Obs/bin/ObsDep/content/Powershell/Common/SecurityHelpers.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\Tracer.psm1 <# .Synopsis Returns deployment configuration setting: Cloud.PublicInfo.SecuritySetting.SecureBoot.EnforceOnAllInfraVms Default value is $false #> function Get-DisableSecureBootOnInfraVms { Param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $cloudRolePublicInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo if($cloudRolePublicInfo.SecuritySetting) { if($cloudRolePublicInfo.SecuritySetting.SecureBoot) { $DisableSecureBootOnInfraVms = $cloudRolePublicInfo.SecuritySetting.SecureBoot.GetAttribute("DisableSecureBootOnInfraVms") return $DisableSecureBootOnInfraVms -eq "True" } } return $false } function Clear-SecurityItem { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $false)] [string] $ClusterName ) Import-Module $PSScriptRoot\..\Roles\Common\DscHelper.psm1 -DisableNameChecking $clusterNames = @($ClusterName) if ([System.string]::IsNullOrEmpty($ClusterName)) { $clusterNames = Get-ClusterNames $Parameters } Trace-Execution "Clearing security items on: $($clusterNames -join ', ')" $domainAdminUser = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo.DomainUsers.User | Where-Object Role -EQ "DomainAdmin" $domainAdminCredential = $Parameters.GetCredential($domainAdminUser.Credential) $domainAdminName = $domainAdminCredential.GetNetworkCredential().UserName $domainAdminPassword = $domainAdminCredential.GetNetworkCredential().Password $domainFqdn = $Parameters.Roles["Domain"].PublicConfiguration.PublicInfo.DomainConfiguration.FQDN $domainCredential = New-Credential -UserName "$domainFqdn\$domainAdminName" -Password $domainAdminPassword $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration foreach ($clusterName in $clusterNames) { $physicalHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName foreach($physicalHost in $physicalHosts) { $session = New-PSSession "$physicalHost.$domainFqdn" -Credential $domainCredential Set-SecurityOnHost -Session $session -IsOneNode:$($physicalHosts.Count -eq 1) $session | Remove-PSSession -ErrorAction SilentlyContinue } $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id $guestVmNames = $Parameters.Roles["VirtualMachines"].PublicConfiguration.Nodes.Node | where { $_.ProvisioningStatus -eq "Complete" -and $_.RefClusterId -eq $clusterId } | Select-Object -ExpandProperty Name foreach($guestVmName in $guestVmNames) { $vmSession = New-PSSession "$guestVmName.$domainFqdn" -Credential $domainCredential Set-SecurityOnVm -Session $vmSession $vmSession | Remove-PSSession -ErrorAction SilentlyContinue } } $ercsVmNames = $Parameters.Roles["SeedRing"].PublicConfiguration.Nodes.Node | Foreach-Object Name $activeErcsVmNames = $virtualMachinesRole.Nodes.Node | where { $_.Name -in $ercsVmNames } ` | where { $_.ProvisioningStatus -eq 'Complete' } | Foreach-Object Name Revoke-CompleteBootDSCShareAccess -ComputerName $activeErcsVmNames -Parameters $Parameters } function Set-SecurityOnHost { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession] $Session, [Parameter(Mandatory = $true)] [switch] $isOneNode ) if ($Session) { $computerName = $Session.ComputerName Trace-Execution "Applying security actions on: $computerName" Trace-Execution "Deleting not needed files on: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\Unattend\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Trace-Execution "Removing unnecessary registry keys from: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoAdminLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name ForceAutoLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoLogonCount -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\unattend.xml" } -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther first location for $computerName" } $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\Unattend\unattend.xml" } -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther second location for $computerName" } # If this is a one node, do not disable administrator/rename on host. Host is the same as DVM if (-not $isOneNode) { Disable-LocalAdmins -Session $Session Set-BuildinUsers -Session $Session } } } function Set-SecurityOnVm { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession] $Session ) if ($Session) { $computerName = $Session.ComputerName Trace-Execution "Applying security actions on: $computerName" Trace-Execution "Deleting not needed files on: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:SystemDrive\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Trace-Execution "Removing unnecessary registry keys from: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoAdminLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name ForceAutoLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoLogonCount -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:SystemDrive\unattend.xml"} -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from system drive for $computerName" } $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:windir\Panther\unattend.xml"} -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther location for $computerName" } Disable-LocalAdmins -Session $Session Set-BuildinUsers -Session $Session } } function Disable-LocalAdmins { [CmdletBinding()] param( [System.Management.Automation.Runspaces.PSSession] $Session ) Trace-Execution "Disabling local administrators on: $($Session.ComputerName)" $localAdmins = $null $localAdmins = Invoke-Command -Session $Session -ScriptBlock {(((Get-LocalGroupMember -SID "S-1-5-32-544") | ? {$_.PrincipalSource -eq "Local" -and $_.ObjectClass -eq "User"}).Name) | % {$_.split("\")[1]}} -ErrorAction SilentlyContinue if ($localAdmins) { Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $adminsObjects = Invoke-Command -Session $Session -ScriptBlock {Get-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue if ($true -in $adminsObjects.Enabled) { Trace-Warning "One or more local administrators are still enabled on: $($Session.ComputerName)" } else { Trace-Execution "Successfully force disabled local administrators on: $($Session.ComputerName)" } } } function Set-BuildinUsers { [CmdletBinding()] param( [System.Management.Automation.Runspaces.PSSession] $Session ) Trace-Execution "Disabling and renaming specific built-in users $($Session.ComputerName)" # Start with local built-in Administrator $builtinAdmin = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-500"} } if ($builtinAdmin) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinAdmin.SID -NewName LMASAdmin -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinAdmin.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } # built-in Guest $builtinGuest = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-501"} } if ($builtinGuest) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinGuest.SID -NewName LMASGuest -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinGuest.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } # built-in Guest $builtinDefaultAccount = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-503"} } if ($builtinDefaultAccount) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinDefaultAccount.SID -NewName LMASDefaultAccount -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinDefaultAccount.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } } function Set-AzsSecurityParam { [CmdletBinding()] param() $ErrorActionPreference = "Stop" Trace-Execution "Creating/Updating AzsSecurity parameters" try { $eceImported = $false try { Trace-Execution "Trying: Import-Module -Name ECEClient" Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking $eceImported = $true } catch { Trace-Execution "Failed Import-Module -Name ECEClient. Exception: $($_.Exception)" } if ($eceImported -eq $false) { try { Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1" Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEServiceClient\ECEClient.psm1" Import-Module $PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1 -Force -DisableNameChecking Import-Module $PSScriptRoot\..