Samx Here
n1udSecurity


Server : Apache
System : Linux ks5.tuic.fr 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64
User : pragmatice ( 1003)
PHP Version : 8.2.24
Disable Function : NONE
Directory :  /bin/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //bin/clamdscan
ELF>@�@pa@8
@@@@���������E�E�000����P�PP�d�z`Z`j`j888  XXXDDS�td888  P�td������Q�tdR�tdP�PP�d�d/lib64/ld-linux-x86-64.so.2GNU��GNU�Ѯ#4�IB@�aT�Ww�pGNUl��lno�e�m����2����&|�� �8���+8�Z��YP�E!��R� 7�@����z	;E��\��hn��PG�z�K"s�����)���F/���@0L�, FJa��x�����>�&��s�l|o���"��K p$pR�_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecli_ctimecli_regfreecl_retdbdircli_strtokenizecli_strdupcli_chompcli_regexeccl_cvdheadcli_strntoulcli_realpathcl_cvdfreecl_retflevelcli_regcompcli_ftwcli_basenamecli_filecopyoptindfgetssleepfopen64perrorrenameatcloselogstrncpysetsidopenat64__stack_chk_fail__printf_chkexitsetgid__fdelt_chksigaddsetfreeaddrinfogetaddrinfosigactionbindsetuidstrrchrstrpbrkfflushmemmovegettimeofdaystrtolsocketinitgroupslocaltime_rforkstrlenreadsendwait__vsnprintf_chkdup2recvstdoutumaskoptargpthread_mutex_lock__sprintf_chkgetpwnamstrftimestrcasecmp__fprintf_chk__xpg_basenameoptoptmalloc__libc_start_mainstderrmemchrfcntl64sendmsgfstat64__cxa_finalizestrchr__syslog_chkkillgetenvcallocstpcpyfcloserenamefputsopterrconnectpthread_mutex_unlockgai_strerror__snprintf_chksigemptysetaccessstrtoulfilenogetcwdfwriteselectstrcmpunlinkat__errno_locationlchownstrncmpgeteuidlibclamav.so.11libc.so.6CLAMAV_PUBLICCLAMAV_PRIVATEGLIBC_2.34GLIBC_2.33GLIBC_2.15GLIBC_2.4GLIBC_2.3.4GLIBC_2.28GLIBC_2.2.5		
�0Ӈ_E�"
���
1���	<���Gii
Rti	\���hui	sP �X�`�Fh�Fp�Fx�F��F�0����������	0�� ��(��8	0XVHh��p���	0��R���������������
��
� 
��@
��H
��X
�h
���
���
���
��
���
���
���
��
��S ��00@��`��h��x(�����������4����������@���8��@��P0`���������N�����������U��������(\�8��X��`��pi��������@0���������[>��0��8��He>X��x������T>����������l>������� ��0��P8SX��hs��|������������������������(hS0��@��P��p��x������������������������G0(��H��P��`J>�������70����������-0 ��(��820H��h��p����������������A������A@��H��X�Ah���������������������� ��0��`��h��x������������������'���8��@��P0�`���������4�����������9��������(��8��X��`��p@�����������D����������N�0��8��HZ�x������i��������y����� ��P��X��h��x����S�����������S��������(T0��@��P��p��x�����������������������H��P��`��������������������|� ��(��8��X|�h��p�����������������������@��H��X
����������������� ��  ��0 �` ��h ��x $�� ��� ��� 1�� ��� 8T� ��!8�!��8!��@!��P!F�p!Q��!���!���!]��!���!���!���!i�"��"��("y�8"��X"pT`"��p"���"���"�T�"���"���"���"�T�"��#��#��0#��8#��H#��X#��x#U�#���#���# U�#���#���#��$��$�� $��0$��P$HUX$��h$�x$���$���$���$��$���$���$���$#�(%��0%��@%.�p%��x%���%9��%���%���%E��%��&��&��&K�(&��H&��P&��`&[�p&���&���&���&k��&���&���&���&v�'�� '��('��8'|�H'��h'��p'���'���'���'���'���'���'���'��(��(�� (��@(��H(��X(��h(���(���(���(���(���(���(���(���(��)�� )��0)��@)��`)��h)��x)���)���)���)���)���)���)���)��*��*�8*��@*��P*�p*���*���*���*��*���*���*���*!�+��+��+��(+%�H+��X+��`+��p++��+���+���+���+/��+���+���+��,3� ,��0,��8,��H,7�h,��x,���,���,;��,���,���,���,?��,O��,��-��-��-a� -o�0-��P-~�X-��`-��h-���-pU�-���-���-���-�U�-���-��.��(.�U0.��8.��P.�p.@Vx.���.���.���.���.���.��.��/�V/��/�(/��H/�VP/��X/��/*��/W�/5��/>��/���/I��/���/a��/k�0�� 0`W(0��00v�H0��h0�Wp0��x0���0���0 X�0���0���0���0@X1��1qH1��01|�@1�XH1|�P1��X1��h1���10Y�1���1���1��1xY�1���1�=2 Z 2�(2�`2XZh2/�p2:��2�Z�2J��2N��2���2�Z�2��3�=3��83�Z@3]�H3>�3([�3b��3l��3���3�[�3���3�>�3�4\4�� 4��84��X4�\`4��h4���4���4�\�4���4���4���4(]�4���4��5��05`]85��@5��X5��x5�]�5���5���5���5h^�5���5���5��6�^6��6��06��P68_X6��`6��x6���6�`�6K��6��6 a�6���6u>�6�7��(7�a07�87�>P7��p7�x7���7�>�7���7�a�7���75��7F��7��8�a8��8O�(8��H80bP8Y�X8]�p8���8�b�8���8v��8���8���8hd�8���8�� 9�d(9��09��H9��h9gp9��x9���9���9Xg�9���9���9���9���9��:��:� :��@:�gH:��P:
�h:���:�g�:���:!��:���:�g�:���:6�;i ;��(;;�0;��@;��`;hih;��p;D��;U��;n��;j�;n��;z��;���;���;hk�;��<��<��<��8<�k@<��H<��P<��`<�kp<���<l�<���<���<���<0m�<`m�<���<���<	��<��=n=�� =�(=�X=8n`=+�h=:�p=E��=�n�=Q��=a��=h��=���=8o�=���=p�>x�>��0>�p8>��@>��H>��X>��x>�q�>���>���>���>`r�>���>���>���>��?Xs?��?�� ?��0?��P?�sX?��`?��h?��x?���?t�?���?���?��?���?�t�?���?��?7�@��(@Xw0@��8@I�@@f�P@��p@�wx@TH�@z��@���@���@�w�@TH�@���@��AHxA��A��(A��HA�xPA��XA��`A��pA���Ay�A���A���A���A���A�y�A���A��A�B�� B�z(B��0B%�8B6�HB��hB({pB��xBI��BX��B���B�{�B���Bh��By��B���B|C��C��C�� C��@C�|HC��PC��XC��hC���C�|�C���C���C���C���C}�C���C���C��C��D�} D��(D)�0D<�@D��`D~hD��pDQ�xDl��D���Dx~�D���D���D���D���D�~�D��E��E��E��8Eh@E��HE��PE��`E���E��E���E���E���E���EȀ�E���E���E���E��F`�F�� F��(F��8F��XF�`F��hF
�pF��F���F��F#��F��F*��F��F ��F7��F��G��G�0G@�8G��@G'�HG<�XG��xG���GJ��G;��GM��G���G؇�G���GW��Ge��G�H��Ht�Hx� H��0H�PH��XHt�`H��hH��xH��H���H���H���H���H��HЋ�H���H���H��I�(I،0I�8I�@I�PI��pI��xI#��I'��I2��I���I0��I>��IB��IM��I��JP�JY�J\�Jk�(J��HJ��PJ|�XJ��`J��pJ���J0��J���J���J���J��J��J���J�� KP�(K��0K��hK��pK�xK��K8��K'��K8��K���K��L��LO� L��@LH�HL��PLb��Lx��Lw��L���L��L��L���L���L��M0� M��(M��@M��`M��hM��pM���M���M(��M���M���M���M���M��N��N��8NP�@N_�HN��`N���N���NG��N��N���N0��N���N(�O��O��(O3�XO��`O��hO@�pOJ��O���O���O���OV��Oa��O���O���O���On�P}�P��0P��8P��@P��HP��XP��xP���P���P���P���P�U�P���P���P4��P��Q`�Q��Q�� Q��0Q��PQȠXQ��`Q���Q���Q ��Q���Q
��Q`��Q��Q-�(R�0R�8R;�PR��pR8�xRTH�RG��R���R���R���RW��R��S�S��Se�(S��HSP�PS��XS{��S(��S���S���S���S���S�� T�(Tp�0T��hT��pT��xT���T���T���T���T���T�U
�U�@U �HUg>PU(��UP��Ua��U6��UB��U���U��U���UP��U`�V0� Vr�(Vz�0V��`V��hVr�pV��xV���Vث�Vr��V���V���V`��V��W��W��8WЬ@W��HW��`W���W��WK��W;��W���WX��W���W��W��W��X�X�� X$�8X��XX(�`X��hX1�pX;��X���X��X#��XE��X]��X���X0��X���Xk�Y��Y��0Yx�8Y��@Yf�HY��XY��xY���Y���Yȯ�Y��Y���Y��Y���Y���YB��Y��Zp�Z��ZV� Zr�0Z��PZ�XZ��`Z��hZ��xZ���Z}�Z���Z���Z���Z���ZH��Z���Z��([��0[��8[
�p[��x[���[ ��[���[���[4�\��\��\D�H\��P\��X\_�p\���\���\���\o��\���\���\���\���\��]�� ]��(]��0]��H]��h]��p]��x]���]���]���]���]���]�^��^��@^��H^��P^��^ص�^/��^��^��^J��^#�_`� _x�(_,�@_��P_4�`_طh_4�p_;��_���_F��_ط�_F��_Q��_X��_p��_���_p�`v�8`�@`��H`��``��p`���`��`���`���`h��`���`��a �a�� a��Xa(�`a��ha���a���a���a��a���a���a �0bh�8b��@b2�xb���b>��b��b(��b>��bD��b��c��c��c��0c��Pc��Xc��`cqH�c���c���c��c���c���c���cE�d��(d��0d��8d
�Pd��pd��xd���d�=�d���d���d���d��e��e��e�(e�He��Pe��Xe;�pe���e���e���e'��e���e���e���e��f�� f��(f��0f��Hf��hf��pf��xf���f���f���f���f���f���f��g��g�� g��@g��Hg��Pga�hg���g���g���g�>�g��g���g���g>h�� h��(h�=@h��`h��hh��ph���h���h��i��i�� i��0i��@i��Pi��`i��pi5��i���i���i��i��i��i��i(��i3�j>�jI� jT�0j*�@j_�ppp��o�ol�o�o(�o.�oQ�oi�l�l�l�l�l�l�l�l	�l
�l�l�l
�l�l�lmmmm m(m0m8m@mHmPmXm`mhmpm xm!�m"�m#�m$�m%�m&�m'�m)�m*�m+�m,�m-�m/�m0�m1�m2�m3n4n5n6n7 n8(n90n:8n;@n<Hn=Pn>Xn?`n@hnApnBxnC�nD�nE�nF�nG�nH�nI�nJ�nK�nL�nM�nN�nO�nP�nR�nS�nToUoVoWoX oY(oZ0o[8o\@o]Ho^Po_Xo``oahobpocxod�oe�of�og�oh�oj�okH��H���H��t��H����5R��%T�@�%R�h����%J�h�����%B�h����%:�h����%2�h����%*�h����%"�h����%�h�p����%�h�`����%
�h	�P����%�h
�@����%��h�0����%��h� ����%��h
�����%��h�����%��h���%��h����%��h�����%��h����%��h����%��h����%��h����%��h����%��h�p����%��h�`����%��h�P����%��h�@����%z�h�0����%r�h� ����%j�h�����%b�h�����%Z�h���%R�h ����%J�h!�����%B�h"����%:�h#����%2�h$����%*�h%����%"�h&����%�h'�p����%�h(�`����%
�h)�P����%�h*�@����%��h+�0����%��h,� ����%��h-�����%��h.�����%��h/���%��h0����%��h1�����%��h2����%��h3����%��h4����%��h5����%��h6����%��h7�p����%��h8�`����%��h9�P����%��h:�@����%z�h;�0����%r�h<� ����%j�h=�����%b�h>�����%Z�h?���%R�h@����%J�hA�����%B�hB����%:�hC����%2�hD����%*�hE����%"�hF����%�hG�p����%�hH�`����%
�hI�P����%�hJ�@����%��hK�0����%��hL� ����%��hM�����%��hN�����%��hO���%��hP����%��hQ�����%��hR����%��hS����%��hT����%��hU����%��hV����%��hW�p����%��hX�`����%��hY�P����%��hZ�@����%z�h[�0����%r�h\� ����%j�h]�����%b�h^�����%Z�h_���%R�h`����%J�ha�����%B�hb����%:�hc����%2�hd����%2�f�AVH��A���AUA��1�ATUSH��XdH�%(H��$P1��D$�D$j�ONAXAYH���H��H�5�H����L�x ����H�-��H��H����L�1�E1�H�xRA�1�j�MY^H��H����H�5�%H���L�x tf���f���H�5��H���mL�x t	f���H�5��H���OL�x t	f���H�5�#H���1L�x tUH���c����H���sLH�=d��gL1�����H���XL�3�H�5��1��g�����H�5�H����K�x tH�5��H���K�h ����H�5�H���K�x t
