڶeװXԪKѤ>Ξ1				


	
		
	
		
		

BM8	V(0*A\A\HH���������������������������������������������������������������������������������������������������������������������������������������������������~�~}~}|}zyzyxyxwxvuvvtvuturprpnponoomoljlkikigihfhgegfdfecedbdcac
>FB"FFF/
FFFF=FFFFFF)FFFFFFF7FFFFFFFFBFFFFFFFFF'FFFFFFFFF%FFFFFFFFF%FFFFFFFFF%FFFFFFFFF%FFFFFFFFF% FFFFFFFFF%;FFFFFFFFFF%6DFFFFFFFFF%6DFFFFFFFFF%6F-FFFFFFFFF%6F?FFFFFFFFF%8FF1FFFFFFFFF%.FFE0FFFFFFFFF%(FFFFC	:::::::::!FFFFFF5%FFFFFFFFC9322222222222222223
8FFFFFFFFFFFFFFFFFFFFFFFFFFF#2?AAAAAFFFFFFFFFFFFFFFFFFFFFFFFFFF<FFFFFFFFFAFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF&FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF4FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF;FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF/FFFFFFFFFFFFFFFFFFFFFF*,;FFFFFFF @FFFFFFFFFFFFFFFFFFFF+FFFFF$BCCCCCCCCCCCCCCCCCCBMx	�(0*A\A\XX�������������������������������������������������������������������������������������������������߻�޸�۲�ڰ�զ�Ԥ�Ӣ�Η�̔�̓�ˑ�ɋ�LJ�Ɔ�Ń�|�{�{ݼrܻn۸h۷g۷fڶeڵaٴaس]ز\رZرYװW֯U֭QխQԪKԩIԩHөHӨGӧDҦCҥ@ѥ@У<Т:Т9С7ϡ7Ϡ6Ϡ5Ϡ4ϟ3Ο3Ξ2Ξ1VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVDATVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF	-QVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF GVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF2VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF&NVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF:VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF	3VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF(VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV@0NVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV<VVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV"VVVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV
>VVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVVRVVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV!OVVVVVVVVF*VVVVVVVVVVVVVVVVVVVVVVV'5JUVVVVVH.VVVVVVVVVVVVVVVVVVVVVVV6*4BKMMNVVVVVVVVVVMMMKSVVVVVVVVVVVVVVVVVVN=VVVG54443VVVVVVVVVV;M,
VVVVVVVVVV1VVVVVVVVVVO
VVVVVVVVVVV)VVVVVVVVVVVIVVVVVVVVVVVV?VVVVVVVVVVVVV5VVVVVVVVVVVVVVE %#VVVVVVVVVVVVVVVL/8PC9$VVVVVVVVVVVVVVVVVV+7VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVBM�	�(00���������������������������������������~}~wvwpopjhjcac

	
	
						

	



						








	


		

	













		
	
		

		




							
					

				

	

	BM�	~(00������������������ڱ�ԥ�Θ�ɋ��ݼrڶeװXԪKѤ>Ξ1	


	








			









	




			
	









	
	

	
	






			
			



	
	

		
PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD