Obs/bin/ObsDep/content/Powershell/Roles/Common/WindowsDefender.psm1
Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" -DisableNameChecking Import-Module -Name "$PSScriptRoot\..\VirtualMachine\VirtualMachine.psm1" -DisableNameChecking function Apply-DefenderUpdate { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $false)] [string] $ClusterName ) $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration $clusterNames = @($ClusterName) if ([System.string]::IsNullOrEmpty($ClusterName)) { $clusterNames = Get-ClusterNames $Parameters } Trace-Execution "Apply Windows Defender Update on $($clusterNames -join ', ')" $domainAdminCredential = Get-TemporaryDomainCredential -Parameters $Parameters Trace-Execution "Domain Admin Account: $($domainAdminCredential.UserName)" foreach ($clusterName in $clusterNames) { # {Infrastructure_2}\CloudMedia\Security\Defender $defenderUpdatePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.DefenderFolder.Path $clusterName Trace-Execution "Defender update path: $defenderUpdatePath" Set-DefenderPlatformFile -Parameters $Parameters -UpdatePath $defenderUpdatePath Set-DefenderSignatureFile -Parameters $Parameters -UpdatePath $defenderUpdatePath try { $localUpdatePath = Get-LocalCsvPathFromSharePath -Parameters $Parameters -UNCSharePath $defenderUpdatePath -ClusterName $ClusterName Trace-Execution "CSV local path for Defender update folder: $localUpdatePath" } catch { Trace-Warning "Failed to convert UNC path $defenderUpdatePath into CSV local path: $_" $localUpdatePath = $null } $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id $vmNodes = $virtualMachinesRole.Nodes.Node | Where-Object { $_.RefClusterId -eq $clusterId } | where { $_.Role -ne "InfraRing" } | Select-Object -ExpandProperty Name if ($null -ne $vmNodes -and $vmNodes.Count -gt 0) { Update-DefenderPlatform -NodeSet $vmNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath Update-DefenderSignature -NodeSet $vmNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath } $hostNodes = Get-ClusterNodes -Parameters $Parameters -ClusterName $clusterName if ($null -ne $hostNodes -and $hostNodes.Count -gt 0) { Update-DefenderPlatform -NodeSet $hostNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath -CsvLocalPath $localUpdatePath Update-DefenderSignature -NodeSet $hostNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath -CsvLocalPath $localUpdatePath } } } <# .Synopsis Find out nodes in the stamp that need to receive that CAMP platform update #> function Get-DefenderPlatformUpdateNodes { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string[]] $NodeSet, [Parameter(Mandatory = $true)] [PSCredential] $Credential, [Parameter(Mandatory = $true)] [string] $PlatformFilePath ) $platformUpdateVersion = Get-Item $PlatformFilePath | Select-Object -ExpandProperty "VersionInfo" | Select-Object -ExpandProperty "ProductVersion" Trace-Execution "Latest version of Windows Defender Platform found is filePath = $PlatformFilePath ; platformUpdateVersion = $platformUpdateVersion" # Bug 9350406: to avoid the issue caused by PowerShell broken session Trace-Execution "Querying version of Windows Defender Platform" $outdatedNodes = @() foreach ($node in $NodeSet) { try { $currentVersion = Invoke-Command -ComputerName $node -Credential $Credential -ScriptBlock { # Attempt to start Windows Defender if not already running $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue if ($null -ne $service -and $service.Status -ine "Running") { $service | Start-Service -ErrorAction SilentlyContinue | Out-Null } try { Get-MpComputerStatus | Select-Object -ExpandProperty "AMProductVersion" } catch { Write-Warning -Message "Could not retrieve 'AMProductVersion' for Windows Defender, non-terminating error is: $_" # Fall back to the default version "0.00.0000.00000" } } } catch { Trace-Warning "Failed to query version of Windows Defender Platform on $node : $_" } if ([System.Version]$currentVersion -lt [System.Version]$platformUpdateVersion) { $outdatedNodes += $node Trace-Execution "Found outdated CAMP of version '$currentVersion' on $node" } } Trace-Execution "Done querying version of Windows Defender Platform" $outdatedNodes } <# .Description Expand UpdatePlatform.exe from the security nuget And copy it to \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Security\Defender #> function Set-DefenderPlatformFile { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $true)] [string] $UpdatePath ) Import-Module -Name "$PSScriptRoot\..\..\Common\Helpers.psm1" -DisableNameChecking $clusterName = Get-ManagementClusterName $Parameters $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration # If UpdatePlatform.exe from the nuget is older than the one in \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Security\Defender # Do not use the one from the nuget to make sure that the Defender platform does not fall back to an older version $platformFilePath = Join-Path $UpdatePath "UpdatePlatform.exe" $platformBackupFilePath = Join-Path $UpdatePath "UpdatePlatform.exe.bk" if (Test-Path $platformFilePath) { if (Test-Path $platformBackupFilePath) { Remove-Item $platformBackupFilePath -Force } Rename-Item -Path $platformFilePath -NewName "UpdatePlatform.exe.bk" } $nugetStorePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.LibraryShareNugetStoreFolder.Path $clusterName $nugetName = "Microsoft.AzureStack.Solution.Deploy.Security" # Extract Common Antimalware Platform (aka. CAMP) update from "Microsoft.AzureStack.Solution.Deploy.Security.x.x.x.x.nupkg" # NOTE: Expand-NugetContent automatically creates a new folder if it doesn't exist Trace-Execution "Expand $nugetName and copy Windows Defender Platform update to $UpdatePath" Expand-NugetContent ` -NugetName $nugetName ` -NugetStorePath $nugetStorePath ` -SourceIsFile ` -SourcePath "content\Defender\UpdatePlatform.exe" ` -DestinationPath $UpdatePath ` -IsUnc | Out-Null if (-not (Test-Path $platformFilePath)) { if (Test-Path $platformBackupFilePath) { Rename-Item -Path $platformBackupFilePath -NewName "UpdatePlatform.exe" } else { Trace-Error "Could not proceed further with Windows Defender Platform update since '$platformFilePath' doesn't exist" } } if (Test-Path $platformBackupFilePath) { $platformVersion = [System.Version](Get-Item -Path $platformFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion) $backupVersion = [System.Version](Get-Item -Path $platformBackupFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion) if ($platformVersion -gt $backupVersion) { Remove-Item -Path $platformBackupFilePath } else { Remove-Item -Path $platformFilePath Rename-Item -Path $platformBackupFilePath -NewName "UpdatePlatform.exe" } } $platformVersion = Get-Item -Path $platformFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion Trace-Execution "Defender UpdatePlatform.exe version: $platformVersion" } function Update-DefenderPlatform { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string[]] $NodeSet, [Parameter(Mandatory = $true)] [PSCredential] $Credential, [Parameter(Mandatory = $true)] [string] $UpdatePath, [Parameter(Mandatory = $false)] [string] $CsvLocalPath ) Trace-Execution "Starting to update Windows Defender platform on $($NodeSet -join ',')" $FilePath = Join-Path $UpdatePath "UpdatePlatform.exe" $targetNodes = Get-DefenderPlatformUpdateNodes -NodeSet $NodeSet -Credential $Credential -PlatformFilePath $FilePath if ($null -eq $targetNodes -or $targetNodes.Count -eq 0) { Trace-Execution "Looks like Windows Defender Platform on all the nodes is up to date, nothing to do" return } if (-not [System.string]::IsNullOrEmpty($CsvLocalPath)) { $FilePath = Join-Path $CsvLocalPath "UpdatePlatform.exe" } Trace-Execution "UpdatePlatform file: $FilePath" try { Invoke-Command -AsJob -ComputerName $targetNodes -Credential $Credential -Authentication Credssp -ErrorAction SilentlyContinue -ScriptBlock { $versionBeforeUpdate = Get-MpComputerStatus -ErrorAction SilentlyContinue | Select-Object -ExpandProperty AMProductVersion $process = [System.Diagnostics.Process]::new() $process.StartInfo.FileName = $using:FilePath $timeout = New-TimeSpan -Minutes 10 try { $process.Start() | Out-Null if (-not $process.WaitForExit($timeout.TotalMilliseconds)) { $status = "WARNING: MoCAMP update process didn't finish within the time allocated ({0} seconds).`r`n" -f $timeout.TotalSeconds } } finally { $process.Close() $process = $null } $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue if ($null -ne $service -and $service.Status -ine "Running") { $service | Start-Service -ErrorAction SilentlyContinue } try { $versionAfterUpdate = Get-MpComputerStatus | Select-Object -ExpandProperty AMProductVersion if ($versionBeforeUpdate -eq $versionAfterUpdate) { # If Defender is not updated, collect logs for later analysis & "C:\Program Files\Windows Defender\MpCmdRun.exe" -GetFiles | Out-Null # Move the log file MpSupportFiles.cab to other path in case it's overwritten Copy-Item -Path "C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab" -Destination "C:\ProgramData\Microsoft\Windows Defender" } } catch { Write-Warning "Failed to run Get-MpComputerStatus after Defender has been updated: $_" & "C:\Program Files\Windows Defender\MpCmdRun.exe" -GetFiles | Out-Null Copy-Item -Path "C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab" -Destination "C:\ProgramData\Microsoft\Windows Defender" } # Trace out update log file (btw, could be missing) for troubleshooting purposes (regardless of the exit code) $status += Get-Content -Raw "$env:windir\temp\mpsigstub.log" -ErrorAction SilentlyContinue if (-not $status) { $status = "Couldn't find '$env:windir\temp\mpsigstub.log', maybe '$using:FilePath' didn't get a chance to be executed." } return "[$env:ComputerName]: {0}" -f $status } | Wait-Job -Timeout 1800 | Receive-Job | Write-Verbose -Verbose } catch { Trace-Warning "Failed to update Windows Defender Platform: $_" } Trace-Execution "Done updating Windows Defender platform" } <# .Description Put Defender signature update files in \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64 #> function Set-DefenderSignatureFile { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $true)] [string] $UpdatePath ) Import-Module -Name "$PSScriptRoot\RoleHelpers.psm1" -DisableNameChecking $clusterName = Get-ManagementClusterName $Parameters $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $windowsDefenderRole = $Parameters.Roles["WindowsDefender"].PublicConfiguration # Path of Defender signature files for Deployment, e.g. C:\CloudDeployment\Updates\DefenderUpdates\x64 $signatureFilePath = $global:ExecutionContext.InvokeCommand.ExpandString($physicalMachinesRole.PublicInfo.DefenderUpdates.Path) if($signatureFilePath -like "*{*}*") { # Resolved into \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Updates\DefenderUpdates\x64 but effectively no-op. # It is used to avoid errors from Test-Path when variable is not a valid path $signatureFilePath = Get-SharePath $Parameters $signatureFilePath $clusterName } if ($null -ne (Get-InProgressUpdateVersion -Parameters $Parameters)) { # Path of Defender signature files for Update, e.g. \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\Current\D $sharePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.WindowsUpdateStagingFolder.Path $clusterName try { # If OEMUpdate is run after P&U, there will be a versioned path $versionedPath = Get-AzSVersionedPath -Path $sharePath -ErrorAction Stop } catch { # If OEMUpdate is run before P&U, there will not be a versioned path $versionedPath = $sharePath } if ([System.string]::IsNullOrEmpty($versionedPath)) { $versionedPath = $sharePath } $defenderSourceFolderName = $windowsDefenderRole.PublicInfo.UpdatePackagePaths.DefenderFolder.Name $signatureFilePath = Join-Path -Path $versionedPath -ChildPath "$defenderSourceFolderName\x64" } # For Deployment, the Defender signature files are put in C:\CloudDeployment\Updates\DefenderUpdates\x64 # and then copied to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64 # For Update, the Defender signature files are put in \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\Current\D\x64 # and then copied to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64 # For other scenarios like FRU/AddScaleUnit/AddScaleUnitNodes/.., $signatureFilePath is INCORRECT as \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Updates\DefenderUpdates\x64\ # However, since we have the lastest Defender signature files in \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64, we can skip the copy here if (Test-Path $signatureFilePath) { # Copy Defender signature files to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64 $UpdateCopyPath = Join-Path -Path $UpdatePath -ChildPath "x64" Trace-Execution "Copy files from $signatureFilePath to $UpdateCopyPath" & robocopy.exe $signatureFilePath $UpdateCopyPath mpam-fe.exe mpam-d.exe nis_full.exe /R:5 /W:10 /V /FP /BYTES 2>&1 } } function Update-DefenderSignature { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string[]] $NodeSet, [Parameter(Mandatory = $true)] [PSCredential] $Credential, [Parameter(Mandatory = $true)] [string] $UpdatePath, [Parameter(Mandatory = $false)] [string] $CsvLocalPath ) Trace-Execution "Starting to update Windows Defender signature on $($NodeSet -join ',')" if (-not [System.string]::IsNullOrEmpty($CsvLocalPath)) { $UpdatePath = $CsvLocalPath } Trace-Execution "Use update path $UpdatePath" try { # NOTE: Since "$env:ProgramFiles\Windows Defender\MpCmdRun.exe" reaches out for a resource on the local network, # hence the use of Authentication="Credssp" to delegate user's credentials to the target server for remote authentication. Invoke-Command -AsJob -ComputerName $NodeSet -Credential $Credential -Authentication Credssp -ErrorAction SilentlyContinue -ScriptBlock { # Give update process enough attempts to recover from errors (if any) $attempts = 5 $sleepSeconds = 10 # Summary of all attempts for troubleshooting purposes $summary = "" while ($attempts -gt 0) { # Send error output to stdout to get support for detailed tracing $status = & "$env:ProgramFiles\Windows Defender\MpCmdRun.exe" -SignatureUpdate -UNC -Path "$using:UpdatePath" 2>&1 | Out-string # Append current results to the summary $summary += $status + "`n" if ($status -notmatch "ERROR") { break } $attempts-- Start-Sleep -Second $sleepSeconds $sleepSeconds += 15 } # Send back resulting message, eq: # - [n25r0402-DC01]: Signature update started ... # Signature update finished. # or # - [n25r0402-DC01]: Signature update started ... # ERROR: Signature Update failed with hr=80070002 # CmdTool: Failed with hr = 0x80070002. Check C:\Users\<...>\AppData\Local\Temp\1\MpCmdRun.log for more information return "[$env:ComputerName]: {0}" -f $summary } | Wait-Job -Timeout 1800 | Receive-Job | Write-Verbose -Verbose } catch { Trace-Warning "Failed to update Windows Defender signature: $_" } Trace-Execution "Done updating Windows Defender signature" } <# .Synopsis Gets Windows Defender update signatures share path which is configured in Defender for auto-update of signatures #> function Get-DefenderUpdateSignaturesPath { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $windefendRole = $Parameters.Roles["WindowsDefender"].PublicConfiguration $clusterName = Get-ManagementClusterName $Parameters $defenderSignatures = $windefendRole.PublicInfo.UpdatePackagePaths.UpdateDefenderSignatureFilesFolder # \\SU1FileServer\SU1_Public\DefenderUpdates $defenderUpdatesPath = Get-SharePath $Parameters $defenderSignatures.Path $clusterName return $defenderUpdatesPath } function Test-DefenderEngineVersion { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string[]] $NodeSet, [Parameter(Mandatory = $true)] [PSCredential] $Credential ) Trace-Execution "Validate Defender Engine version on hosts $($NodeSet -join ',')" $errorNodes = @() foreach ($node in $NodeSet) { $engineVersion = Invoke-Command $node -Credential $Credential { Get-MpComputerStatus | Select-Object -ExpandProperty AMEngineVersion } if ([System.Version]$engineVersion -lt [System.Version]"1.1.17300.4") { Trace-Execution "[$node]: Defender engine version is $engineVersion" $errorNodes += $node } } if ($errorNodes.Count -gt 0) { Trace-Error "RTP cannot be enabled on $($errorNodes -join ',') because Defender Engine is not updated to 1.1.17300.4" } } Export-ModuleMember -Function Get-DefenderUpdateSignaturesPath Export-ModuleMember -Function Apply-DefenderUpdate Export-ModuleMember -Function Update-DefenderSignature Export-ModuleMember -Function Update-DefenderPlatform Export-ModuleMember -Function Set-DefenderSignatureFile Export-ModuleMember -Function Test-DefenderEngineVersion # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCaCbvvjaGFnFvy # 0NE90GQdU8504QGfYoreztk6CE22QqCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL/5KpRwQqyaCj8zZiyplrHm # LqsZ5ArpC/62+NN8LhOXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAihumItIa+NYfaeB4EWT4BlzY/bq/8cYCiuL7TyBOLQtA6Vn7BomlXZuh # J0gcAKDpsyUpSYdOCoDPavwdYEnNOYN/YTcZ7BSaSSr+RMZyXtt7REG4uNMoDPyH # 7eLgOM0KSIyFUdPgYHTHR6n3jo1q9c8bhrpDQz+fr8hZsAQlaPd1ha1djM7dvqLo # lvzzg3CYMYuU0lvb1joEtMcnY5AZMCZKw7IQ47Li4iEX0zkevKPJzz3GhetEAGpx # k57zxFLHDDvJrHGPNm759kPjkEJbL2ADEvjhOTPi2rZi4ToIX+Xsa2cSFCb+tFm3 # ggH0h9f5edRkUiC1NljEpVFY4zCZb6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCHbQ5TSboU2TDgIgw11weijSLM8XqQgKpt+cUU9FxNkQIGZQPkWMPt # GBMyMDIzMDkyMjA4MzEwOC41MDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAc9SNr5xS81IygABAAABzzANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MTFaFw0yNDAyMDExOTEyMTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC4Pct+15TYyrUje553lzBQodgmd5Bz7WuH8SdHpAoW # z+01TrHExBSuaMKnxvVMsyYtas5h6aopUGAS5WKVLZAvUtH62TKmAE0JK+i1hafi # CSXLZPcRexxeRkOqeZefLBzXp0nudMOXUUab333Ss8LkoK4l3LYxm1Ebsr3b2OTo # 2ebsAoNJ4kSxmVuPM7C+RDhGtVKR/EmHsQ9GcwGmluu54bqiVFd0oAFBbw4txTU1 # mruIGWP/i+sgiNqvdV/wah/QcrKiGlpWiOr9a5aGrJaPSQD2xgEDdPbrSflYxsRM # dZCJI8vzvOv6BluPcPPGGVLEaU7OszdYjK5f4Z5Su/lPK1eST5PC4RFsVcOiS4L0 # sI4IFZywIdDJHoKgdqWRp6Q5vEDk8kvZz6HWFnYLOlHuqMEYvQLr6OgooYU9z0A5 # cMLHEIHYV1xiaBzx2ERiRY9MUPWohh+TpZWEUZlUm/q9anXVRN0ujejm6OsUVFDs # sIMszRNCqEotJGwtHHm5xrCKuJkFr8GfwNelFl+XDoHXrQYL9zY7Np+frsTXQpKR # NnmI1ashcn5EC+wxUt/EZIskWzewEft0/+/0g3+8YtMkUdaQE5+8e7C8UMiXOHkM # K25jNNQqLCedlJwFIf9ir9SpMc72NR+1j6Uebiz/ZPV74do3jdVvq7DiPFlTb92U # KwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDaeKPtp0eTSVdG+gZc5BDkabTg4MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBQgm4pnA0xkd/9uKXJMzdMYyxUfUm/ZusU # Ba32MEZXQuMGp20pSuX2VW9/tpTMo5bkaJdBVoUyd2DbDsNb1kjr/36ntT0jvL3A # oWStAFhZBypmpPbx+BPK49ZlejlM4d5epX668tRRGfFip9Til9yKRfXBrXnM/q64 # IinN7zXEQ3FFQhdJMzt8ibXClO7eFA+1HiwZPWysYWPb/ZOFobPEMvXie+GmEbTK # bhE5tze6RrA9aejjP+v1ouFoD5bMj5Qg+wfZXqe+hfYKpMd8QOnQyez+Nlj1ityn # OZWfwHVR7dVwV0yLSlPT+yHIO8g+3fWiAwpoO17bDcntSZ7YOBljXrIgad4W4gX+ # 4tp1eBsc6XWIITPBNzxQDZZRxD4rXzOB6XRlEVJdYZQ8gbXOirg/dNvS2GxcR50Q # dOXDAumdEHaGNHb6y2InJadCPp2iT5QLC4MnzR+YZno1b8mWpCdOdRs9g21QbbrI # 06iLk9KD61nx7K5ReSucuS5Z9nbkIBaLUxDesFhr1wmd1ynf0HQ51Swryh7YI7TX # T0jr81mbvvI9xtoqjFvIhNBsICdCfTR91ylJTH8WtUlpDhEgSqWt3gzNLPTSvXAx # XTpIM583sZdd+/2YGADMeWmt8PuMce6GsIcLCOF2NiYZ10SXHZS5HRrLrChuzedD # RisWpIu5uTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDq # 8xzVXwLguauAQj1rrJ4/TyEMm6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6LedETAiGA8yMDIzMDkyMjA0NTY0 # OVoYDzIwMjMwOTIzMDQ1NjQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDot50R # AgEAMAoCAQACAgwuAgH/MAcCAQACAhQxMAoCBQDouO6RAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAE40Ypp1XzCgGb7WdgwwKXpy4leusnN9apOq56K4r2tM # f4ameojoBYpxwIUwEvP7wDaLBM7DGn0VeN3hrY3y5ZuFdbp+B1b1iks+U4PFg5IS # uaOmJzpMBp7lzMiGnrMnDZV77p/Bcx5Y1QzM0fQjydi/SvGb0Reicz+cPZx0H+2C # li0jzwHwXXu57PmhpwCwm1lWyYHC2hqFjY6ENU3h1ArB2zO2D2GzPhLJDP3MGkNA # sJGZ35rWz1TQNWSmSeRebdEU9HxYenYWab1xNY7weggwmWI+wRVjQ8/D/FH4uk6o # nJ5E+crkJCCm0nTWc5kyXRUY0jke4kK49YIeAzm3bGoxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc9SNr5xS81IygABAAAB # zzANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDyZAzPpWOV+1HDr6omC++hB0tkpvzveh7tGemudsNE # xzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EILPpsLqeNS4NuYXE2VJlMuvQ # eWVA80ZDFhpOPjSzhPa/MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHPUja+cUvNSMoAAQAAAc8wIgQgwYErpH3GWsKS0Phe/FGbIvgq # zcTrp0DwEm5R13B+KIMwDQYJKoZIhvcNAQELBQAEggIAQ6oCq+Un4PPpGQC8YpVO # jpN+qQG4uc3Hp8054jpn5DwY9UbTI9gFMcVehOkD4XYV2/ug5dcNGLlt1ahuN7oL # wBf9EbKaOQejXGf+loFLirNvlhgVssaiqK5L5lpuVnQS/wDhH1IoYDcGfFGjoFZ3 # mvhsesz5XrKoTIr4mXg/Jv42PP8Vq3IT6lNyFdxtgRtVq/oRGH/pTvhysIbRMTG6 # 6yb1BlHgrEL86CM3l7V99VG1YooC6VdvcMdsjGcc3zdxEegnyo/FcZTpCAu5JQwb # 2FpiBfVSrH+Yn/5sM51Rup6gk6rNSOg1EJxjckGxkuY90FkqLRDquC23s6LAMc2L # JUuckMQxx+BOtU1EivJTCkz4KcfweaiDbzNdSFEIT/WxzwluGetjjUBGn0/Mm1Gs # DEGeRnmvbXKvsHpBVys7oh4BwYtYKdRdVctYy0/Rw7faPl+vwN6i8X9YOmZHunSA # kwbRXp909cPJYtDXZDuYLOcmAXciXWFB925UqmRZy34zTR6j8Fz7r+ZlBcNp7tqJ # +U7Cg3g17UGyVyPD3B9mbRJV/aEPIQZkE9/D/DcMpAK18MWDtrwBSH3hXeBTws9o # Nx4KsFNiLDbWgnWPkv/ahu+DOz/8knrrS3IE36WDUUV8wv5VCDXF0e3sQEcYlA3R # UCJVzeym+GcEslmhrg1EMM8= # SIG # End signature block |