���H�518H���yK�x �1�H���H��H�5���WKH�߃x ud�)���+H���KH�=���K�f�����H��H���KH�5��H�P1��jH���TK�����5H�߉��;KH�=,��/K�*f������H���{
f��tf����"E�H���JH�=����J������9H�5���H��1�����O���H�@1�H�5��H���1��j�����H�5��1����eH���JH�=}��J�����H��$��$L��$�HDŽ$�H���H�����H��
�[���1�L��
���1��E���H�|$ 1�H�D$���H�T$H�t$H����H�=��A����IH�5�H���I�h ��t��dH����ID���h���1����1�H�|$0H�D$���H�D$8+D$(H�5����L�l$0D+l$ ��A)Յ��@BH�1��1���h�T$1�1�H�5l���h�T$�����c������Y�����D��<1��H�5c�����A����A�љ��D��L�l$@��1��hhH�|$L���;���H����H��$ L�5+�L��L��H�����1�H�5!�1�H���hH�|$L�����H��tjL��H��L���x���H��1�1�H�5���g���H�5��1�1���g����H�5��1�1��g����H�5w�1�1��g���H�5��g�H�5���}g�&����1�I��^H��H���PTE1�1�H�=5������f.�@H�=��H���H9�tH�&�H��t	�����H�=��H�5z�H)�H��H��?H��H�H�tH�
�H��t��fD�����=U�u+UH�=��H��tH�=��y����d����-�]������w����S�H��1�H��f���1��`b�51�H�5r�H��1��Hb1�1�H�5���8b1�1�H�5Ճ�(b1�1�H���b1�1�H�5��b1�1�H���b1�1�H�5����a1�1�H�5%���a1�H�5_�1���a1�H�5��1��a1�1�H�5ń�a1�1�H�5%��a1�1�H�5e��a1�1�H�5���a1�1�H�5ͅ�pa1�1�H�5-��`a1�1�H�5ņ�Pa1�1�H�5��@a1�1�H�5E��0a1�H�5��1�� a1�H�5��1��aH�5�1�1��aH�5A�1�1���`H�5y�1�1���`H�5��1�1���`H�5��1�1��`H�5a�1�1��`1�H��1��`1����f.�AWE��AVI��AUI��ATE��UH���SH��(�t$dH�%(H�D$1�H�D$���H���PH��H���H@����H����H���H���2�I��L�A�)�H�H������H�<Hc�1��u���ƃH�t$H��������tm1�H�ڿH�5l��cH��tdD�L$`�t$E��L��L��H��E��tX���H����H�D$dH+%(�}H��(��[]A\A]A^A_�@H���h�H�\$H��u�1��f.��;�����H��H������6���H�5����cH��1��
�������H�5<��1�1���b���f�AWH�5��AVAUATUSH��xH�=L�dH�%(H�D$h1���B�p ����H�=%�H�ʌH���B�P ��u'1�H�T$hdH+%(�UH��x[]A\A]A^A_�f�H�=�H��L�d$^�|BL����
L��L�H��
1���H�=��H�5]��EBH��H��t�H�D$L�t$ H�D$H�l$$L�kM��tL��H�51�����LD�H�L$f�L��L��L��EE�D$(�D$ E�c����L�l$M��uF�@A�EI�u��t��
u1�f�FA�UD���4����D���t�M�m(M��tCA�UA�uA�}��A�Dž�y��N�8��H�5 �1�H��1��aM�m(M��u�L�l$L���;�H�[0�&D���y�H�5���H��1���`H�[0H�������:����L�{�H��1�H�k�I�xL��H���H��H)���l���H��L��f�
8�H�r�k�*�����D�{�D���8bt#�n�H�|$������f.��K�H�|$�a�������AWAVAUATUSH��XdH�%(H��$H1�H�D$H����H�5@|I���?I��H����L�`M����L���:�I��H�����:H��A��+�H�l$H��t	�8�-L����H��
L��H����L��H���b�L�H9D$s+H�5���1��%_������zfDA���8���H�D$ 1�H�D$@H�=���%A�Dž�yuH��H�5\{L��H9����	?�@ ���NH�5W�1�1��^�M��tL����H��$HdH+%(��H��X��[]A\A]A^A_ÐH�|$�GDŽ$BzPINf��$F���H��$B�D���w����H�5���1��^D���D��*�����C>�P ��t,I��tFL��H�5��1���]D���������I��t:L��H�5(�1�1��]��D�H�5d��1��]�fD�H�5��1�1��{]�f�H�5A�1�1��`]���H�5�yL���=�H ��tZ1�����H�XH���L��
H��H��H���y�H��I���.�H�H9D$�����H�5Y��1���\����H�5k�1�1�1���\�(����H�5(���\���������DE1�1����H�5׃�1��\����ff.��AUATUSH��HdH�%(H��$8H�zVERSIONƄ$7H��$/�s���H�=Ը��"����H�\$A��H�l$��H����H��$/�	D���CA�Ņ�t�rf.����tKH�|$�!�1�H��H������u�D����H��$8dH+%(u=H��HD��[]A\A]�@H�5���1��[�D����A����USH��HdH�%(H��$8H�zRELOADH��$0�o���H�=з��!��xkH�l$�É�H����H��$0����J��uf1�H�t$H�����	~H�RELOADINH�D$H9tN�H�5�1���Z������H��$8dH+%(u-H��H��[]É��������xGu���1�����
�f.�AWAVI��AUI��H�5�vATUSH��H���dH�%(H��$�1��w:�H ����H�C@H��tCH�H��t;�8-u6�xu0H�5��H���A:�P ��uH�C@E1�H�xA����E1�����H�5u�H�߉��:h u'H�=S�H�5���9�@ ���E����H�5?�H��A���9�h H�=�H�5:��9H�=�H�5=�H�@H�D$�9H�=�H�51�H�@H�۵�v91�H�=ŵH�5)��@ ����҉T$�S9�T$�@ ����A�EE�����D$��H�{@H�5z��T$�D$��H���
9D�H E���eD1�H���n-H��t5�8-���x��H�5��1��X1�H���9-H��u�A�E����1�E�����H��$�dH+%(�nH���[]A\A]A^A_�DA�E��E���)���1�H�t$0������D$HH�=��%�=��DE����yE�]E��u>��n���@H��D��H��A��L$L��QD�D$L����^_A����@��0���fDH�����f���K���f���"�E������L�
�H�L$,1҉�E1�D���� �D$,����A�E���^�E�U1�E�������DH��H�t$�K7D�@ E����H�{@H�t$�6�������f�H�5��H��A��7�@ ���=���H�5u�H��E1���6�@ ��A��1�A������f.�H�5>�H���6D��H t�H�5�H��A��6�h ����@H�5��1��EV������i��U���H��L��L��A��D$D��H�=PD�D$ �~�ZYA������/��8���H�5Y1�H��H�C@H�1���U�����d�@H�5a��@AVAUATI��U��SH��H��M�(dH�%(H�D$1�H�$��u\H�5�H���M���1�H�<$H��t�u�L���m�H�D$dH+%(��H����[]A\A]A^�f.�H��H���%����%H�$H�5��H������u�A�E���RH�����Hc�H��fDH��H�5T��1���TA�E�K���H��H�5��1��TA�E�+���H�5)��1���TA�E����fDH�5)��1��eT���A�EA�}����H�=���A�ƅ�x}A�uL�
ʰH�ډ�I�MM�E�D�����F���xRA]�����������H��H�5�1���SH�5#�1���S���f.�A�E���A�E�8����6�L���N���ff.�AWI��AVAUATUS1�H��H�wdH�%(H��$81�L�d$ L�t$L���"H�D$H�$I�G H�D$�H����H�H�hA��~>H�|$�:���H��H����H�D$�x� FOUH�P����x� ERR�H������H�;H�GH�|$H�����L9�$(�-H�4$L��L���A�Ņ�x\�H�|$�
1�����…��K���I�G H�\$H��tD9�9���H�XH�@H��u�H�5�~�1��HR�H��$8dH+%(��H��H[]A\A]A^A_�f.�f�zND����A�H��H�5�~1�A�G1���QH���H����H������f�zOR����A�GH��1�1�A�GH�5w~�Q�����J���1��C���H�57~�1��sQH���{�����������AWAVAUATU��SH��H��(M� dH�%(H��$1�H�D$��u6H�5��H��������A�D$���H�~Hc�H��H�t$H�������t/H��H�5�{�1���PH�5
|�1��P�@H�����H�\$�x���fDH��H�5}�1��PA�D$@1�H��tH���y��H��$dH+%(unH��(��[]A\A]A^A_�f�H�5�{�1���(PA�D$�H��H�5~|�1��
PA�D$�f�H�5�{�1���O�p����s��L�t$L��$�E1�L���L����H�Ic|$�S��A�T$H��L���H��H	t�L���H�Hc��+��A�L$H��E1�L��H��yH	�Đ1�L�������xqIc|$���A�L$H��H��H��H#D���Hc�����A�L$H��H#�Đ�P���A�D$������tfA�D$A�D$���f����8����������H�5�z�H��1���N��E���L��� �����u�����H�މ�����~L����H��tYA�T$fHn�1�AD$ ��A�T$�@I�D$ ���H��H�މ���A�D$A�D$���q�������\���8���H�5&z�H��1��N�E���f.�ATI����D��UH��D��L�
���SH��H�
���H��0dH�%(H�D$(1��k��|$L���D$H�D$��E��L�D$�D$H�D$H�D$����D��5���T$U�T$ ��u	��t0��t+�T$���tNH�T$(dH+%(uUH��0[]A\�D�L$��u1���@L��H�5	z1�1��M1��f�L��H�5�y1�1��L1�����@AWA��AVE��AUI��ATI��UH��SD��H��XH�=a�dH�%(H�D$HH�zIDSESSI�D$8zEND�D$<H�D$=�D$DION�2�D$ ���H�t$=��������D�|$L�D$D��L����L�|$L�
{���H�D$H�
���L�|$�����D$�D$(����D��D$$H�D$0����������|$ H�t$8��*H�|$0tL���J�����t�|$ ����D$�\$A$]H�|$0uV��uJ�T$��t�D$(��uzH�D$HdH+%(�~H��X��[]A\A]A^A_�D�|$ �����뿐H�5�w�1��MK���D$E�D$A$�|$ �`����fDL��H�5x1�1��K�n������f.��AVAUATUH��SH���|��H���H��I���h��H��I������Hc��H�|�L��H�EH��H����M��1��L�^�H�
�wH�����L�-�w����Jf.�����8uvH��H�}M��L��SL���1�H����������XZ���t@H�}1�����������x�L���D$����D$H��[]A\A]A^�f.�L�����H�}����H�E����L���������AWAVAUATUSH��(@H�t$dH�%(H��$@1�H���4���H�$H���`H�<$H�l$��/H�����I��H�����H�=�~1����A�ǃ���I����1�L�-xH�t��>t6�D��1����A�ƃ��toD��E���$��H�T�L��1����HH��I9�u�H�D$1�D�8H�<$����H��$@dH+%(��H��(@��[]A\A]A^A_�f�H�T�H�5�u1�1��{HD�����������H�5�v1�1��\H��H�5Kv�NH���f�H�5Yv1�1��0H�H�5�v1�1��H�H�55v1��H�����ATUSH�� dH�%(H�D$1��D$����H�D$H����H�t$H��������uuH������H�T$H��H�����D�d$��utH�t$1�D���=���Ņ�u{H�|$H��t���A���tD�����H�D$dH+%(��H�� ��[]A\�H�5�v1�1�������3GD�d$�@��H��H�5�v1�1��G�������7���8����H��H�5�v1�H��1���F��1�H�5�u��FH�|$H��t����������W����L��ff.��H��tKSH�����H�څ�t#H�5�s�1��FH�1��[�@H�5�s1�1�[�gF��ff.�@ATUSH��H��dH�%(H�D$1�H���-�������L�$$H�߉�L���$��tPH��H�5�s�1��EH����M����H�D$dH+%(��H����[]A\����@1�1�L��H��H�5Us�E������M��tWH�D$dH+%(��H��L��[]A\���f.�H��H�5�r1�L�$$��VEH���M��uH�D$dH+%(u3H��[]A\�fDL��� ����fDL���������9���f������ff.�@AUATUSH��(dH�%(H�D$1�H�D$H���H�t$H�����H�l$A�ą����D$����H�D$H����H�t$H��������H�����H�T$H��H���p��D�l$���H�t$H�����D���n������H�|$H��t�7��A�����1�H��H��1�H�5�q�DD���/��H�D$dH+%(��H��(H��[]A\A]����f�H��H��H�5}q1���CH�d��H��u(H�D$dH+%(�7H��([]A\A]�f�H���x����t���D������F���1�H�5�s1��SCH�|$D�l$H���/�K��A����.D���Y��H��H���.��tBH��H��H�5�p1���CH����H��tbH�����D���������DH��������ulH��H��H�5�p1�1�L�l$�BD������M�������L������H�D$dH+%(�H��(D��[]A\A]���f.�����8�D��H�ڿH�55sH��1��;BL�l$냉�1�H��1�H�5�r�BH�|$H������A���tD���3��H��H���������H��H��H�5�o1����AH��������1�H�5�q1��AH�|$H�����������w��������8���1�H��H��I��H�5:r1��{AH�|$H��t�|��A����9����,��������ATUH��SH�0oH��H��dH�%(H��$�1��`!D�` E��uH��nH��H���E!�P ����H��H���/!H�5��H�xH�=������H�=����umH��thH���@����u�D$%�=@tlH�m�H�5�q�1��@�H��$�dH+%(��H�Ġ[]A\�f.�H��H�5nq1�1��M@1��f�E��H�F���H����H�=�HE�H�՜H��5���Ϝ1��{����H�5�mH���1 �@ ��t�H���H�
,���H�1��E����]��f.�AVA��AUA��ATI��UL��SE��tg1�L��L��D���g��H�Å�~H�I�)�tGA����f�����8��t��t��[��H�5�p�H��1��U?[�]A\A]A^��[1�]A\A]A^�DfHnlj�LJfl���ff.�@AWAVI��AUI��ATI��U�SH��E��H��E��u2H��A��H��H��L)�1�H)����I��A��A�Dž�~1�Ic�H������I��H����H)�D�A������I9�tHc�L���I��M��A��Hc�L�I��AdžE��E��u��Q���f�t>�I���8t��H�5�oL���2������H�5�o�1���=�f�I9�u�H��D��[]A\A]A^A_�f�H��H��H)�A)�E��I�uM��tI�$fIn�I��fl�E��t	fHn�fl�A��A�A)�떐H�5o�1��]=A������w���H�5[p�1��?=��ff.�f�UH��SH��H��tRH��H�5��SH�Ë@ ��uH��1�[]�H�[0H��t�H�sH�����u�H��H�5�n�1���<H���[]�@ATA��USH�ĀdH�%(H�D$x1��D$WH�zFILDESH�D$XH���H��1�1�H���9���Ņ���H�t$X�D���������H�D$Wf�1�H��H�D$@H�D$`D��H�D$ H�D$@H�D$H��pH�D$HH�D$0H�D$H�D$(H�D$`H�D$h�l$p)$���H���t/������H�T$xdH+%(ujH��[]A\�f.������8���H�5�m�H��1��;�����������1��
���f�H��H�5@m1�1��];1������@AWAVI��AUA��H��ATUSH��8 H�t$H�5fdH�%(H��$( 1��RH�XH�zINSTREAH��$ �Mf��$& M���1�L��1����A�ą��?H��$ �
D���������H�D$H�l$H�$�;f�E��H��D��L9�I��DB�D��A�VȉD$�������Ic�H)���H�4$��D���6��I��A�ƅ��D���t��E����H�L$H�6l�H�50lH��HE�H��1��:1�H��$( dH+%(��H��8 []A\A]A^A_��D�����������E1�����D�������L��D���D$�����f�H�T$H�5�l1�1��{9�d���L�|$����f.�AVH�5�cAUATUH��SH��`dH�%(H�D$X1��u�P ��t1Ҿ�H���z��A�ą���H�5LcH��L�l$N�;L�Bc�
L��L�H�1��
L�50c�`��H�5cH���H��H���"�C ���
H�kH��tL��H���������f�1�H�T$L��H�L$)D$)D$ �D$)D$0�/������H�l$H�����U�u�}���A�ą��p�UH�u���"����x.H�|$�d��H�D$XdH+%(��H��`D��[]A\A]A^�����8����H�S�H�5tkH��1���7D������H�m(H���l���H�l$H������H�[0H������A������t����f�H��H�T$L��H�L$)D$)D$ �D$)D$0� ���Dž��������H��H��H�5Zi�1��(7H�[0�a����H�5��n�����������(���8����H�S�H�5IjH��1���6D��������f.������8���H�5�h�H��1��6����f���H�-���"��H���<������DAWLc�AVAUM��ATA��USH��H���H�L$L�D$dH�%(H��$�1�H���}L��H�����D$����H��$�D��H������A������A���,L��H��D������D$�D$����D$E1�L�l$(L�d$ ��A���UL��L��H����������5����NH��u�H�T$ H�5�R1�1��L$A��X5�L$��~��L�t$ �:L�����H��H�����x t;�L�t$ �(L������H��t�L�t$ �:L������H��H���wH�D$(�x� FOUH�P����x� ERR� A�����E��yq�D$H�D$H��t�H�D$H��t�H��$�dH+%(�p�D$H���[]A\A]A^A_ÐH��D������D$�z���@A��u�H���Z��H��+I��Ic�L�4�L���A��E�lIc�D�l$���H�D$ H��H���#I��M��H�
Zf1�H�������^��H�t$ D��D����H�|$ ������������H��$���H���n�A���4���2A�������E������H�5@g1�1��o3�<f.�A���������@E�������H���"H�t$0H���������&�D$H%�=@�����H��H�5�e1�1��3��@f�zND����H�|$�@�tH�D$�A�����D$H�������A����H�T$ H�5Fe1�1�H�L$�2H�L$H�E��H�H�������H�|$ ������H�5�dL��螿�����H��dA��wH��)J��H�5_f1�1��.2�D$��������H�L$H���L���L�5[�H��L���0��H�L$��t!�H��L���D$貾���+�H�L$H��H�5id1�1���1H�t�H�H�����H������f�zOR����H�D$H��t�H�D$H��t�H�������A��~H��H�5:^1�1��[1���L��H�5bN1�1��C1�x���L��H�5�c1�1��+1����1������H�5�c1�1��1����蒾���-���8���H��H�5Le1�H��1���0�������8���H�5�d�H��1��0���@H��1����DH�9e��AWAVAUATUSH���}���H��1�1�jE1�A�1�H�=eI����ZYH���nH�5eH��H���|I�ŋ@ ��u*L��躼��H��H���H��H��[]A\A]A^A_�DM�uL��L���)�����t�L���
���L��H������H�|�h���H��H����L�=�dH�Ǿ1�M��L��H������)���H���\��������H���G�������H���W���I��H�����H��1�M��L��H����������H�����������H���������H�����I��H����H������A�FA9GsM�eL������L���������fDH��L��[]A\A]A^A_�Z���f.�H���Ȼ�����M�EH�
�cH��1�H�������������f.�H��舻��M�e�|���M��H�
EcH��1�H��������������H�c��.�H�=�cH��������DAVAUATUH��SH��dH�%(H�D$1�H���x����H�x�z���H��H���I��E1��H��1�M��H�
�bH������8����H���k�������E1�H��1�M��H�
lbH����������H���3�����tWH���&E��u~���H�5�I�H��1�覾��H�D$dH+%(�fH��H��[]A\A]A^�.���fDH����H��H��t�D�`E9����@0H�$�Ͼ��H����E��H���+���H���3���I��D��H��H�5�a1������l���f�H��舺��H��������P0H��D�hH�$�l����������I��H��tCH��苺��H�x��H��H��twM���z���f��+���H������f�L���H����������H��H�D$dH+%(uLH��H�5H�1�[]A\A]A^�Y���f�L��������H�D$dH+%(L��������W���H�D$dH+%(u�H��[]A\A]A^�f.�H��跽����1����vH���fD蛽�����H�RaA��H���H�81�趸���H���ff.�����ATUSH����t/H�S@H�������HH�‰
��[]A\�f.�H��H�5�U�1I�ċ@ ��t�H�X�H��tsH�D��H�����H����H���$��ϸ��H����H�
�H��u��H���t���
t�
t�[H��]A\�@I�|$H�5�����H�țH��H���i���H�]�I�L$�H�|`H�81�肷��H��t�E61������H�=y��,���1����D�[���ff.�ATL�%�^1�UL��SH�� dH�%(H�D$1��w����L��D$��1��b����L��D$��1��M�������ƒ���D$����������1�H�\$D�$���D���������tRH��H��u�H�l$�;��,H��H9�u�1�H�T$dH+%(��H�� []A\�@�;�����f�H��A��D��H�	^�H�l$H�81��8����;���t���H��H9�u����닺H�Є�H�=�]H�\$H�l$H��R����;���t趵��H��H9�u������fDS芹���Å�t��[�諶����[��H���g�����tH���fD������~�1��h����S���8����߾[�{���ff.�AUATUH��SH��H���[�����uH��u1�H��[]A\A]�DH���h���I��H����pH��聶������A�|$H��tA�t$��H���0������A�|$�޹����uJA�|$谹����t�H���A�L$�H��\H�81�誴��A�T$H�5�\1���2'�:H�I�A�L$�H��\H�81��n���A�T$H�5x\1���&�����@H����H�=\H�舸��H�5�[�1��&�H��H�5]�1��&H���H��H�)]�H�81��ڳ����L�-��I�$�1�H�']I�}讳��I�}H��1�H��[�蔳���_����8H������I�}�H�t[H��1��k����;��I�$H��H�5�\I���1���%���f�ATUH��SH��H��dH�%(H��$�1��G����������u*1�H��$�dH+%(��H�İ[]A\�DL�d$1��L���H�H�|$�d���1�L��H���H�D$�Y�����u=H��tH��H���5�����u5H�|$觱���D$��q������|$�O����H�=�Z蜲��������J����}���ff.�f�AU�ATI��U�SH��H��8dH�%(H��$(1�I��L���U�����uOH��蹲���|�/H�\$ te�L��H���M���E1�1�1�L��H��Ƅ$ 1��Ѷ��L��@���³��H��$(dH+%(u<H��8��[]A\A]��M��L��YH��1�����蕶���莱��ff.�1��?/����ATH�5X�USH��dH�%(H��$1��F���H��tZH��1�I��f�H��L��谲��H��t�<$#t����H��許��H��$dH+%(uH����[]A\�1����ް��f.�@USH��H��H��t<H���H�;H��tH���H�����tH�{H��tH���3�����t	H�[8H��u�H��H��[]�ff.��AWI��AVI���HAUI��ATM��UL��SH��H�T$�D���H���H�T$H��H����H���"���H�H����M����L������H�CH����M����L�����H�CH�����H�kH���f�H���C$C�H�C@C0�C �D$P�C(�D$X�C,I�EH��tPH�X8I�]1�H��[]A\A]A^A_��H�M���S���H�CM���`���H�C1��k���I�I�H�C8�H�;謮��H��褮�����H�{薮��H�;莮��H��膮����@AUI��ATI��UH��SH������H����H�Ë@$�C(uS��u9H�{H�����=���H��赭��H�CH����L�k�C$�C 1�H��[]A\A]�f���t��H��-���I��H����H��tH���T���I�D$H����M�l$H��fDH��H�@0H��u�L�b0H�{�f�L�k�C$H���o���H�CH��H���]����C �X���H�w|L��H��WH�81�螭�����2���H�O|�"�H�=�WH��ֱ����H�-|�"�H�=dWH�贱��L������H�|�"�H�=bWH�花����USH��H��H��t<H���H�;H��tH���ȯ����tH�{H��tH��賯����t	H�[8H��u�H��H��[]�ff.��H����ATI��USH�G@H��t7H�8H��t&�f.��;���I�D$@H�<H��H��u�H���!����I�\$0H��t5H�{tgH�;����H�{���H�{���H�k0H�����H��H��u�I�<$�ث��I�|$�Ϋ��I�|$�ī��I�\$8L��跫��H��tI���DH�[0�f�[]A\��f.�AWA�AVI��1�AUE��ATE��U1�SH��L�=�z�t$0L��$@H�T$(I�7�L$4dH�%(H��$�1�H�D$`L�T$XH�D$ L��M��D�\$I��A��H�D$`Ƅ$P:�:��C4��D!����u
E��tD��tM����M����I�7H��H�D�H��H�H��u�H�{u�H�D$XD�\$@M��Lc\$H�D$M���[H�5��L������H�D$H���LD���D$ %�D$�D$DD�d$LM����H�t$(�|$0H��$PH��$�L�D$TH���D$T�2�������:��
���pHcD$TH��L���M����
H��H�H�|$L�����H���K
HcP,H��I�H�,ʋU4E��tA��t�T$L��@���g�L$D����H�|$�H���L����������H�sxM��H�8M���!L��H��V1��莩��H�|$t
H�|$�L���H�|$����qDH�SH���KA����(Ic�H��H��H�����C0u�{�t
H�{(҃�H��A�����HDŽ��K����ʄ������|$���HcL$I�7��P�{H�ύA��H��QƄP:�C0��H�{(����Hc҉|$ƄP:�e���fDL�T$H�|$XH�KL�K L�C(D�\$U�C0PH�t$0����ZY��D�\$L�T$����H��v�?�H�=�RH�肬��H�|$X�X�����S������T$������D$����M���+�T$4���
f�H��$�H�T$�H���v���H���:H���e���H��1Ƀ���2H��@�� t@��	u
��I��9��L��D$L�d$h�)���H�������A�<$#������L��H�=��� �������H�5��L��詨��H���	�H�XH���ѧ��1ҍp�H�����H���� t��	u
��H��9��H��蝧���…��kH�H�D�@��q�@��v	�� �KH����u�\$4����H�D$H������H���X�������H��L	��S�}�:H�uH�����E0�ED$ H�|$p�‰D$ H�|$8芦�����tH�|$8E1�1�1�H���.���H�|$8�D$H� ����|$H�|�E��������H�������uH����H�����M���FH�|$H��L��������	���H�itM��H�8M�������H�MH�S�1�胥��H�D$H������������2����H�D$8H����1�H�t$hH������L�D$8A�8"t>H�T$hH�����M����������K�DH=��?��A�"H��sL��H�8M����H�1U�1��ͤ��1۹��������H����������H�5n�H���a������i�;1u
�{�ZH��H�5I��;���1Ʌ���1����D�������Hc���;"� ���H�k�"H��诧��H������{�wH����H�uH��������E������1�H���5���H�ߺ
1�1����Hc�������H���*���H�����L$@���yH��$�1��f���H�� 9��U9*u�H�H��L����G����D$@D9�AL�=��\BƄPHcD$@H�D$H��HDŽ�HDŽ�DŽ�DŽ��^���H��q�)�H�=�MH��f���H�|$X�<���H�D$H��$�dH+%(�YH�D$H��[]A\A]A^A_�H�D�L$M��H�nqH�OPH�81�蝢�������E�������1�1����H�MH��O����1������k�Z�����m��H=��Q���H��H��1�H���t���������j���f�1۹�\���H��p�*�H�=�LH��d���H�|$X�:������M�����|$4������H�D�L$M��H��pH�jNH�81�踡������D$4���	���H�`pD�EH�MH�8E���XH�dO�1��x�������H�D$H��tH���1���M���e���H�|$�Y���H�-Yp�|$0�E9��C���)Ǿ��Hc�����I��H�D$L�p@M���%D�m�D$0D9�������Mc�L�|$(D)�L��
I��I9����K�<�����H��D��D)�D�mH�I��D��D)�H�I�<�u�H�mo��H�=�QH���H�|$�������;�����H�5oD�EH�MH�8E���jH��O1���M���H�|$��������H�](�X���H�<N�1�� ����}���H��
H�������t$4���e���H��nD�EH�MH�8E���H��L�1��ԟ���1���M����D�D$4E������D�D$M��L��H�anH�LH�81�萟��H�|$���������H�8n�3�H�=gKH�迣��H�D$H�����������H�n@�;H�mKH�81��+���H�D$H����������H��m�1�H�=�IH��X���H�|$�.����H�|$H���Z����Z���H��K�1��Þ��� �H�wmH�MM��H��L�H�81�蚞��H�|$�����
���H�BmL��H�MH�8M�����D�EH�MH�ME�������H�<M��D�d$4E�������H��lL��H�XIH�8��l$4���v���H��lD�D$L��H�^IH�8���H�WM�P�H��lD�D$L��H�4I�H�81��ŝ��H�D$H���'����6�D�L$4E�������D�L$M��L��H�bIH�Kl�H�81��|���H�D$H���������D�\$4E���r���D�L$M��L��H��H�H�l��H�=��H�臡��H�D$H���������D�EH�ME���"���H��M�1��������H��k��H�=�MH��*����I�H�~kL��H�\LH�8M����D�EH�MH�xLE���6���H��L���讜��ff.�AWM��AVE1�AUA��ATUSD��H��xH�-OkH�|$L�d$0H�t$H�}�T$dH�%(H�D$h1�L�L$(H�D$0�-��P4��D!����u��t
