UMN-Common.psm1
####### UMN-Common Module #### ### # Copyright 2017 University of Minnesota, Office of Information Technology # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # You should have received a copy of the GNU General Public License # along with Foobar. If not, see <http://www.gnu.org/licenses/>. ### function Convert-ColumnIndexToA1Notation { <# .SYNOPSIS Short description .DESCRIPTION Long description .EXAMPLE Example .NOTES General notes #> [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [int]$ColumnIndex ) process { while ($ColumnIndex -gt 0) { $Temp = ($ColumnIndex -1) % 26 #$Letter = } } } #END Convert-ColumnIndexToA1Notation <# .Synopsis convert text or byte array to URL friendly BAse64 .DESCRIPTION convert text or byte array to URL friendly BAse64 .EXAMPLE ConvertTo-Base64URL -text $headerJSON .EXAMPLE ConvertTo-Base64URL -Bytes $rsa.SignData($toSign,"SHA256") #> function ConvertTo-Base64URL { param ( [Parameter(ParameterSetName='String')] [string]$text, [Parameter(ParameterSetName='Bytes')] [System.Byte[]]$Bytes ) if($Bytes){$base = $Bytes} else{$base = [System.Text.Encoding]::UTF8.GetBytes($text)} $base64Url = [System.Convert]::ToBase64String($base) $base64Url = $base64Url.Split('=')[0] $base64Url = $base64Url.Replace('+', '-') $base64Url = $base64Url.Replace('/', '_') $base64Url } function ConvertTo-OrderedDictionary { <# .SYNOPSIS Converts a hashtable or array to an ordered dictionary. .DESCRIPTION Takes in a hashtable or array and then returns an ordered dictionary. .PARAMETER Object Object to convert to an ordered dictionary .NOTES Name: ConvertTo-OrderedDictionary Author: Jeff Bolduan LASTEDIT: 3/11/2016 .EXAMPLE @{"Item1" = "Value1"; "Item2" = "Value2"; "Item3" = "Value3"; "Item4" = "Value4"} | ConvertTo-OrderedDictionary Will return the following: Name Value ---- ----- Item1 Value1 Item2 Value2 Item3 Value3 Item4 Value4 .EXAMPLE ConvertTo-OrderedDictionary -Object @{"Item1" = "Value1"; "Item2" = "Value2"; "Item3" = "Value3"; "Item4" = "Value4"} Will return the following: Name Value ---- ----- Item1 Value1 Item2 Value2 Item3 Value3 Item4 Value4 #> [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] $Object ) Begin { $Dictionary = [ordered]@{} } Process { if($Object -is [System.Collections.Hashtable]) { foreach($Key in ($Object.Keys | sort)) { $Dictionary.Add($Key, $Object[$Key]) } } elseif($Object -is [System.Array]) { for($i = 0; $ -lt $Object.Count; $i++) { $Dictionary.Add($i, $Object[$i]) } } else { throw [System.IO.InvalidDataException] } } End { return $Dictionary } } #END ConvertTo-OrderedDictionary <# .Synopsis zip up module for DSC pull Server - can not use 7zip .DESCRIPTION zip up module for DSC pull Server - can not use 7zip .EXAMPLE CreateZipFromPSModulePath -ListModuleNames cChoco -Destination $dest #> function CreateZipFromPSModulePath { param( [Parameter(Mandatory)] [string[]]$ListModuleNames, [Parameter(Mandatory)] [string]$Destination ) foreach ($module in $ListModuleNames) { $allVersions = Get-Module -Name $module -ListAvailable -Verbose # Package all versions of the module foreach ($moduleVersion in $allVersions) { $name = $moduleVersion.Name $source = "$Destination\$name" # Create package zip $path = $moduleVersion.ModuleBase $version = $moduleVersion.Version.ToString() Compress-Archive -Path "$path\*" -DestinationPath "$source.zip" -Verbose -Force $newName = "$Destination\$name" + "_" + "$version" + ".zip" # Rename the module folder to contain the version info. if (Test-Path $newName) { Remove-Item $newName -Recurse -Force } Rename-Item -Path "$source.zip" -NewName $newName -Force } } } function Get-ARP { <# .SYNOPSIS This function is designed to return all ARP entries .DESCRIPTION This function returns an object containing all