\ECEServiceClient\ECEClient.psm1 -Force -DisableNameChecking $eceImported = $true } catch { Trace-Execution "Failed Import-Module ECEngine\EnterpriseCloudEngine.psd1 and ECEServiceClient\ECEClient.psm1. Exception $($_.Exception)" } } if ($eceImported -eq $false) { throw "Failed to import modules for ECE. Unable to check and/or modify required AzsSecurity AzureStackHardened, SkipSEDProtection and AzureStackEnhancedEncryptionMethod parameters" } $updateECEXml = $false $azsSecCategory = $null $azsHardenedParam = $null $skipSEDProtectParam = $null $azsEnhancedEncryptionMethodParam = $null $eceClient = Create-ECEClientWithApplicationGateway $eceXml = [XML]($eceClient.GetCloudParameters().getAwaiter().GetResult().CloudDefinitionAsXmlString) Trace-Execution "Check if AzsSecurity node exists in ECE xml" $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']") if ($null -eq $azsSecCategory) { Trace-Execution "AzsSecurity node does not exist in ECE xml. Creating AzsSecurity node" $azsSecCategory = $ecexml.CreateElement("Category") $azsSecCategory.SetAttribute("Name", "AzsSecurity") $eceXml.SelectSingleNode("Parameters").AppendChild($azsSecCategory) | Out-Null $updateECEXml = $true } Trace-Execution "Check if AzureStackHardened parameter node exists in ECE xml" $azsHardenedParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackHardened']") if ($null -eq $azsHardenedParam) { Trace-Execution "AzureStackHardened parameter node does not exist in ECE xml. Creating AzureStackHardened parameter node" $azsHardenedParam = $eceXml.CreateElement("Parameter") $azsHardenedParam.SetAttribute("Name", "AzureStackHardened") $azsHardenedParam.SetAttribute("Type", "string") $azsHardenedParam.SetAttribute("Value", "Disabled") $azsHardenedParam.SetAttribute("AllowedValues", "") $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]") $azsSecCategory.AppendChild($azsHardenedParam) | Out-Null $updateECEXml = $true } Trace-Execution "Get AzureStackHardened parameter value from ECE xml" $azsHardenedParamValue = $azsHardenedParam.Value Trace-Execution "AzureStackHardened parameter value from ECE xml is: $azsHardenedParamValue" if ([string]::IsNullOrEmpty($azsHardenedParamValue)) { Trace-Execution "AzureStackHardened parameter value from ECE xml is null or empty. Setting value to Disabled" $azsHardenedParam.SetAttribute("Value", "Disabled") $azsHardenedParam.SetAttribute("AllowedValues", "") $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]") $updateECEXml = $true } Trace-Execution "Check if SkipSEDProtection parameter node exists in ECE xml" $skipSEDProtectParam = $eceXml.SelectSingleNode("//Parameter[@Name='SkipSEDProtection']") if ($null -eq $skipSEDProtectParam) { Trace-Execution "SkipSEDProtection parameter node does not exist in ECE xml. Creating SkipSEDProtection parameter node" $skipSEDProtectParam = $eceXml.CreateElement("Parameter") $skipSEDProtectParam.SetAttribute("Name", "SkipSEDProtection") $skipSEDProtectParam.SetAttribute("Type", "string") $skipSEDProtectParam.SetAttribute("Value", "Disabled") $skipSEDProtectParam.SetAttribute("AllowedValues", "") $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]") $azsSecCategory.AppendChild($skipSEDProtectParam) | Out-Null $updateECEXml = $true } Trace-Execution "Get SkipSEDProtection parameter value from ECE xml" $skipSEDProtectParamValue = $skipSEDProtectParam.Value Trace-Execution "SkipSEDProtection parameter value from ECE xml is: $skipSEDProtectParamValue" if ([string]::IsNullOrEmpty($skipSEDProtectParamValue)) { Trace-Execution "SkipSEDProtection parameter value from ECE xml is null or empty. Setting value to Disabled" $skipSEDProtectParam.SetAttribute("Value", "Disabled") $skipSEDProtectParam.SetAttribute("AllowedValues", "") $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]") $updateECEXml = $true } Trace-Execution "Check if AzureStackEnhancedEncryptionMethod parameter node exists in ECE xml" $azsEnhancedEncryptionMethodParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackEnhancedEncryptionMethod']") if ($null -eq $azsEnhancedEncryptionMethodParam) { Trace-Execution "AzureStackEnhancedEncryptionMethod parameter node does not exist in ECE xml. Creating AzureStackEnhancedEncryptionMethod parameter node" $azsEnhancedEncryptionMethodParam = $eceXml.CreateElement("Parameter") $azsEnhancedEncryptionMethodParam.SetAttribute("Name", "AzureStackEnhancedEncryptionMethod") $azsEnhancedEncryptionMethodParam.SetAttribute("Type", "string") $azsEnhancedEncryptionMethodParam.SetAttribute("Value", "") $azsEnhancedEncryptionMethodParam.SetAttribute("AllowedValues", "") $azsEnhancedEncryptionMethodParam.SetAttribute("Reference", "[{AzureStackEnhancedEncryptionMethod}]") $azsSecCategory.AppendChild($azsEnhancedEncryptionMethodParam) | Out-Null $updateECEXml = $true } if ($updateECEXml) { Trace-Execution "Updating ECE xml with AzsSecurity parameters" $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription $eceCloudParametersDefinition.ConfigurationName = 'AzureStack' $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult() Trace-Execution "Created\updated AzsSecurity category with AzsSecurity parameters" } } catch { Trace-Execution "Failed to create/update AzsSecurity category with AzsSecurity parameters in ECE. Exception: $($_.Exception)" throw } } function Update-AzsSecurityParam { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [string] $Name, [Parameter(Mandatory = $true)] [string] $Value, [Parameter(Mandatory = $true)] [string] $Reference ) $ErrorActionPreference = "Stop" Trace-Execution "Update security parameter $Name in ECE" Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking $eceClient = Create-ECEClientWithServiceResolver $eceXml = [XML]$eceClient.GetCloudParameters().GetAwaiter().GetResult().CloudDefinitionAsXmlString $needUpdate = $true $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']") $parameter = $eceXml.SelectSingleNode("//Parameter[@Name='$Name']") if ($null -eq $parameter) { Trace-Execution "$Name parameter node does not exist in ECE xml. Creating $Name parameter node" $parameter = $eceXml.CreateElement("Parameter") $parameter.SetAttribute("Name", $Name) $parameter.SetAttribute("Type", "string") $parameter.SetAttribute("Value", $Value) $parameter.SetAttribute("AllowedValues", "") $parameter.SetAttribute("Reference", "[{$Reference}]") $azsSecCategory.AppendChild($parameter) | Out-Null } else { if ($Value -eq $parameter.Value) { $needUpdate = $false Trace-Execution "No need to update Security parameter $Name updated in ECE" } else { $parameter.SetAttribute("Value", $Value) } } if ($needUpdate) { $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription $eceCloudParametersDefinition.ConfigurationName = 'AzureStack' $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult() Trace-Execution "Security parameter $Name updated in ECE" } } Export-ModuleMember -Function Get-DisableSecureBootOnInfraVms Export-ModuleMember -Function Clear-SecurityItem Export-ModuleMember -Function Set-AzsSecurityParam Export-ModuleMember -Function Update-AzsSecurityParam # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDcERv5QPcvOjm # GArCioMHysRd5pn3CZ0GIikEYN9tO6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJlvPwlkS6yH/w5X8KX+DTL9 # qcdKAAUUwlVl9ylUJEV9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAFDTVIvcVpGCKF9lsdmDZG1tRsaWSq5atbgfgqNieeI5n5IDeqz222Trl # c2n6iNXr2L6pu8BuCGn/CisqMcRQJnVn+GMAJi7i+41RASHCJ4ZL4S5uOfeBwrAX # LJlnfmMVdj3R4PI7zrVszrDpL0HPpwNZXmelqnzdQBEBcftEIeDJXjv5QEBo4I/v # o8hKngZ6min53olEFcTL54/UqlDEts+YB04twbRDQFV5PHRPi4cuIUcxmD16TASe # xhe/aM4ZEpoPxObxs8+cRPuBraK4Mozo0ohE10BXh32NUXj07jodumBbOpjdwVJ2 # 3zahLkMZ+N9HIMbdGaQ4xAIavReIfaGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBpfJcE+Sfr2t6zecS83TcCHwR3+mJgtROOgV2mVe6H3wIGZpfa9w38 # GBIyMDI0MDcyMzExMDMxMS4xMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # RDA4Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF7MIIHJzCCBQ+gAwIBAgITMwAAAdzB4IzCX1hejgABAAAB3DANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJG # RC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAi8izIDWyOD2RIonN6WtRYXlK # GphYvzdqafdITknIhU9QLsXqpNwumGEdn2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC # 0IY8lryRXUIa+fdt4YHabaW2aolqcbvWYDLCuQoBNieLAos9AsnTQSRfDlNLB+Yl # dt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQNc++m0AaqR0UsrCjgFOUSCe/N5N9e6TNf # y9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFnpSWgjQULxeUFANUNfkl4wSzHuOAkN0Sc # rjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/e+USYgDJH/utIW9wufACox2pzL+KpA8y # UM5x3QBueI/yJrUFARSd9lPdTHIr2ssH9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6 # vqdS18N/nWU9wqErhWjzek4TX+eJaVWcQdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYw # SCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9ZohqzHtrQYH591PD6B5GfoyjZLr79tkTBL # /QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSHvmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z # 9warPaFdXyJmcJkMGuudmK+cSsIyHkWV+Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY # /+4cH2ASzyn/097+a30CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe4 # 1ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq # 3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLUZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl # 8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdEJPhD7yihBdMzPGJ7B8StUu3xZ595udxJ # PSLrKkq/zukJiTEzbhtupsz9X4zlUGmkJSztH5wROLP/MQDUBtkv++Je0eavIDQI # Z34+31z5p2xh+bup7lQydLR/9gmYQQyQSoZcLPIsr52H5SwWLR3iWR1wT5mrkk2M # gd6xfXDO0ZUC29fQNgNl03ZZnWST6E4xuVRX8vyfVhbOE//ldCdiXTcB9cSuf7UR # q3KWJ/N3cKEnXG4YbvphtaCJFecO8KLAOq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ5 # 4n9hxIE405zQM1NZuMxsvnSp4gQLSUdKkvatFg1W7eGwfMbyfm7kJBqM/DH0/Omx # kh4VM0fJUXqS6MjhWj0287/MXw63jggyPgztRf1lrhDAZ/kHvXHns6NpfneDFPi/ # Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/t2kJVAi5DTrafIhkqexfHO4oVvRONdbD # o4WkbVuyNek6jkMweTKyuJvEeivhjPl1mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW # 3IcBboiAtznD/cP5HWhsOEpnbVYwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1zCCAkACAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQw # ODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9zP7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6kmZBjAiGA8yMDI0MDcyMzEwNTA0NloYDzIwMjQwNzI0MTA1MDQ2WjB3MD0GCisG # AQQBhFkKBAExLzAtMAoCBQDqSZkGAgEAMAoCAQACAgvsAgH/MAcCAQACAhHIMAoC # BQDqSuqGAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAR8ul0XzmhgzkHCPV # KYtWXxiNEexu5P+KimWX+yDfUBfyKSB9jK1QoRxOm45oLe9YC2+1Zk9Rir5UWY7E # WXH41/234xR/ORzeWU3DzZYdldcY1q+Iu1B6KS5zOBHWvdq0Mh0AtwpnhOjsUjMu # c5QukMZqaDLRn7XEgCgwyEWmto8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgABAAAB3DANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCAh4mjVzgIFqQrezLV7AV5vzRFxbhRolA306bdq6NjQajCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIFOnF4pq2UQ/jLypnOO5YvQ67QirEQsOFfZMvKXE # gg03MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHc # weCMwl9YXo4AAQAAAdwwIgQgpOpRG4cuAzzQCNIjWYvnHNv7UhDMS665m11Th5k9 # kvswDQYJKoZIhvcNAQELBQAEggIADjnagBPRwxye5uv3Yhg7GiEEbRDLHIeHV+tF # NDVwM3phVvmLpNYr0xRpcCj+rS2vco2e4Mv0p1cb4k+3re5dG0mRmme4BpEbYwoI # DvLvS+eqg4i52ulgart86d03JPcaY7bQnhPWdN9oDv095NVXGV63yfd1gwx2LSUd # DnVCEA6Y8/TgGWDyWa2i+XRwHpB2R82AT59Or+Ihe9XVvcHrMQcyaG8o9AVLqHPF # qlj6ypU1YRNK9uwHOlHy97zzcU9Bak68LzGw/zT+a46khjGbxZkVyj/rZ1UcCj20 # 9qrgMms43BmkXTVWxc+bvin5up3FU/OWIURWq09EoQtGQpiMcWEWn+nNdzmDrTDg # PLk53IaJNu7KGMaW9o6XGXiwljfL5DI0WJWp7BdvqLNfXow84JhOhNU7IfWTJcuY # tTaHg2UFHVciNkiGj2Ipe/GQI6WGcLBoI5OPAYaH6J8uosqpm9mpBIMLRD51yxp1 # LmczmI0zJ8olfm6WgkwdumL0+mdBl0tbnY2V6gEQoiulmX9BhpkJpxtVBE0WrjiN # ims1MeMlc0SpvxKEorfNxLWXofb/KwAcHtL+vXSNDU5e/FvbuMawCr7yczouSoCW # RoQFtovJm+6XilT8/cE6gJI0WlrCy3FVcEkJCkXWrYtc6U+qtPJxSjZslkkOuyTp # dg5ptnc= # SIG # End signature block |