��t	M����I��K��H��H�0H��u�H�xu�H�|$L�d$(��E��L�=z�A��f�H�t$L����H����HcP,H��H�UL��A�Q4��t��tA����D����E����H�t$�L��L���y���y�H��iH�L$�H�uHH�81��#���L���[�E1�H�D$hdH+%(�1H��xL��[]A\A]A^A_�f�L�@(H�|$(L�H H��H�HAVL��@0P��_AX��xqH�}����fD�T$�������H�H�biH�SL�H�81�茚�������L$������H�H�1iH��K�H�81��[������H�i�?�H�=�DH�薞��H�|$(�l�����H��h�.�H�=?KH��g��������t$������H��hH�L$�H�>KH�81��ԙ�����I�qH��tdA�A0H�l$@L�L$H�����҃�����L�L$����H�t$E1�1�1�H��L�L$茞��H��A��聛��A��L�L$�"A�A���DG������H�|$��H�|$�
1�L�L$����L�L$H�D$Hc��9����H�\$H�5��L�L$H��誛��L�L$��uXH�D$�H�T$H�t$L��L�L$���L�L$�������H�hgI�I�H�FH�81�莘���f����;1u�{t�H�|$H�5;�L�L$�(���1�L�L$H�D$�����{���H�D$1��k���H������_���H�|$H������L���I�A(H�D$�>���L�L$�כ��H�|$L�L$�H��H��t�1�H�t$8�Ú���}"L�L$��H�T$8H�����Mtsc��uEH�ɸ����H�D$HD�����H�]fI�IH��E�L�D$H�81��~����V�����K��H=��?OH��
H��례�kt�m��H=�0H��H���H��eH�L$�H��EH�81���������E"H�L$�L�L$H�TGH��eH�81����L�L$�����H�D$�������H��eH�L$�H�^FH�81�謖������AWAVAUATI��USH���|$H��$H��$L��$ L��$(��t@)�$0)�$@)�$P)�$`)�$p)�$�)�$�)�$�dH�%(H��$�1�H��$�L���D$XH�D$`H��$�D$\0H�D$h蟖��I��H�h�H��tu1�A���H��H9�sIA�<%u�H��A�<l��<s��<f�u�D$X��/����D$XH��I��
H9�r�K�.H���H��$�H��$�M��H�����H�D$`L�L$X�H��H��$��D$X�D$\0H�D$h�ʔ��Ƅ$�A�ą����E1�Ic�H�D$H9��HH�GyH��H�D$���E��td�t$�H�\$(E��L�|$0��D�d$<D�nH��H�D$ @H�T$�|$1�H��������A)�H�H�E���H�\$(L�|$0D�d$<H�|$�G���H��tL�����H��$�dH+%(�hH�ĸD��[]A\A]A^A_ËD$\=�wq���D$\I���?����T$X��/wH�Ѓ�HD$h�T$XH�8H������藔��I������D$X��/w���D$XI�����H�D$`��H�D$`H�PH�T$`�H�D$`�H��wD�c�H��H�D$螓��D��H�D$���H�D$`����1����8I����H�|$H�\$p�6���H�l$Lc|$H�=bH�l$ D�t$8H�D$@�i��H�H�D$HH�D$@I����A�<$��1��H���H�L��� ���1�1�M��H��D��H	l�p������x�H�|$H�l$�D$D�t$8�͒���T$���	���H�\$(H�|$L�|$0�}���H����A������/���DH�|$H�l$D�t$8�|������H������H��H�����M��L�L$X�H��H��$�H��H������D$XH�D$`H��$I���D$\0H�D$h跑���D�A�ą������H��菑�����L��A������|��������f�USH��H��uf�8u=H�VvH��辑��H�-�uH�}H��t
�Y���H�EH��H��[]�c���軔���f�AWAVAUATI��U��SH��H��$PH��$XL��$`L��$h��t@)�$p)�$�)�$�)�$�)�$�)�$�)�$�)�$�dH�%(H��$8H�uf�8t0H��$8dH+%(�=H��[]A\A]A^A_��H�I_L���D$�D$0L�(H��$0H�D$ H��$@H�D$(����H��L�p�H��tx1�A��DH��L9�sOA�<%u�H��A�<l�<s�7<f��D$��/�����D$H��I��
L9�r�fDI�H����A���H�|$0E1�@L�L$M��H��H��$0H�����H�|$H�D$ H��$@�D$�D$0H�D$(�5���H�|$B�?���"H��sf�8u���|����L��蛏��H��]L9(�HH���S���L���Î���F���fD�D$=������D$I�����f��D$��/wg����HL$(�D$H�9H���}���H�T$�s���H�T$I��f���fD�D$��/w���D$I���G����H�D$ ���H�L$ H�AH�D$ �H�D$ �c���DH�D$ �J���DH�mrf�8u
H��\L�(H��H�m��1�L����������H���0���I��H������L�{�H���(����L��������H��qf�8�����H��qf�8u
H�k\L�(H��H����1�L��菍���R���H��qf�8�A����1���蟍��ff.�@AWAVI��AUATU��SH��H��$PH��$XL��$`L��$h��t@)�$p)�$�)�$�)�$�)�$�)�$�)�$�)�$�dH�%(H��$81����j��uH�qf�8�mH��$0L���D$hH�D$pH��$@�D$l0H�D$x�B���I��L�h�H��tuE1��I��M9�sOC�<&%u�I��C�&<l��<s�<ft[�D$h��/�����D$hI��H��
M9�r�f.�L�H����1�A��H�L$L��$0����D$l=������D$lH���Y�����D$h��/wW�ƒ�HT$x�D$hH�:H���5����X���H��(����D$h��/w���D$hH�������H�D$p���H�T$pH�BH�D$p�H�D$p�{���DH�D$p����DH���X���H�D$H������L�d$L�{�M��L�L$h�H��H��$0H�����L���D$hH�D$pH��$@�D$l0H�D$x舊��C�<H�=lo�׊��L�5�nI�>H��tL�=�nI�?��L�-�nI�}�EL�5�nH��nfA�>D�8�����GH��nf�8�6I�uL��袊��fE��ubI�}�S���H�6Yf�8�����hH�Nnf�8��L���P���L���1�H�K��u����}I�}���H��Xf�8tVfA�>�L�|$(L��$L���
���� L��L���݌��L���U���L��L���ƄH�5�1�����H��mf�8��H�=n�J���H��t
H�|$���1�H��$8dH+%(��H��[]A\A]A^A_�@H�|$(H�|$�i���H�|$� H��$H��H�D$�*���H�|$蠉��I�}H�L$H�d�Ƅ�1�輈��I�}������v�E����L���H��L�������fE�������H�Wf�8������M���fDH��lf�8���������f.�I�>������܋��I�>H�56�A���J���D��I�EH����赋��H�
Wf�8��I�}�d���H��Vf�8�a������H��$��������#���H��$�M�L9�����L�=�kL�-�kfA�?u?I�}H��t-H����1��u���I�M�a�H�=��軋���fA�I�>�
����H�HH�pH�L$�#���I��H���	1�耉��H�|$(H�D$(H�D$0H��H�D$脆��H���VI�6L��萊��H�L$L��H�b�H)�H�x�H�H�L$���I�}H��t
菇��I�EI�>L���\���L���T����������fE���M����Q���@L���Ȉ��������N�����Z���L���1�H����χ������f.�L�=jfA�?���9���H�Uf�8�;���H�=jf�8�����L���?���fA�?�~���L���1�H�/��Y����^���@L��H�5���1��M��1����L��H����1�芅��I�}衆��H��Tf�8�����H��if�8�����L��觇��L���1�H����̆������L��H����1��!���I�}���L�=gi����I�}f�L�|$0)D$0)D$@f�D$0�։��L�����1��u����������藈���8_uJH�=K�薈�����L�5�h����I�MH������B�H�=���������訄��H�=!i�\���I�H�5"�1���V���H��t
H�|$����������H�=�h����I�H�5p��I�MH��������;�H�=���[����f���fDATI��H�=��U1�SH��K��H�;H����H��t)L��艆����u�Hc�H��K[H���D(]A\�fD[�����]A\�f.�@AWI��AVAUA��H�=U�ATUSH��H��(�ͅ��H����1�A�+�+H�=hH�-MR�5hH�D�u���Ic�H�L��L��Hc�L�E�H��gD����u[H��Q�������A�?�5�gHc�A�<1�f�E9�}D�mH��(D��[]A\A]A^A_�DH����t����PA9�u���5gg��:tA��W����;��Hc�Lʀ:�'�x:�7�,gA�F�ED9���H�AQ����E1�A��:A��A��G�D�:�O����E9���Ic�H��H�0���-����+��E��-u��A��H��E9���H����-u�H��zt�L��H��D��D�e����A��E9��LcMMc�J�4�D�L$�UA�A�H�~�D�D$D)�L�T$H��L�L$���L�L$L�T$D�D$H��I��N�T�H��I��E9���L�V�E9�|�H�~���H��OH��H�Q�H�81�����5�eD�uA�:A��:t	A�?������Ic�Hc�H�À<0�������eA��D�u���DE�'A��:t&A��+��A��-�D��1��1����A�O���+����1���-��������DH�OH��H�*�H�81��(���HcE�5eL��I���3���f�A������E���DD�FA��-tUE�������Pf.�A��H�7A�D�u��d�����+E�g1�A��:�����^���D�~tRL��H��D���kd����A��D�u���fD�D$E)�A�D�u���J�DA��D�uH����A��A�����D�u�u���A��H�D�u�d�[������W����N���A������L����-�>���f�AWA��H�=�AVAUE��ATI��UH��SH��H��hL�D$�2���H����1ɸ+�+H�5~cH�H�5�MD�E9��$Mc�N�D�N��A���-�o@��+�U@��-u$��f.�I��E9��3J�D����-u�J�D��xt�H�8MH��E��L��L�D$H��D��D�\$D�0����D�\$��H�	ME9���Lc(Mc�\$J�t�L�t$D�l$L��M��I��D���8D�C�H�~�D)�H���9}��H��I��M�t�H��H��D9��=L�v�D9��H�~���fDA�x�BDH�uLA�������D�E9�}
H�]LD�8H��h��[]A\A]A^A_�D�<:ti<+��<-���1��c����������f�E�HA��-�y���E���y���E���SH��H��D���Q�����H��KD��k����{�@��+����1�@��-�������@H��KA���D�H�VaL��0���fD�+�C1�<:��������L�t$�T$A��H�QK�\$E)�A�D�����H�a�-1�A�x-��@��I�L@���H�L$����=�|���t�NHc����=tA�H��H����u�|$<I�$H����M�L$ D�t$<L�T$L�D$ M��H�L$@A)��D$+Mc��t$H�T$,L�L$PD�\$8H�l$0H��H�\$X1�H���(|��L9��7I�mI�� ��H��uߋt$H�T$,E1�D�\$8H�l$0H�\$XH�L$@�t$,L�L$P�T$8D�\$0H��D�|$@L�|$H�l$HD��H�\$P1�L�d$XM��f�L��L����z����uA����I�<$I�� ��H��u�L�T$L�D$ �\$�D$+�t$,�T$8D�\$0D�|$@H�l$HH�\$PL�d$XA����E���tH��I�?����'���H�zIA��H�MH���D�H�
IH�8�1��>z��H�KID������H�t$L��H���y���������L�T$L�D$ �\$�D$+�T$,D�\$8H�l$0HcL$H��L�y��=����_H�D$H��t�\$�H�A�YH���'�H��H1�D�H��HA��D��7���H�e^D�
A�x�Y����Hcэq����@���Hc��<;@��:t1��Wu@��;t&��D9�u�H��hH��H��D��[]A\A]A^A_����q��Hc��<;:u��˃��'���H�H�?��������H��GA��H�MH��D�H��GH�8�~�������H��G�?�8������L�H�MH��H�UG�H�81��x��H��GD������t$<���H�{GA��D�E9�|G1�<:H�`G�Ë0�\�:�������L�H�ݺH�M듋D$<H��\��H�L�H��G���J�DH��\H��3����-���fDE1�����A����H��H���helpconfig-filequietstdoutClamAV %s
pingwaitinfectedreloadno-summaryInfected files: %d
Total errors: %d
Not removed: %d
Not moved: %d
%Y:%m:%d %H:%M:%SStart Date: %s
End Date:   %s
                      Clam AntiVirus: Daemon Client %s
           By The ClamAV Team: https://www.clamav.net/about.html#credits
           (C) 2022 Cisco Systems, Inc.
    clamdscan [options] [file/directory/-]
    --help              -h             Show this help
    --version           -V             Print version number and exit
    --verbose           -v             Be verbose
    --quiet                            Be quiet, only output error messages
    --stdout                           Write to stdout instead of stderr. Does not affect 'debug' messages.
                                       (this help is always written to stdout)
    --log=FILE          -l FILE        Save scan report in FILE
    --file-list=FILE    -f FILE        Scan files from FILE
    --ping              -p A[:I]       Ping clamd up to [A] times at optional interval [I] until it responds.
    --wait              -w             Wait up to 30 seconds for clamd to start. Optionally use alongside --ping to set attempts [A] and interval [I] to check clamd.
    --remove                           Remove infected files. Be careful!
    --move=DIRECTORY                   Move infected files into DIRECTORY
    --copy=DIRECTORY                   Copy infected files into DIRECTORY
    --config-file=FILE                 Read configuration from FILE.
    --allmatch            -z           Continue scanning within file after finding a match.