arp entries and details for each sub item property. On 64-bit powershell sessions there's dynamic paramters to specify the the 32-bit registry or 64-bit registry only .NOTES Name: Get-ARP Author: Aaron Miller LASTEDIT: 05/08/2013 .EXAMPLE $ARP = Get-ARP This returns all arp entries into a variable for processing later. #> [CmdletBinding(DefaultParameterSetName='none')] Param () DynamicParam { if ([IntPtr]::size -eq 8) { $att1 = new-object -Type System.Management.Automation.ParameterAttribute -Property @{ParameterSetName="x64ARP"} $attC1 = new-object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attC1.Add($att1) $dynParam1 = new-object -Type System.Management.Automation.RuntimeDefinedParameter("x64ARP", [switch], $attC1) $att2 = new-object -Type System.Management.Automation.ParameterAttribute -Property @{ParameterSetName="x86ARP"} $attC2 = new-object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attC2.Add($att2) $dynParam2 = new-object -Type System.Management.Automation.RuntimeDefinedParameter("x86ARP", [switch], $attC2) $paramDictionary = new-object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("x64ARP", $dynParam1) $paramDictionary.Add("x86ARP", $dynParam2) return $paramDictionary } } Begin { $Primary = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" $Wow = "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" $toProcess = @() switch ($PsCmdlet.ParameterSetName) { "x64ARP" {$toProcess+=$Primary} "x86ARP" {$toProcess+=$Wow} default {$toProcess+=$Primary;if ([IntPtr]::size -eq 8) {$toProcess+=$Wow}} } } End {Return [array]($toProcess | ForEach-Object {Get-ChildItem $_} | ForEach-Object {Get-ItemProperty $_.pspath})} } #END Get-ARP function Get-ExceptionsList { <# .SYNOPSIS Get's all exceptions available on current machine. .DESCRIPTION Goes through all the assemblies on the current computer and gets every exception then outputs them to the console. .NOTES Name: Get-ExceptionsList Author: Jeff Bolduan LASTEDIT: 3/11/2016 #> [CmdletBinding()] param() # Get all current assemblies $CurrentDomainAssemblies = [appdomain]::CurrentDomain.GetAssemblies() # Loop through assemblies and output any members which contain exception in the name foreach($Assembly in $CurrentDomainAssemblies) { try { $Assembly.GetExportedTypes() | Where-Object { $_.Fullname -match 'Exception' } } catch { } } } #END Get-ExceptionsList function Get-RandomString { <# .SYNOPSIS Returns a random string of a given length. .DESCRIPTION Takes in a minimum and maximum lenth and then builds a string of that size. .PARAMETER LengthMin Integer for the minimum length of the string .PARAMETER LengthMax Integer for the maximum length of the string .NOTES Name: Get-RandomString Author: Jeff Bolduan LASTEDIT: 3/11/2016 .EXAMPLE Get-RandomString -LengthMin 5 -LengthMax 10 Will return a random string composed of [a-z][A-Z][0-9] and dash, underscore and period. It's length will be between 5 and 10. #> [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$LengthMin, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$LengthMax, [Parameter(Mandatory=$false)] [ValidateNotNullOrEmpty()] [string]$ValidCharacters = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_." ) $PossibleCharacters = $ValidCharacters.ToCharArray() $Result = "" if($LengthMin -eq $LengthMax) { $Length = $LengthMin } else { $Length = Get-Random -Minimum $LengthMin -Maximum $LengthMax } #Write-Verbose -Message "Length: $Length" for($i = 0; $i -lt $Length; $i++) { $Result += $PossibleCharacters | Get-Random } return $Result } #END Get-RandomString #region Get-UsersIDM function Get-UsersIDM { <# .Synopsis Fetch list of users from IDM .DESCRIPTION Fetch list of users from IDM .PARAMETER ldapServer Name of LDAP server to connect to .PARAMETER ldapSearchString LDAP query to execute .PARAMETER searchDN DN to execute search against .PARAMETER TimeoutMinutes Timeout for the query, in minutes, defaults to 30. If the query exceeds this time it will throw an exception .EXAMPLE $users = Get-UsersIDM -ldapCredential $ldapCredential -ldapServer $ldapServer -ldapSearchString "(Role=*.cur*)" -TimeoutMinutes 60 .EXAMPLE $users = Get-UsersIDM -ldapCredential $ldapCredential -ldapServer $ldapServer -ldapSearchString "(&(Role=*.staff.