    --multiscan           -m           Force MULTISCAN mode
    --infected            -i           Only print infected files
    --no-summary                       Disable summary at end of scanning
    --reload                           Request clamd to reload virus database
    --fdpass                           Pass filedescriptor to clamd (useful if clamd is running as a different user)
    --stream                           Force streaming files to clamd (for debugging and unit testing)
Can't parse command line options
Can't parse clamd configuration file %s
--------------------------------------
Problem with internal logger.

----------- SCAN SUMMARY -----------
Time: %d.%3.3d sec (%d m %d s)
Failed to get local time for Start Date.
Failed to get local time for End Date.
Can't make room for fullpath.
Can't get absolute pathname of current working directory.
client_scan: Failed to determine real filename of %s.
Can't lookup clamd hostname: %s
isremote: socket() returning: %s.
could not allocate memory for string
interval_str would go past end of buffer
attmept_str would go past end of buffer
Could not connect, will try again in %lu second
Could not connect, will try again in %lu seconds
Could not connect, will PING again in %lu second
Could not connect, will PING again in %lu seconds
Wait timeout exceeded; Could not connect to clamd
PING timeout exceeded; No response from clamd
Error occurred while receiving version information.
Clamd did not reload the database
client.c: fstat failed for file name "%s", with %s
.Only scanning files from --file-list (files passed at cmdline are ignored)
Scanning from standard input requires "-" to be the only file argument
LocalSocketTCPSocket%lldTCPAddranynull parameter was passed
PING failed...
PONG
RELOADINGfile-liststreammultiscanfdpassallmatchMaxDirectoryRecursionStreamMaxLengthFollowDirectorySymlinksFollowFileSymlinksFailed to determine real filename of %s.
Quarantine of the file may fail if file path contains symlinks.
Memory allocation failed in ftw
Directory recursion limit reached
select() failed during session: %s
Failed to allocate scanid entry: %s
Clamd closed the connection before scanning all files.
Can't access file %s
%s: Not supported file type
Bogus session id from clamd
Failed to parse reply
 FOUND%s%s
 ERROR%s: OK
%s: No files scanned
V��V��\~��<~���}��~���~������h�����������h���H�����%s/%s%s/%s.%03utraverse_to: Failed open %s
Can't remove file '%s'
%s: Removed.
Can't copy file '%s'
%s: copied to '%s'
Can't move file %s to %s
%s: moved to '%s'
copyremovetraverse_to: Invalid arguments!
traverse_to: Failed to get copy of directory path to be tokenized!
traverse_to: tokenize of target directory returned 0 tokens!
traverse_to: Failed to open file descriptor for '/' directory.
traverse_to: Handle opened for '%s' directory.
traverse_unlink: Invalid arguments!
traverse_unlink: Failed to open file descriptor for target directory!
traverse_unlink: Failed to get basename of target path: %s
	Error: %d
traverse_unlink: Failed to unlink: %s
Error:%s
traverse_rename: Invalid arguments!
traverse_rename: Failed to open file descriptor for source directory!
traverse_rename: Failed to get basename of source path:%s
	Error: %d
traverse_rename: Failed to rename: %s
	to: %s
Error:%s
Can't unlink '%s' after copy: %s
action_setup: Failed to get realpath of %s
'%s' doesn't exist or is not a directory
Can't send to clamd: %s
UNKNOWN COMMAND
Communication error
Overlong reply from clamd
%s: Excluded
%s: Failed to open file
FD send failed: %s
STDINFailed to read from %s.
Could not lookup %s: %s
Can't create the socket: %s
unidentifiedz%s %sUNKNOWN COMMANDFailed to parse reply: "%s"
%s%s FOUND
STDIN: noreply from clamd
.%s: no reply from clamd
CONTSCANMULTISCANINSTREAMFILDESALLMATCHSCANCommand rejected by clamd (wrong clamd version?)
%s: Failed to open file. ERROR
Could not connect to clamd on LocalSocket %s: %s
Could not connect to clamd on %s: %s
Filename cannot be NULL for MULTISCAN or CONTSCAN.
Cannot allocate a command buffer: %s
clamd replied "UNKNOWN COMMAND". Command was %s
%s: stat() failed with %s, clamd may not be responding
1.0.5/etc/clamav/freshclam.confDatabaseDirectory%s/daily.cvd%s/daily.cldClamAV %s/%u/%s/dev/nullCan't open /dev/null
dup2(%d, %d) failed
ERROR: initgroups() failed.
log file '%s'.
Error was '%s'
ERROR: setgid(%d) failed.
ERROR: setuid(%d) failed.
sigaction%s/Unable to allocate memory for db directory...
ERROR: This tool requires libclamav with functionality level %u or higher (current f-level: %u)
ERROR: --file-list: Can't open file %s
Can't get information about user %s.
ERROR: Can't get information about user %s.
ERROR: lchown to user '%s' failed on
lchown to user '%s' failed on log file '%s'.  Error was '%s'
ERROR: optaddarg: Unregistered option %s
ERROR: optaddarg: strdup() failed
ERROR: optaddarg: malloc() failed
ERROR: optparse: Can't register new option (not enough memory)
ERROR: optparse: longopts[] is too small
ERROR: optparse: shortopts[] is too small
ERROR: optparse: (short|long)opts[] is too small
ERROR: Please edit the example config file %s
ERROR: Missing argument for option at %s:%d
ERROR: Missing closing parenthesis in option %s at %s:%d
ERROR: Empty argument for option %s at %s:%d
ERROR: Incomplete option passed (missing argument)
ERROR: optparse: No corresponding long name for option '-%c'
ERROR: Parse error at %s:%d: Unknown option %s
WARNING: Ignoring unsupported option %s at %s:%d
WARNING: Ignoring unsupported option --%s (-%c)
WARNING: Ignoring unsupported option --%s
ERROR: Can't register argument for option %s
ERROR: Can't register argument for option --%s
WARNING: Ignoring deprecated option %s at %s:%d
WARNING: Ignoring deprecated option --%s (-%c)
WARNING: Ignoring deprecated option --%s
ERROR: optparse: Can't compile regular expression %s for option %s
ERROR: Incorrect argument format for option %s
ERROR: Incorrect argument format for option --%s (-%c)
ERROR: Incorrect argument format for option --%s
ERROR: Option --%s (-%c) requires a non-empty string argument
ERROR: Option --%s requires a non-empty string argument
ERROR: Can't parse numerical argument for option %s
ERROR: Can't parse numerical argument for option --%s (-%c)
ERROR: Can't parse numerical argument for option --%s
WARNING: Numerical value for option %s too high, resetting to 4G
WARNING: Numerical value for option --%s (-%c) too high, resetting to 4G
ERROR: optparse: calloc failed
ERROR: optparse: strdup failed
ERROR: Problem parsing options (name == NULL)
ERROR: Parse error: Unknown option %s
WARNING: Ignoring unsupported option %s
WARNING: Ignoring deprecated option %s
/etc/clamav/clamav-milter.confDump authenticode certificate chain.Perform HTML, script, and text normalizationAlways generate MDB entries for PE sectionsMaximum number of mismatched signatures when building a CVD. Zero disables this limit.Feature level to put in the CVDVersion number of the CVD to buildCreate a hybrid (standard and bytecode) database fileForce using the interpreter instead of the JITTrust loaded bytecode (default yes)Load and print bytecode information without executingPrint IR of bytecode signatureInput file to run the bytecode nDon't show source line during tracingName of the analyzer as seen in prewikkaSave all reports to a log file.By default the log file is locked for writing and only a single
daemon process can write to it. This option disables the lock.Maximum size of the log file.
Value of 0 disables the limit.Log all clean files.
Useful in debugging but drastically increases the log size.Use the system logger (can work together with LogFile).Type of syslog messages.
Please refer to 'man syslog' for the facility names.Rotate log file. Requires LogFileMaxSize option set prior to this option.Log additional information about the infected file, such as its
size and hash, together with the virus name.Save the process ID to a file.This option allows you to change the default temporary directory.This option allows you to change the default database directory.
If you enable it, please make sure it points to the same directory in
both clamd and freshclam.Only load the official signatures published by the ClamAV project.By default, yara rules will be loaded. This option allows you to exclude yara rules when scanning and also to scan only using yara rules. Valid options are yes|no|onlyPath to a local socket file the daemon will listen on.Sets the group ownership on the unix socket.Sets the permissions on the unix socket to the specified mode.Remove a stale socket after unclean shutdownA TCP port number the daemon will listen on.By default clamd binds to INADDR_ANY.
This option allows you to restrict the TCP address and provide
some degree of protection from the outside world.Maximum length the queue of pending connections may grow to.Close the STREAM session when the data size limit is exceeded.
The value should match your MTA's limit for the maximum attachment size.The STREAM command uses an FTP-like protocol.
This option sets the lower boundary for the port range.This option sets the upper boundary for the port range.Maximum number of threads running at the same time.This option specifies the time (in seconds) after which clamd should
timeout if a client doesn't provide any data.This option specifies the time (in seconds) after which clamd should
timeout if a client doesn't provide any initial command after connecting.This option specifies how long to wait (in milliseconds) if the send buffer
is full. Keep this value low to prevent clamd hanging.Waiting for data from clamd will timeout after this time (seconds).Maximum number of queued items (including those being processed by MaxThreads
threads). It is recommended to have this value at least twice MaxThreads
if possible.
WARNING: you shouldn't increase this too much to avoid running out of file
 descriptors, the following condition should hold:
 MaxThreads*MaxRecursion + MaxQueue - MaxThreads  + 6 < RLIMIT_NOFILE
 (usual max for RLIMIT_NOFILE is 1024)
This option specifies how long (in seconds) the process should wait
for a new job.Don't scan files/directories whose names match the provided
regular expression. This option can be specified multiple times.Maximum depth the directories are scanned at.Follow symlinks to regular files.Scan files and directories on other filesystems.This option specifies the time intervals (in seconds) in which clamd
should perform a database check.Enable non-blocking (multi-threaded/concurrent) database reloads. This feature 
will temporarily load a second scanning engine while scanning continues using 
the first engine. Once loaded, the new engine takes over. The old engine is 
removed as soon as all scans using the old engine have completed. This feature 
requires more RAM, so this option is provided in case users are willing to 
block scans during reload in exchange for lower RAM requirements.This option allows you to disable clamd's caching feature.Execute a command when virus is found.
Use the following environment variables to identify the file and virus names:
- $CLAM_VIRUSEVENT_FILENAME
- $CLAM_VIRUSEVENT_VIRUSNAME
In the command string, '%v' will also be replaced with the virus name.
Note: The '%f' filename format character has been disabled and will no longer
be replaced with the file name, due to command injection security concerns.
Use the 'CLAM_VIRUSEVENT_FILENAME' environment variable instead.
For the same reason, you should NOT use the environment variables in the
command directly, but should use it carefully from your executed script.Stop the daemon when libclamav reports an out of memory condition.Permit use of the ALLMATCHSCAN command.Enable debug messages in libclamav.Don't remove temporary files (for debugging purposes).Record metadata about the file being scanned.
Scan metadata is useful for file analysis purposes and for debugging scan behavior.
The JSON metadata will be printed after the scan is complete if Debug is enabled.
A metadata.json file will be written to the scan temp directory if LeaveTemporaryFiles is enabled.Run the daemon as a specified user (the process must be started by root).With this option enabled ClamAV will load bytecode from the database. It is highly recommended you keep this option on, otherwise you'll miss detections for many new viruses.Set bytecode security level.
Possible values:
	TrustSigned - trust bytecode loaded from signed .c[lv]d files,
		 insert runtime safety checks for bytecode loaded from other sources
	Paranoid - don't trust any bytecode, insert runtime checks for all
Recommended: TrustSigned, because bytecode in .cvd files already has these checks.Set bytecode timeout in milliseconds.Allow loading bytecode from outside digitally signed .c[lv]d files.^(Auto|ForceJIT|ForceInterpreter|Test)$Set bytecode execution mode.
Possible values:
	Auto - automatically choose JIT if possible, fallback to interpreter
ForceJIT - always choose JIT, fail if not possible
ForceInterpreter - always choose interpreter
Test - run with both JIT and interpreter and compare results. Make all failures fatal.^(none|None|bytecode|Bytecode|pcre|PCRE)$Collect and print execution statistics.
Possible values:
	Bytecode - reports bytecode statistics
PCRE - reports PCRE execution statistics
None - reports no statisticsDetect Potentially Unwanted Applications.Exclude a specific PUA category. This directive can be used multiple times.
See https://docs.clamav.net/faq/faq-pua.html for the complete list of PUA
categories.Only include a specific PUA category. This directive can be used multiple
times.PE stands for Portable Executable - it's an executable file format used
in all 32- and 64-bit versions of Windows operating systems. This option
allows ClamAV to perform a deeper analysis of executable files and it's also
required for decompression of popular executable packers such as UPX or FSG.
If you turn off this option, the original files will still be scanned, but
without additional processing.Executable and Linking Format is a standard format for UN*X executables.
This option allows you to control the scanning of ELF files.
If you turn off this option, the original files will still be scanned, but
without additional processing.Enable the built in email scanner.
If you turn off this option, the original files will still be scanned, but
without parsing individual messages/attachments.Scan RFC1341 messages split over many emails. You will need to
periodically clean up $TemporaryDirectory/clamav-partial directory.
WARNING: This option may open your system to a DoS attack. Please don't use
this feature on highly loaded servers.With this option enabled ClamAV will try to detect phishing attempts by using
signatures.Scan URLs found in mails for phishing attempts using heuristics.In some cases (eg. complex malware, exploits in graphic files, and others),
ClamAV uses special algorithms to provide accurate detection. This option
controls the algorithmic detection.Allow heuristic match to take precedence.
When enabled, if a heuristic scan (such as phishingScan) detects
a possible virus/phish it will stop scan immediately. Recommended, saves CPU
scan-time.
When disabled, virus/phish detected by heuristic scans will be reported only
at the end of a scan. If an archive contains both a heuristically detected
virus/phish, and a real malware, the real malware will be reported.
Keep this disabled if you intend to handle "Heuristics.*" viruses
differently from "real" malware.
If a non-heuristically-detected virus (signature-based) is found first,
the scan is interrupted immediately, regardless of this config option.Enable the Data Loss Prevention module.This option sets the lowest number of Credit Card numbers found in a file
to generate a detect.This option sets the lowest number of Social Security Numbers found
in a file to generate a detect.With this option enabled the DLP module will search for valid
SSNs formatted as xxx-yy-zzzz.With this option enabled the DLP module will search for valid
SSNs formatted as xxxyyzzzzPerform HTML/JavaScript/ScriptEncoder normalisation and decryption.
If you turn off this option, the original files will still be scanned, but
without additional processing.This option enables scanning of OLE2 files, such as Microsoft Office
documents and .msi files.
If you turn off this option, the original files will still be scanned, but
without additional processing.With this option enabled clamav will try to detect broken executables
(PE, ELF, & Mach-O) and alert on them with a Broken.Executable heuristic signature.With this option enabled clamav will try to detect broken media files
(JPEG, TIFF, PNG, GIF) and alert on them with a Broken.Media heuristic signature.Alert on encrypted archives and documents (encrypted .zip, .7zip, .rar, .pdf).With this option enabled the DLP module will search for valid Credit Card
numbers only. Debit and Private Label cards will not be searched.Alert on encrypted archives (encrypted .zip, .7zip, .rar).Alert on encrypted documents (encrypted .pdf).With this option enabled OLE2 files with VBA macros, which were not
detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".Alert on SSL mismatches in URLs, even if they're not in the database.
This feature can lead to false positives.Alert on cloaked URLs, even if they're not in the database.
This feature can lead to false positives.Alert on raw DMG image files containing partition intersections.This option enables scanning within PDF files.
If you turn off this option, the original files will still be scanned, but
without decoding and additional processing.This option enables scanning within SWF files.
If you turn off this option, the original files will still be scanned, but
without decoding and additional processing.This option enables scanning xml-based document files supported by libclamav.
If you turn off this option, the original files will still be scanned, but
without additional processing.This option enables scanning HWP3 files.
If you turn off this option, the original files will still be scanned, but
without additional processing.Scan within archives and compressed files.
If you turn off this option, the original files will still be scanned, but
without unpacking and additional processing.This option causes memory or nested map scans to dump the content to disk.
If you turn on this option, more data is written to disk and is available
when the leave-temps option is enabled at the cost of more disk writes.This option sets the maximum amount of time a scan may take to complete.
The value of 0 disables the limit.
WARNING: disabling this limit or setting it too high may result allow scanning
of certain files to lock up the scanning process/threads resulting in a Denial of Service.
The value is in milliseconds.This option sets the maximum amount of data to be scanned for each input file.
Archives and other containers are recursively extracted and scanned up to this
value.
The value of 0 disables the limit.
WARNING: disabling this limit or setting it too high may result in severe
damage.Files/messages larger than this limit won't be scanned. Affects the input
file itself as well as files contained inside it (when the input file is
an archive, a document or some other kind of container).
The value of 0 disables the limit.
WARNING: disabling this limit or setting it too high may result in severe
damage to the system.Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
file, all files within it will also be scanned. This option specifies how
deeply the process should be continued.
The value of 0 disables the limit.
WARNING: disabling this limit or setting it too high may result in severe
damage to the system.Number of files to be scanned within an archive, a document, or any other
container file.
The value of 0 disables the limit.
WARNING: disabling this limit or setting it too high may result in severe
damage to the system.This option sets the maximum size of a file to check for embedded PE.
Files larger than this value will skip the additional analysis step.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum size of a HTML file to normalize.
HTML files larger than this value will not be normalized or scanned.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum size of a normalized HTML file to scan.
HTML files larger than this value after normalization will not be scanned.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum size of a script file to normalize.
Script content larger than this value will not be normalized or scanned.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum size of a ZIP file to reanalyze type recognition.
ZIP files larger than this value will skip the step to potentially reanalyze as PE.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum number of partitions of a raw disk image to be scanned.
Raw disk images with more partitions than this value will have up to the value number partitions scanned.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum number of icons within a PE to be scanned.
PE files with more icons than this value will have up to the value number icons scanned.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum recursive calls to HWP3 parsing function.
HWP3 files using more than this limit will be terminated and alert the user.
Scans will be unable to scan any HWP3 attachments if the recursive limit is reached.
Negative values are not allowed.
WARNING: setting this limit too high may result in severe damage or impact performance.This option sets the maximum calls to the PCRE match function during an instance of regex matching.
Instances using more than this limit will be terminated and alert the user but the scan will continue.
For more information on match_limit, see the PCRE documentation.
Negative values are not allowed.
WARNING: setting this limit too high may severely impact performance.This option sets the maximum recursive calls to the PCRE match function during an instance of regex matching.
Instances using more than this limit will be terminated and alert the user but the scan will continue.
For more information on match_limit_recursion, see the PCRE documentation.
Negative values are not allowed and values > PCREMatchLimit are superfluous.
WARNING: setting this limit too high may severely impact performance.This option sets the maximum filesize for which PCRE subsigs will be executed.
Files exceeding this limit will not have PCRE subsigs executed unless a subsig is encompassed to a smaller buffer.
Negative values are not allowed.
Setting this value to zero disables the limit.
WARNING: setting this limit too high or disabling it may severely impact performance.This option specifies a directory or mount point which should be scanned on access. The mount point specified, or the mount point containing the specified directory will be watched, but only notifications will occur. If any directories are specified, this option will preempt the DDD system. It can also be used multiple times.This option specifies a directory (including all files and directories
inside it), which should be scanned on access. This option can
be used multiple times.This option allows excluding directories from on-access scanning. It can
be used multiple times. Only works with DDD system.Use this option to exclude the root UID (0) and allow any processes run under root to access all watched files without triggering scans.With this option you can exclude specific UIDs. Processes with these UIDs
will be able to access all files.
This option can be used multiple times (one per line). Using a value of 0 on any line will disable this option entirely. To exclude the root UID please enable the OnAccessExcludeRootUID option.This option allows exclusions via user names when using the on-access scanning client. It can
be used multiple times.Files larger than this value will not be scanned in on access.This option toggles the dynamic directory determination system for on-access scanning (Linux only).This option changes fanotify behavior to prevent access attempts on malicious files instead of simply notifying the user (On Access scan only).Enables extra scanning and notification after catching certain inotify events. Only works with the DDD system enabled.Max amount of time (in milliseconds) that the OnAccess client should spend for every connect, send, and recieve attempt when communicating with clamd via curl (5s default)Max number of scanning threads to allocate to the OnAccess thread pool at startup--these threads are the ones responsible for creating a connection with the daemon and kicking off scanning after an event has been processed. To prevent clamonacc from consuming all clamd's resources keep this lower than clamd's max threads. Default is 5Number of times the OnAccess client will retry a failed scan due to connection problems (or other issues). Defaults to no retries.When using prevention, if this option is turned on, any errors that occur during scanning will result in the event attempt being denied. This could potentially lead to unwanted system behaviour with certain configurations, so the client defaults to off and allowing access events in case of error.When started by root freshclam will drop privileges and switch to the user
defined in this option.This option defined how many times daily freshclam should check for
a database update.Use DNS to verify the virus database version. FreshClam uses DNS TXT records
to verify the versions of the database and software itself. With this
directive you can change the database verification domain.