*)(cn=mrEd))" #> [CmdletBinding()] Param ( [System.Net.NetworkCredential]$ldapCredential, [Parameter(Mandatory)] [string]$ldapServer, [Parameter(Mandatory)] [string]$ldapSearchString, [string]$searchDN, [int]$TimeoutMinutes = 30 ) #Load the assemblies needed for ldap lookups $null = [System.Reflection.Assembly]::LoadWithPartialName("System.DirectoryServices.Protocols") $null = [System.Reflection.Assembly]::LoadWithPartialName("System.Net") #setup the ldap connection $ldapConnection = New-Object System.DirectoryServices.Protocols.LdapConnection((New-Object System.DirectoryServices.Protocols.LdapDirectoryIdentifier($ldapServer,636)), $ldapCredential) $ldapConnection.AuthType = [System.DirectoryServices.Protocols.AuthType]::Basic $ldapConnection.SessionOptions.ProtocolVersion = 3 #cert validation fails, so this will never validate the cert and just connect things $ldapConnection.SessionOptions.VerifyServerCertificate = { return $true; } $ldapConnection.SessionOptions.SecureSocketLayer = $true $ldapConnection.Bind() #build the ldap query $ldapSearch = New-Object System.DirectoryServices.Protocols.SearchRequest $ldapSearch.Filter = $ldapSearchString $ldapSearch.Scope = "Subtree" $ldapSearch.DistinguishedName = $searchDN #execute query for Students...default 30 minute timeout...generally takes about 12 minutes $ldapResponse = $ldapConnection.SendRequest($ldapSearch, (New-Object System.TimeSpan(0,$TimeoutMinutes,0))) -as [System.DirectoryServices.Protocols.SearchResponse] $null = $ldapConnection.Dispose() return ($ldapResponse) } #endregion #region Get-WebReqErrorDetails function Get-WebReqErrorDetails { <# .SYNOPSIS Returns JSON Responsbody data from an Error thrown by Invoke-Webrequest or Invoke-RestMethod .DESCRIPTION Returns JSON Responsbody data from an Error thrown by Invoke-Webrequest or Invoke-RestMethod .PARAMETER err Error thrown by Invoke-Webrequest or Invoke-RestMethod .NOTES Author: Travis Sobeck #> [CmdletBinding()] param ( [Parameter(Mandatory)] [System.Management.Automation.ErrorRecord]$err ) $reader = New-Object System.IO.StreamReader($err.Exception.Response.GetResponseStream()) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() return ($reader.ReadToEnd() | ConvertFrom-Json) } #endregion function Out-RecursiveHash { <# .SYNOPSIS Outputs a hashtable recursively .DESCRIPTION Takes in a hashtable and then writes the values stored within to output. .PARAMETER hash Hashtable to be outputted recursively .NOTES Name: Out-RecursiveHash Author: Jeff Bolduan LASTEDIT: 3/11/2016 .EXAMPLE $hashtable = @{ "Item1" = @{ "SubItem1" = "Value" }; "Item2" = "Value2" } Out-RecursiveHash -Hash $hashtable This will output: SubItem1 : Value Item2 : Value2 #> [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [hashtable]$Hash ) $Return = "" # Loop through each of the hashtable keys and output the key pair unless it's a hashtable then recursive call foreach($key in $hash.keys) { if($hash[$key] -is [HashTable]) { $Return += (Out-RecursiveHash $hash[$key]) } else { $Return += "$key : $($hash[$key])`n" } } return $Return } #END Out-RecursiveHash #region Send-SplunkHEC function Send-SplunkHEC { <# .Synopsis Send event to Splunk HTTP Event Collector .DESCRIPTION Send event to Splunk HTTP Event Collector .PARAMETER uri URI for HEC endpoint .PARAMETER header contains auth token .PARAMETER host Part of Splunk Metadata for event. Device data being sent from .PARAMETER source Part of Splunk Metadata for event. Source .PARAMETER sourceType Part of Splunk Metadata for event. SourceType .PARAMETER Retries Set how many retries will be attempted if invoking fails .PARAMETER SecondsDelay Set how many seconds to wait between retries .PARAMETER metadata Part of Splunk Metadata for event. Combination of host,source,sourcetype in performatted hashtable, will be comverted to JSON .PARAMETER eventData Event Data in hastable or pscustomeobject, will be comverted to JSON .PARAMETER JsonDepth Optional, specifies the Depth parameter to pass to ConvertTo-JSON, defaults to 100 #> [CmdletBinding()] Param ( # Param1 help description [Parameter(Mandatory)] [string]$uri, [Parameter(Mandatory)] [Collections.Hashtable]$header, [Parameter(Mandatory,ParameterSetName='Components')] [String]$source, [Parameter(Mandatory,ParameterSetName='Components')] [String]$sourceType, [Alias("Host")] [Parameter(Mandatory,ParameterSetName='Components')] [String]$EventHost, [Parameter(Mandatory,ParameterSetName='hashtable')] [Collections.Hashtable]$metadata, # This can be [Management.Automation.PSCustomObject] or [Collections.Hashtable] [Parameter(Mandatory)] $eventData, [int]$Retries = 5, [int]$SecondsDelay = 10, [int]$JsonDepth = 100 ) Begin{ $retryCount = 0 $completed = $false $response = $null } Process { if ($metadata){$bodySplunk = $metadata.Clone()} else {$bodySplunk = @{'host' = $EventHost;'source' = $source;'sourcetype' = $sourcetype}} #Splunk takes time in Unix Epoch format, so first get the current date, #convert it to UTC (what Epoch is based on) then format it to seconds since January 1 1970. #Without converting it to UTC the date would be offset by a number of hours equal to your timezone's offset from UTC $bodySplunk['time'] = (Get-Date).toUniversalTime() | Get-Date -UFormat %s $internalEventData = $eventData | ConvertTo-Json | ConvertFrom-Json Add-Member -InputObject $internalEventData -Name "SplunkHECRetry" -Value $retryCount -MemberType NoteProperty $bodySplunk['event'] = $internalEventData while (-not $completed) { try { $response = Invoke-RestMethod -Uri $uri -Headers $header -UseBasicParsing -Body ($bodySplunk | ConvertTo-Json -Depth $JsonDepth) -Method Post if ($response.text -ne 'Success' -or $response.code -ne 0){throw "Failed to submit to Splunk HEC $($response)"} $completed = $true } catch { if ($retrycount -ge $Retries) { throw } else { Start-Sleep $SecondsDelay $retrycount++ $bodySplunk.event.SplunkHECRetry = $retryCount } } } } End{return $true} } #endregion #region Get-CurrentEpochTime function Get-CurrentEpochTime { <# .Synopsis Get current Epoch Time (seconds from 00:00:00 1 January 1970 UTC) as string with 1/100,000 of a second precision .DESCRIPTION Get current Epoch Time (seconds from 00:00:00 1 January 1970 UTC) as string with 1/100,000 of a second precision #> [OutputType([string])] [CmdletBinding()] Param ( ) Begin{} Process { (Get-Date).toUniversalTime() | Get-Date -UFormat %s } End{} } #endregion function Set-ModuleLatestVersion { <# .Synopsis installs latest version of a module and deletes the old one .DESCRIPTION The problem with Update-module is it leave the old one behind, this cleans that up .EXAMPLE Set-ModuleLatestVersion -module xPSDesiredStateConfiguration #> [CmdletBinding()] Param ( # Param1 help description [Parameter(Mandatory=$true, ValueFromPipelineByPropertyName=$true, Position=0)] [string]$module ) Begin { } Process { $currentMod = get-module -ListAvailable $module if ($currentMod.count -gt 1){throw "Multiple version of module installed, clear out old $($currentMod.Version)"} $currentVersion = $currentMod.Version.ToString() Update-Module $module -Force if((get-module -ListAvailable $module).count -gt 1){Uninstall-Module -Name $module -RequiredVersion $currentVersion;get-module -ListAvailable $module} else {Write-Warning "Current version was latest version"} } End { } } function Test-RegistryValue { <# .SYNOPSIS This function takes in a registry path, a name and then determines whether the registry value exists. .NOTES Name: Test-RegistryValue Author: Jeff Bolduan LASTEDIT: 09/01/2016 .EXAMPLE Test-RegistryValue -Path HKLM:\Foo\Bar -Value FooBar #> [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$Path, [Parameter(Mandatory=$true)] [string]$Name, [Parameter(Mandatory=$false)] [switch]$PassThru ) if(Test-Path -LiteralPath $Path) { $Key = Get-Item -LiteralPath $Path if($Key.GetValue($Value, $null) -ne $null) { if($PassThru) { Get-ItemProperty -LiteralPath $Path -Name $Name } else { $true } } else { $false } } else { return $false } } #END Test-RegistryValue function Write-Log { <# .SYNOPSIS This function is used to pass messages to a ScriptLog. It can also be leveraged for other purposes if more complex logging is required. .DESCRIPTION Write-Log function is setup to write to a log file in a format that can easily be read using CMTrace.exe. Variables are setup to adjust the output. .PARAMETER Message The message you want to pass to the log. .PARAMETER Path The full path to the script log that you want to write to. .PARAMETER Severity Manual indicator (highlighting) that the message being written to the log is of concern. 1 - No Concern (Default), 2 - Warning (yellow), 3 - Error (red). .PARAMETER Component Provide a non null string to explain what is being worked on. .PARAMETER Context Provide a non null string to explain why. .PARAMETER Thread Provide a optional thread number. .PARAMETER Source What was the root cause or action. .PARAMETER Console Adjusts whether output is also directed to the console window. .NOTES Name: Write-Log Author: Aaron Miller LASTEDIT: 01/23/2013 10:09:00 .EXAMPLE Write-Log -Message $exceptionMsg -Path $ScriptLog -Severity 3 Writes the content of $exceptionMsg to the file at $ScriptLog and marks it as an error highlighted in red #> PARAM( [Parameter(Mandatory=$true)][string]$Message, [Parameter(Mandatory=$false)][string]$Path = "$env:TEMP\CMTrace.Log", [Parameter(Mandatory=$false)][int]$Severity = 1, [Parameter(Mandatory=$false)][string]$Component = " ", [Parameter(Mandatory=$false)][string]$Context = " ", [Parameter(Mandatory=$false)][string]$Thread = "1", [Parameter(Mandatory=$false)][string]$Source = "", [Parameter(Mandatory=$false)][switch]$Console ) # Setup the log message $time = Get-Date -Format "HH:mm:ss.fff" $date = Get-Date -Format "MM-dd-yyyy" $LogMsg = '<![LOG['+$Message+']LOG]!><time="'+$time+'+000" date="'+$date+'" component="'+$Component+'" context="'+$Context+'" type="'+$Severity+'" thread="'+$Thread+'" file="'+$Source+'">' # Write out the log file using the ComObject Scripting.FilesystemObject $ForAppending = 8 $oFSO = New-Object -ComObject scripting.filesystemobject $oFile = $oFSO.OpenTextFile($Path, $ForAppending, $true) $oFile.WriteLine($LogMsg) $oFile.Close() Remove-Variable oFSO Remove-Variable oFile # Write to the console if $Console is set to True if ($Console -eq $true) {Write-Host $Message} } #END Write-Log function Get-RandomCharacter{ <# .SYNOPSIS This function is to randomize a list of characters for password generation. .PARAMETER length How many of each character set you want. .PARAMETER characters A set list of characters to be selected from. .EXAMPLE Get-RandomCharacters -length 2 -characters '1234567890' 42 .NOTES Taken from all over the web. Notable = https://activedirectoryfaq.com/2017/08/creating-individual-random-passwords/ #> param( [Parameter(Mandatory=$true)]$length, [Parameter(Mandatory=$true)]$characters ) Begin{} Process{ $random = 1..