WARNING: Please don't change it unless you're configuring freshclam to use
your own database verification domain.DatabaseMirror specifies to which mirror(s) freshclam should connect.
You should have at least one entry: database.clamav.net.This option allows you to easily point freshclam to private mirrors.
If PrivateMirror is set, freshclam does not attempt to use DNS
to determine whether its databases are out-of-date, instead it will
use the If-Modified-Since request or directly check the headers of the
remote database files. For each database, freshclam first attempts
to download the CLD file. If that fails, it tries to download the
CVD file. This option overrides DatabaseMirror, DNSDatabaseInfo
and Scripted Updates. It can be used multiple times to provide
fall-back mirrors.mirror1.mynetwork.com
mirror2.mynetwork.comThis option defines how many attempts freshclam should make before giving up.With this option you can control scripted updates. It's highly recommended to keep them enabled.With this option enabled, freshclam will attempt to load new
databases into memory to make sure they are properly handled
by libclamav before replacing the old ones. Tip: This feature uses a lot of RAM. If your system has limited RAM and you are actively running ClamD or ClamScan during the update, then you may need to set `TestDatabases no`.By default freshclam will keep the local databases (.cld) uncompressed to
make their handling faster. With this option you can enable the compression.
The change will take effect with the next database update.Include an optional signature databases (opt-in). This option can be used multiple times.Exclude a standard signature database (opt-out). This option can be used multiple times.With this option you can provide custom sources (http:// or file://) for database files.
This option can be used multiple times.http://myserver.com/mysigs.ndb
file:///mnt/nfs/local.hdbIf you're behind a proxy, please enter its address here.A user name for the HTTP proxy authentication.A password for the HTTP proxy authentication.If your servers are behind a firewall/proxy which does a User-Agent
filtering you can use this option to force the use of a different
User-Agent header.Send the RELOAD command to clamd after a successful update.Run a command after a successful database update. Use EXIT_1 to return 1 after successful database update.Run a command when a database update error occurs.Run a command when freshclam reports an outdated version.
In the command string %v will be replaced with the new version number.With this option you can provide a client address for the database downloading.
Useful for multi-homed systems.Timeout in seconds when connecting to database server.Timeout in seconds when reading from database server. 0 means no timeout.This option enables downloading of bytecode.cvd, which includes additional
detection mechanisms and improvements to the ClamAV engine.Disable authenticode certificate chain verification in PE files.Deprecated option to download signatures derived from the Google Safe Browsing API. See https://blog.clamav.net/2020/06/the-future-of-clamav-safebrowsing.html for more details.Deprecated option to set the max-scantime.
The value is in milliseconds.Deprecated option to alert on broken PE and ELF executable files.Deprecated option to enable heuristic alerts (e.g. "Heuristics.<sig name>")PhishingAlwaysBlockSSLMismatchDeprecated option to alert on SSL mismatches in URLs, even if they're not in the database.
This feature can lead to false positives.Deprecated option to alert on cloaked URLs, even if they're not in the database.
This feature can lead to false positives.Deprecated option to alert on raw DMG image files containing partition intersections.Deprecated option to alert on encrypted archives and documents (encrypted .zip, .7zip, .rar, .pdf).Initialize a supplementary group access (the process must be started by root).Define the clamd socket to connect to for scanning.
This option is mandatory! Syntax:
  ClamdSocket unix:path
  ClamdSocket tcp:host:port
The first syntax specifies a local unix socket (needs an absolute path) e.g.:
  ClamdSocket unix:/var/run/clamd/clamd.socket
The second syntax specifies a tcp local or remote tcp socket: the
host can be a hostname or an ip address; the ":port" field is only required
for IPv6 addresses, otherwise it defaults to 3310
  ClamdSocket tcp:192.168.0.1
This option can be repeated several times with different sockets or even
with the same socket: clamd servers will be selected in a round-robin fashion.Define the interface through which we communicate with sendmail.
This option is mandatory! Possible formats are:
[[unix|local]:]/path/to/file - to specify a unix domain socket;
inet:port@[hostname|ip-address] - to specify an ipv4 socket;
inet6:port@[hostname|ip-address] - to specify an ipv6 socket./tmp/clamav-milter.socket
inet:7357Define the group ownership for the (unix) milter socket.Sets the permissions on the (unix) milter socket to the specified mode.Messages originating from these hosts/networks will not be scanned
This option takes a host(name)/mask pair in CIRD notation and can be
repeated several times. If "/mask" is omitted, a host is assumed.
To specify a locally originated, non-smtp, email use the keyword "local".local
192.168.0.0/24
1111:2222:3333::/48^(Accept|Reject|Defer|Blackhole|Quarantine)$Action to be performed on clean messages (mostly useful for testing).
The following actions are available:
Accept: the message is accepted for delivery
Reject: immediately refuse delivery (a 5xx error is returned to the peer)
Defer: return a temporary failure message (4xx) to the peer
Blackhole: like Accept but the message is sent to oblivion
Quarantine: like Accept but message is quarantined instead of being deliveredAction to be performed on error conditions (this includes failure to
allocate data structures, no scanners available, network timeouts, unknown
scanner replies and the like.
The following actions are available:
Accept: the message is accepted for delivery;
Reject: immediately refuse delivery (a 5xx error is returned to the peer);
Defer: return a temporary failure message (4xx) to the peer.This option allows you to set a specific rejection reason for infected messages
and it's therefore only useful together with "OnInfected Reject"
The string "%v", if present, will be replaced with the virus name.If this option is set to "Replace" (or "Yes"), an "X-Virus-Scanned" and an
"X-Virus-Status" headers will be attached to each processed message, possibly
replacing existing headers.
If it is set to Add, the X-Virus headers are added possibly on top of the
existing ones.
Note that while "Replace" can potentially break DKIM signatures, "Add" may
confuse procmail and similar filters.When AddHeader is in use, this option allows you to set the reported
hostname. This may be desirable in order to avoid leaking internal names.
If unset the real machine name is used.Execute a command when an infected message is processed.
The following parameters are passed to the invoked program in this order:
virus name, queue id, sender, destination, subject, message id, message date.
Note #1: this requires MTA macroes to be available (see LogInfected below)
Note #2: the process is invoked in the context of clamav-milter
Note #3: clamav-milter will wait for the process to exit. Be quick or fork to
avoid unnecessary delays in email delivery/usr/local/bin/my_infected_message_handlerChroot to the specified directory.
Chrooting is performed just after reading the config file and before
dropping privileges.This option specifies a file which contains a list of basic POSIX regular
expressions. Addresses (sent to or from - see below) matching these regexes
will not be scanned.  Optionally each line can start with the string "From:"
or "To:" (note: no whitespace after the colon) indicating if it is,
respectively, the sender or recipient that is to be allowed.
If the field is missing, "To:" is assumed.
Lines starting with #, : or ! are ignored.Messages from authenticated SMTP users matching this extended POSIX
regular expression (egrep-like) will not be scanned.
As an alternative, a file containing a plain (not regex) list of names (one
per line) can be specified using the prefix "file:".
e.g. SkipAuthenticated file:/etc/good_guys

Note: this is the AUTH login name!SkipAuthenticated ^(tom|dick|henry)$This option allows you to tune what is logged when a message is infected.
Possible values are Off (the default - nothing is logged),
Basic (minimal info logged), Full (verbose info logged)
Note:
For this to work properly in sendmail, make sure the msg_id, mail_addr,
rcpt_addr and i macroes are available in eom. In other words add a line like:
Milter.macros.eom={msg_id}, {mail_addr}, {rcpt_addr}, i
to your .cf file. Alternatively use the macro:
define(`confMILTER_MACROS_EOM', `{msg_id}, {mail_addr}, {rcpt_addr}, i')
Postfix should be working fine with the default settings.This option allows you to tune what is logged when no threat is found in a scanned message.
See LogInfected for possible values and caveats.
Useful in debugging but drastically increases the log size.This option affects the behaviour of LogInfected, LogClean and VirusAction
when a message with multiple recipients is scanned:
If SupportMultipleRecipients is off (the default)
then one single log entry is generated for the message and, in case the
message is determined to be malicious, the command indicated by VirusAction
is executed just once. In both cases only the last recipient is reported.
If SupportMultipleRecipients is on:
then one line is logged for each recipient and the command indicated
by VirusAction is also executed once for each recipient.

Note: although it's probably a good idea to enable this option, the default value
is currently set to off for legacy reasons.Example 	ERROR: Unknown option passed
fooyestrue^(yes|true|1|no|false|0)$/etc/clamav/clamd.confdebuggen-jsondumpcertsleave-tempsno-warningsshow-progressdaemonno-dnslist-mirrorsupdate-dbdatabase/var/lib/clamavrecursivegen-mdbfollow-dir-symlinks^[0-9]+$follow-file-symlinksbellsuppress-ok-resultsexcludeexclude-dirincludeinclude-dirstructured-ssn-formathex-dumpmd5sha1sha256impfuzzy-imgprint-certshtml-normaliseascii-normaliseutf16-decodebuildmax-bad-sigs3000flevelcvd-versionno-cdiffserverunpackunpack-currentinfolist-sigsfind-sigsdecode-sigstest-sigsvbavba-hexcomparerun-cdiffverify-cdiffhybriddefaultcolorsconfig-dir/etc/clamavnon-defaultgenerate-configforce-interpretertrust-bytecodeprintsrcPrint source code of bytecodeprintbcirinputtracebytecode trace levelno-trace-showsourcearchive-verbosebytecode-trust-allhttp-proxyproxy-userlog-verboseforcedisable-summarydisable-archiveno-archiveno-peno-elfno-ole2no-pdfno-htmlno-mailno-phishing-sigsno-phishing-scan-urlsno-algorithmicno-phishing-restrictedscanmax-ratiomax-space^[0-9]+[KM]?$unzipunrararjunzoolhajartartgzdebAlertExceedsMaxalert-exceeds-maxPreludeEnableprelude-enableEnable preludePreludeAnalyzerNameprelude-analyzer-name/tmp/clamav.logLogFileUnlockLogFileMaxSize5MLogTimeLog time with each message.LogCleanLogSyslogLogFacilityLOG_LOCAL6LOG_MAILLogVerboseEnable verbose logging.LogRotatelog-rotateExtendedDetectionInfoPidFile/var/run/clam.pidTemporaryDirectorytempdir/tmpdatadirOfficialDatabaseOnlyofficial-db-onlynoYaraRulesyara-rules/tmp/clamd.socketLocalSocketGroupvirusgroupLocalSocketMode660FixStaleSocket3310localhostMaxConnectionQueueLength30100MStreamMinPort1024StreamMaxPort2048120CommandReadTimeoutSendBufTimeout200300MaxQueueIdleTimeout^/proc/
^/sys/max-dir-recursion15Follow directory symlinks.CrossFilesystemscross-fsSelfCheck600ConcurrentDatabaseReloadDisableCachedisable-cacheVirusEvent/opt/send_virus_alert_sms.shExitOnOOMAllowAllMatchScanForegroundforegroundDon't fork into background.DebugLeaveTemporaryFilesGenerateMetadataJsonUserBytecodeBytecodeSecurity^(TrustSigned|Paranoid)$TrustSignedBytecodeTimeoutbytecode-timeout10000BytecodeUnsignedbytecode-unsignedBytecodeModebytecode-modeAutoStatisticsstatisticsNoneDetectPUAdetect-puaExcludePUAexclude-puaNetTool
PWToolIncludePUAinclude-puaSpy
Scanner
RATScanPEscan-peScanELFscan-elfScanMailscan-mailScanPartialMessagesPhishingSignaturesPhishingScanURLsHeuristicAlertsheuristic-alertsHeuristicScanPrecedenceheuristic-scan-precedenceStructuredDataDetectiondetect-structuredStructuredMinCreditCardCountstructured-cc-countStructuredMinSSNCountstructured-ssn-countStructuredSSNFormatNormalStructuredSSNFormatStrippedScanHTMLscan-htmlScanOLE2scan-ole2AlertBrokenExecutablesalert-brokenAlertBrokenMediaalert-broken-mediaAlertEncryptedalert-encryptedStructuredCCOnlystructured-cc-modeAlertEncryptedArchivealert-encrypted-archiveAlertEncryptedDocalert-encrypted-docAlertOLE2Macrosalert-macrosAlertPhishingSSLMismatchalert-phishing-sslAlertPhishingCloakalert-phishing-cloakAlertPartitionIntersectionalert-partition-intersectionScanPDFscan-pdfScanSWFscan-swfScanXMLDOCSscan-xmldocsScanHWP3scan-hwp3ScanArchivescan-archiveForceToDiskforce-to-diskMaxScanTimemax-scantime120000max-scansize400Mmax-recursion17max-filesMaxEmbeddedPEmax-embeddedpe40MMaxHTMLNormalizemax-htmlnormalizeMaxHTMLNoTagsmax-htmlnotags8MMaxScriptNormalizemax-scriptnormalize20MMaxZipTypeRcgmax-ziptypercg1MMaxPartitionsmax-partitions128MaxIconsPEmax-iconspe100MaxRecHWP3max-rechwp316PCREMatchLimitpcre-match-limit100000PCRERecMatchLimitpcre-recmatch-limit5000PCREMaxFileSizepcre-max-filesizeOnAccessMountPath/
/home/userOnAccessIncludePath/home
/studentsOnAccessExcludePath/home/bofh
/rootOnAccessExcludeRootUIDOnAccessExcludeUIDOnAccessExcludeUnameclamuserOnAccessMaxFileSizeOnAccessDisableDDDOnAccessPreventionOnAccessExtraScanningOnAccessCurlTimeout10000LOnAccessMaxThreadsOnAccessRetryAttemptsOnAccessDenyOnErrorwatch-listexclude-listDevACOnlydev-ac-onlyDevACDepthdev-ac-depthDevPerformancedev-performanceDevLiblogdev-liblogUpdateLogFile/var/log/freshclam.logDatabaseOwnerCheckschecksDNSDatabaseInfocurrent.cvd.clamav.netDatabaseMirrordatabase.clamav.netPrivateMirrorMaxAttemptsScriptedUpdatesTestDatabasesCompressLocalDatabaseExtraDatabasedbname1
dbname2ExcludeDatabaseDatabaseCustomURLHTTPProxyServeryour-proxyHTTPProxyPortHTTP proxy's port8080HTTPProxyUsernameusernameHTTPProxyPasswordHTTPUserAgentNotifyClamddaemon-notifyOnUpdateExecuteon-update-executecommandOnErrorExecuteon-error-executeOnOutdatedExecuteon-outdated-executeLocalIPAddresslocal-addressaaa.bbb.ccc.dddConnectTimeoutReceiveTimeoutDisableCertChecknocertsSafeBrowsingTimeLimittimelimitDetectBrokenExecutablesdetect-brokenAlgorithmicDetectionalgorithmic-detectionblock-maxPhishingAlwaysBlockCloakOLE2BlockMacrosblock-macrosArchiveBlockEncryptedblock-encryptedMailMaxRecursionArchiveMaxScanSizeArchiveMaxRecursionArchiveMaxFilesArchiveMaxCompressionRatioArchiveBlockMaxArchiveLimitMemoryUsageMailFollowURLsmail-follow-urlsAllowSupplementaryGroupsScanOnAccessClamdSockettcp:scanner.mydomain:7357MilterSocketMilterSocketGroupMilterSocketModeLocalNetOnCleanAcceptOnInfectedQuarantineOnFail^(Accept|Reject|Defer)$DeferRejectMsgMTA specificAddHeader^(No|Replace|Yes|Add)$ReplaceReportHostnamemy.mail.server.nameVirusActionChroot/newrootAllowList/etc/allowed_addressesWhitelistSkipAuthenticatedLogInfectedBasicSupportMultipleRecipientsERROR: %sWARNING: %sLog size = %lld, max = %lld
-%Y%m%d_%H%M%S.log%s -> %s -> %sLOG_AUTHLOG_AUTHPRIVLOG_CRONLOG_DAEMONLOG_FTPLOG_KERNLOG_LPRLOG_NEWSLOG_SYSLOGLOG_USERLOG_UUCPLOG_LOCAL0LOG_LOCAL1LOG_LOCAL2LOG_LOCAL3LOG_LOCAL4LOG_LOCAL5LOG_LOCAL7WARNING: Log size limit met but log file rotation turned off. Forcing log file rotation anyways.
Need to rotate log file due to size but ran out of memory.
Need to rotate log file due to size but could not get local time.
ERROR: Can't open %s in append mode (check permissions!).
WARNING: File locking not supported (NFS?)ERROR: %s is locked by another process
POSIXLY_CORRECT%s: illegal option -- %c
%s: unrecognized option `%s'
%s: option `%s' is ambiguous
%s: option requires an argument -- %c
%s: option `--%s' doesn't allow an argument
%s: option `--%s' requires an argument
;@@���X��������`��(P���@����L����P���`��$`��P������@��p��h��������8����� ���,���������d��x������,	p���|	`����	 ���
0���,
@���@
����
0�����<���x����`���������������	��T�
��������������
���8
`���
���
p���
P��� ��x�&���p+��(�+��T�/���@9����9��(@>��t@E���PE���zRx�0��"zRx�$��`FJw�?;*3$"D���\����A�Lt�����B�M�O �A(�A0�G�e�G�B�G�J�F�A�H�8���B�E�E �E(�D0�I8�D`�
8C0A(B BBBEH����B�I�B �B(�A0�A8�D�^
8A0A(B BBBCL\0��tB�B�B �B(�A0�A8�G�)q
8C0A(B BBBB8�`��
B�B�A �A(�G�(�
(D ABBE(�4���A�A�G�(�
CAAl���B�B�E �L(�A0�A8�J�
8A0A(B BBBFl�Q�N�A�t�X�K�A��8��@�4��"B�B�B �D(�C0�G@g
0C(A BBBKL� ��/B�E�B �B(�A0�A8�I�)U
8A0A(B BBBKH,��VB�B�B �B(�A0�C8�J��
8C0A(B BBBC0x��B�I�N �NP�
 AABFL�����B�E�E �E(�D0�D8�G�F
8C0A(B BBBFL����8B�B�B �A(�D0�D@�HKP^HA@u
0A(A BBBKLL����B�B�B �B(�A0�A8�G�	
8C0A(B BBBJ0���DB�A�A �D@�
 CABD��QF�m
EL�P�L�QB�A�A �G0v
 CABIz
 DABO}
 AABG`DX��B�B�A �A(�DP�
(D ABBN@
(A ABBJ
(D ABBO0����B�A�D �Q��
 AABKH����B�E�E �D(�D0�X
(F BBBHA(C BBB(4�!H<P��B�B�E �E(�D0�F8�D@

8D0A(B BBBJ0���lA�D�D b
CAAtFA0��lB�D�A �D��
 AABKL�L��B�B�E �H(�A0�A8�G�@D
8A0A(B BBBHD@���B�I�B �A(�D0�D�N
0D(A BBBAP����B�E�B �E(�D0�A8�J�*�
8A0A(B BBBB����D���l��kB�B�B �B(�A0�A8�D@IHFP[HA@|
8D0A(B BBBF,
8D0A(B BBBOht����vB�B�B �A(�D0�D@�
0A(A BBBK
0O(A BBBN}0A(A BBB����TDU
Gs8	L���KH�A�A �h
ABK�
HBE<	`���0P	\���jB�J�D �D@�
 AABE�	����A�N
AH�	����(DM
G�	����A�O8�	����B�B�A �D(�G0T
(A ABBF0
�����B�A�D �J�E
 AABF8L
`����B�G�D �F(�J��
(C ABBH�
���	4�
����B�H�A �G�p
 CABA$�
x���TA�A�G EDAH�
����lB�E�J �E(�D0�D8�DP�
8A0A(B BBBH8H����B�E�D �D(�D0]
(A ABBJ$�H��TA�A�G EDA,�����K�D�A ��ABA���\�0��bB�H�G �E(�D0�C8�G�0X�0D�0K�0A�0�
8A0A(B BBBA\<@���B�E�E �E(�A0�A8�G�V
8D0A(B BBBCV�G�F�B�L�����B�B�B �B(�D0�A8�G�d
8D0A(B BBBA(�@��WA�A�D }
DAHH
t���B�B�B �B(�D0�C8�G��
8A0A(B BBBHLd
( ��j	B�B�E �B(�A0�C8�G�#
8A0A(B BBBE4�
H)��bB�K�C �v
IBGAFBH�
�)���B�E�B �L(�A0�A8�G`�
8D0A(B BBBFd8�-���B�L�B �E(�D0�D8�G��
8C0A(B BBBF�
8J0A(B BBBH�\4���X4�� ���F�F�F�F�F0h�������	0c�������	0VH����	0c�R������V����������+�������)�����v��:�������S��0��:����(�������4�������@�������0��:����N�d������U�������\�������i�������������@0������[>m������e>������T>������l>z����������8S��s�d��������|�������r����������hS��������������������������G0������J>f������������70i������-0p������������20w��������o�������A�������������A�������������A��������������������������������������������������������������������'��� ����0��� ����4��� ����9��� �������� ����@��� ����D��� ����N��������� ����Z��������� ����i��������� ����y��������� ������b�������� ��������� �S������� �S������ T������ �������� �������������� ������u�������� �������������� ������i�������� ������l��������|� ������f��������|� �������� �������������� ������������� ����
��������� �����d�������� �����c�������� �����r�������� ����$��������� ����1��� 8T��8�d�������F�cQ�@����]�n��@����i�g��������@����y�f��pT����t���T����i���T����p��������c��U����r�������� U����T��������s��HU���a�������t������#�����.�����9�����E�������K�������[�������k�������v�������|��������������������������������������������������������������������������������������������������������������������!���������������%���������������+���������������/���������������3���������������7���������������;���������������?�O���	����a�o���~���������������pU������l���������U�������U�����@V��������������V������V�����������*�W5�>���I���a�k���`W��v����W������p�������� X��������������-@X��qH����������|�#�X|�������	0Y�����xY���=�������� Z����������XZ/�:����������ZJ�N����Z���=�����������Z]�>��������([b�l�����[���>�@\�������\�������\������
(]������x`]�������]�������h^������x�^������d8_�������`K���������� a��u>���	�a��>������>���a��5�F���	�a��O���X0bY�]����b��v�����	hd�������������d������g������Xg������F����������g��
����g��!����g��6���������i��;�����	hi��D�U���������n�jn�z�����'	hk��������	�k�������k����������	l������0m��������`m����	���	n������������	8n+�:�E���������	�nQ�a�h���	8o��p�x���	�p��������	�q������`r��������	Xs��������	�s��������	t�������	�t���7���	Xw��I�f���	�wTHz�����	�wTH����Hx�������x��������	y��������	�y������	�z��%�6���	({��I�X���	�{��h�y���	|��������	�|��������	�|��������	}�������	�}��)�<���	~��Q�l���	x~��������	�~��������	h��������	���������	Ȁ��������	`���������	���
����	�#��*��	 �7������@
@���'�<���	��J�;�M���'	؇��W�e���	��t�x�����	��t�������	���������@	Ћ�������	،�����2	��#�'�2���d	0�>�B�M���	P�Y�\�k�����	��|��������	0��������@	�������������P�������������������������8�'�8���������������O�����������H���b���������x�w����P�������0���������������(����������������P�_�������G����0���(�W������������3�e������������@�J�����������	����V�a�����������	����n�}�����������	��������������������������l���������U����4�u����������`�������c��Ƞ�������������� ���
���������`��-�����������;���8�THG�������W������e���P���{���������(����������������������������p������������������������������������������
���������� �g>(���������P�a�6�B��������������P�`���������0�r�z�������������r�������������ثr�����a��������`�������Ь������<�K�;���X�������	���$���(���1�;����#�E�]���	0���k�����	x���f�����	����ȯ���	�����B���	p���V�r���	���������	}��������	H�����������������
������������� �������������4�������������D�������������_���������������o�����������������������������	����������������������������������������������������������������ص/�����������J�#���������`�x�,�����������4�ط4�;�����������F�طF�Q�X���������p���p�v���������������������������������������h������������� �������������(������������������������������ ���������h���2�����������>����������(�>�D�����������������������qH���������������������������E���������������
����������������=������������������������������������������;���������������'�����������������������������������������������������������������������������������������������a����������������>�������������>�������������=������������������������������ ��P��H����X����05���8�� �(��@��(��3��>��I��T��*��_�������
�
<)PX���o�p�
�plx	(��X�	���o���o ���o�o:���oR`j6�F�V�f�v���������Ơ֠�����&�6�F�V�f�v���������ơ֡�����&�6�F�V�f�v���������Ƣ֢�����&�6�F�V�f�v���������ƣ֣�����&�6�F�V�f�v���������Ƥ֤�����&�6�F�V�f�v���������ƥ֥�����&�6�F�V�f�v�p�dd1ae231134a0494240f0836154b8571577e970.debugb��.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.data.rel.ro.dynamic.data.bss.gnu_debuglink88 &XX$9|| G���o��8Q���
Ypp�a���o::�n���o  �}��X��B(�(�x	���� � �`�������������<)<)	�00�������������PP��XX��``�_ �`j`Z�plp\x�p`(@p(`� (`4\`

SAMX