$length | ForEach-Object {Get-Random -Maximum $characters.length} } End{ return $characters[$random] -join '' } } function Scramble-String{ <# .SYNOPSIS This function takes a list of characters and randomizes them. .PARAMETER inputString A string of characters to scramble. .EXAMPLE Scramble-String -inputString '12345' 51432 .NOTES Taken from all over the web. Notable = https://activedirectoryfaq.com/2017/08/creating-individual-random-passwords/ #> param( [Parameter(Mandatory=$true)] [string]$inputString ) Begin{$characterArray = $inputString.ToCharArray()} Process{ $scrambledStringArray = $characterArray | Get-Random -Count $characterArray.Length $outputString = $scrambledStringArray -join '' } End{return $outputString} } function New-Password{ <# .SYNOPSIS This function just generates a password based on predetermined character list. .PARAMETER passwordLength The length of the password .PARAMETER special Boolean for ignoring special characters. Default is True .EXAMPLE New-Password -passwordLength 15 42 .NOTES Taken from all over the web. Notable = https://activedirectoryfaq.com/2017/08/creating-individual-random-passwords/ #> param( [int]$passwordLength = 40, [boolean]$special = $True ) Begin{ [int]$length = [Math]::Truncate($passwordLength / 4) switch ($passwordLength % 4) { 0 { $lengths = @($length, $length, $length, $length) } 1 { $lengths = @($length, $length, $length, ($length + 1)) } 2 { $lengths = @($length, $length, ($length + 1), ($length + 1)) } 3 { $lengths = @($length, ($length + 1), ($length + 1), ($length + 1)) } } } Process{ $password = Get-RandomCharacter -length $lengths[0] -characters 'abcdefghiklmnoprstuvwxyz' $password += Get-RandomCharacter -length $lengths[1] -characters 'ABCDEFGHKLMNOPRSTUVWXYZ' $password += Get-RandomCharacter -length $lengths[2] -characters '1234567890' If($special -eq $True){ $password += Get-RandomCharacter -length $lengths[3] -characters '!$%&()=}][{#+' } Else{ $password += Get-RandomCharacter -length $lengths[3] -characters '150AHKbrp2z3' } $password = Scramble-String $password } End{return $password} } # SIG # Begin signature block # MIIlNAYJKoZIhvcNAQcCoIIlJTCCJSECAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQURkFu8EMpdbb2Dlh+55rqXoFx # F3yggh8cMIIFgTCCBGmgAwIBAgIQOXJEOvkit1HX02wQ3TE1lTANBgkqhkiG9w0B # AQwFADB7MQswCQYDVQQGEwJHQjEbMBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHDAdTYWxmb3JkMRowGAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEh # MB8GA1UEAwwYQUFBIENlcnRpZmljYXRlIFNlcnZpY2VzMB4XDTE5MDMxMjAwMDAw # MFoXDTI4MTIzMTIzNTk1OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB8jCB7zAfBgNVHSME # GDAWgBSgEQojPpbxB+zirynvgqV/0DCktDAdBgNVHQ4EFgQUU3m/WqorSs9UgOHY # m8Cd8rIDZsswDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wEQYDVR0g # BAowCDAGBgRVHSAAMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6Ly9jcmwuY29tb2Rv # Y2EuY29tL0FBQUNlcnRpZmljYXRlU2VydmljZXMuY3JsMDQGCCsGAQUFBwEBBCgw # JjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMA0GCSqGSIb3 # DQEBDAUAA4IBAQAYh1HcdCE9nIrgJ7cz0C7M7PDmy14R3iJvm3WOnnL+5Nb+qh+c # li3vA0p+rvSNb3I8QzvAP+u431yqqcau8vzY7qN7Q/aGNnwU4M309z/+3ri0ivCR # lv79Q2R+/czSAaF9ffgZGclCKxO/WIu6pKJmBHaIkU4MiRTOok3JMrO66BQavHHx # W/BBC5gACiIDEOUMsfnNkjcZ7Tvx5Dq2+UUTJnWvu6rvP3t3O9LEApE9GQDTF1w5 # 2z97GA1FzZOFli9d31kWTz9RvdVFGD/tSo7oBmF0Ixa1DVBzJ0RHfxBdiSprhTEU # xOipakyAvGp4z7h/jnZymQyd/teRCBaho1+VMIIFujCCBKKgAwIBAgIQRbkDLNyj # y9TlrnXGABPhkzANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzELMAkGA1UE # CBMCTUkxEjAQBgNVBAcTCUFubiBBcmJvcjESMBAGA1UEChMJSW50ZXJuZXQyMREw # DwYDVQQLEwhJbkNvbW1vbjElMCMGA1UEAxMcSW5Db21tb24gUlNBIENvZGUgU2ln # bmluZyBDQTAeFw0yMDEyMTEwMDAwMDBaFw0yMzEyMTEyMzU5NTlaMIHPMQswCQYD # VQQGEwJVUzEOMAwGA1UEEQwFNTU0NTUxEjAQBgNVBAgMCU1pbm5lc290YTEUMBIG # A1UEBwwLTWlubmVhcG9saXMxHDAaBgNVBAkMEzEwMCBVbmlvbiBTdHJlZXQgU0Ux # IDAeBgNVBAoMF1VuaXZlcnNpdHkgb2YgTWlubmVzb3RhMSQwIgYDVQQLDBtDb21w # dXRlciBhbmQgRGV2aWNlIFN1cHBvcnQxIDAeBgNVBAMMF1VuaXZlcnNpdHkgb2Yg # TWlubmVzb3RhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA18YBwbvE # uOqjXUWH3KajxBfWsHL1BVnbCnmklAmdP0nVD00oLJJ8mut6yXzkvm+2+ukAp7Ij # kE0b9AAU3oSNVAyzUTu3WoGW1E9wdsSM1E+/+01erEitMRxgJD0CgfH22tEtbI/7 # d+7TcTSlga+vaO3CHNEmuqOotBpbBlQw29hlLUccUJNaE0qg8q4SZAOB45lAKfm+ # s2EaVv0xj+wJB4ETAWbj//9I/3/npuQt4/GDwayJJkTarDZtbZea8xc96VN20uPW # x8s6TgzLUC4kPmCD2nlgHV+4zcOsoVi5P3DTalFVngLCWgtEU7L+YnbwH0fsiWWL # 65aFtjaN0U+seQIDAQABo4IB4jCCAd4wHwYDVR0jBBgwFoAUrjUjF///Bj2cUOCM # JGUzHnAQiKIwHQYDVR0OBBYEFPWfK7krHCJBdQnoQDWt+woKsPdoMA4GA1UdDwEB # /wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMBEGCWCG # SAGG+EIBAQQEAwIEEDBwBgNVHSAEaTBnMFsGDCsGAQQBriMBBAMCATBLMEkGCCsG # AQUFBwIBFj1odHRwczovL3d3dy5pbmNvbW1vbi5vcmcvY2VydC9yZXBvc2l0b3J5 # L2Nwc19jb2RlX3NpZ25pbmcucGRmMAgGBmeBDAEEATBJBgNVHR8EQjBAMD6gPKA6 # hjhodHRwOi8vY3JsLmluY29tbW9uLXJzYS5vcmcvSW5Db21tb25SU0FDb2RlU2ln # bmluZ0NBLmNybDB+BggrBgEFBQcBAQRyMHAwRAYIKwYBBQUHMAKGOGh0dHA6Ly9j # cnQuaW5jb21tb24tcnNhLm9yZy9JbkNvbW1vblJTQUNvZGVTaWduaW5nQ0EuY3J0 # MCgGCCsGAQUFBzABhhxodHRwOi8vb2NzcC5pbmNvbW1vbi1yc2Eub3JnMBkGA1Ud # EQQSMBCBDm9pdG1wdEB1bW4uZWR1MA0GCSqGSIb3DQEBCwUAA4IBAQBi877I9cSz # qelcex0hoTmE22pMGSWnhS8+KbkrcHi3pM5I7jfxjhnD1UGZbjfZ+M54srmz2kZ5 # 9+EiB1K2RVAz8owivQn3wCJ7ZSea0AVu+BTsYQ4tMvvilkbtLO2weftoPdhBjrSc # uRYTgwvbgbQCPZtNcKr1Nui1wffMF/VmZfpH2vnuh6bJ9XzdtXiv93JGMsOByC2h # gHHiXUFTJWtyWj3PwbZTQ5LV6Yx+NuZ1jBrODbY17lCSP6+ebam+azC8Uv26VIz1 # bL/2ohImhYiU1966pkJlnBhcHM4b+uvqRtUgi2tCWkgZVsKrAFXcicH0tQi7lPX0 # 4vQvQRAcUmXkMIIF6zCCA9OgAwIBAgIQZeHi49XeUEWF8yYkgAXi1DANBgkqhkiG # 9w0BAQ0FADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDAS # BgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdv # cmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3Jp # dHkwHhcNMTQwOTE5MDAwMDAwWhcNMjQwOTE4MjM1OTU5WjB8MQswCQYDVQQGEwJV # UzELMAkGA1UECBMCTUkxEjAQBgNVBAcTCUFubiBBcmJvcjESMBAGA1UEChMJSW50 # ZXJuZXQyMREwDwYDVQQLEwhJbkNvbW1vbjElMCMGA1UEAxMcSW5Db21tb24gUlNB # IENvZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB # AMCgL4seertqdaz4PtyjujkiyvOjduS/fTAn5rrTmDJWI1wGhpcNgOjtooE16wv2 # Xn6pPmhz/Z3UZ3nOqupotxnbHHY6WYddXpnHobK4qYRzDMyrh0YcasfvOSW+p93a # LDVwNh0iLiA73eMcDj80n+V9/lWAWwZ8gleEVfM4+/IMNqm5XrLFgUcjfRKBoMAB # KD4D+TiXo60C8gJo/dUBq/XVUU1Q0xciRuVzGOA65Dd3UciefVKKT4DcJrnATMr8 # UfoQCRF6VypzxOAhKmzCVL0cPoP4W6ks8frbeM/ZiZpto/8Npz9+TFYj1gm+4aUd # iwfFv+PfWKrvpK+CywX4CgkCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qq # K0rPVIDh2JvAnfKyA2bLMB0GA1UdDgQWBBSuNSMX//8GPZxQ4IwkZTMecBCIojAO # BgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggr # BgEFBQcDAzARBgNVHSAECjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0 # cDovL2NybC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25B # dXRob3JpdHkuY3JsMHYGCCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDov # L2NydC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUG # CCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEB # DQUAA4ICAQBGLLZ/ak4lZr2caqaq0J69D65ONfzwOCfBx50EyYI024bhE/fBlo0w # RBPSNe1591dck6YSV22reZfBJmTfyVzLwzaibZMjoduqMAJr6rjAhdaSokFsrgw5 # ZcUfTBAqesReMJx9THLOFnizq0D8vguZFhOYIP+yunPRtVTcC5Jf6aPTkT5Y8Sin # hYT4Pfk4tycxyMVuy3cpY333HForjRUedfwSRwGSKlA8Ny7K3WFs4IOMdOrYDLzh # H9JyE3paRU8albzLSYZzn2W6XV2UOaNU7KcX0xFTkALKdOR1DQl8oc55VS69CWjZ # DO3nYJOfc5nU20hnTKvGbbrulcq4rzpTEj1pmsuTI78E87jaK28Ab9Ay/u3MmQae # zWGaLvg6BndZRWTdI1OSLECoJt/tNKZ5yeu3K3RcH8//G6tzIU4ijlhG9OBU9zmV # afo872goR1i0PIGwjkYApWmatR92qiOyXkZFhBBKek7+FgFbK/4uy6F1O9oDm/Ag # MzxasCOBMXHa8adCODl2xAh5Q6lOLEyJ6sJTMKH5sXjuLveNfeqiKiUJfvEspJdO # lZLajLsfOCMN2UCx9PCfC2iflg1MnHODo2OtSOxRsQg5G0kH956V3kRZtCAZ/Bol # vk0Q5OidlyRS1hLVWZoW6BZQS6FJah1AirtEDoVP/gBDqp2PfI9s0TCCBuwwggTU # oAMCAQICEDAPb6zdZph0fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0 # eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VS # VHJ1c3QgUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAw # MFoXDTM4MDExODIzNTk1OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0 # ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGln # byBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENB # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQ # vZyAIVSTuc+gPlPvs1rAdtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5Lslj # whObtoY/AQWSZm8hq9VxEHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/z # Obu5pCNCrNAVw3+eolzXOPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1P # s5EBjm6dJ3VV0Rc7NCF7lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUN # P9vQ6oWMilZx0S2UTMiMPNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmk # KS9G493bkV+fPzY+DjBnK0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79 # qsoIWId3pBXrGVX/0DlULSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG # 0paH3uhrDvBbfel2aZMgHEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOi # U2fKsfqNoWTJiJJZy6hGwMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMe # KfobpSKupcNNgtCN2mu32/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728Y # UInXT50zvRq1naHelUF6p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qq # K0rPVIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAO # BgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggr # BgEFBQcDCDARBgNVHSAECjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0 # cDovL2NybC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25B # dXRob3JpdHkuY3JsMHYGCCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDov # L2NydC51c2VydHJ1c3QuY29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUG # CCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEB # DAUAA4ICAQBtVIGlM10W4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQ # KWxhy7VQ2+J9+Z8A70DDrdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0 # EQ/V1cPivNVYeL9IduFEZ22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjN # XH8Blr5yUmo7Qjd8Fng5k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb2 # 89ZLXq2jK0KKIZL+qG9aJXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwE # NrXnd8ucLo0jGLmjwkcd8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6q # PQn1BWy30mRa2Coiwkud8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tD # XWU9UIFuq/DQ0/yysx+2mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c # 6xdOlMN4ZSA7D0GqH+mhQZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGd # HgbGpm0yXbQ4CStJB6r97DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrI # NV0zdo7xfCAMKneutaIChrop7rRaALGMq+P5CslUXdS5anSevUiumDCCBvYwggTe # oAMCAQICEQCQOX+a0ko6E/K9kV8IOKlDMA0GCSqGSIb3DQEBDAUAMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMjA1MTEwMDAwMDBaFw0zMzA4MTAy # MzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQIEwpNYW5jaGVzdGVyMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUg # U3RhbXBpbmcgU2lnbmVyICMzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEAkLJxP3nh1LmKF8zDl8KQlHLtWjpvAUN/c1oonyR8oDVABvqUrwqhg7YT5EsV # Bl5qiiA0cXu7Ja0/WwqkHy9sfS5hUdCMWTc+pl3xHl2AttgfYOPNEmqIH8b+GMuT # Q1Z6x84D1gBkKFYisUsZ0vCWyUQfOV2csJbtWkmNfnLkQ2t/yaA/bEqt1QBPvQq4 # g8W9mCwHdgFwRd7D8EJp6v8mzANEHxYo4Wp0tpxF+rY6zpTRH72MZar9/MM86A2c # OGbV/H0em1mMkVpCV1VQFg1LdHLuoCox/CYCNPlkG1n94zrU6LhBKXQBPw3gE3cr # ETz7Pc3Q5+GXW1X3KgNt1c1i2s6cHvzqcH3mfUtozlopYdOgXCWzpSdoo1j99S1r # yl9kx2soDNqseEHeku8Pxeyr3y1vGlRRbDOzjVlg59/oFyKjeUFiz/x785LaruA8 # Tw9azG7fH7wir7c4EJo0pwv//h1epPPuFjgrP6x2lEGdZB36gP0A4f74OtTDXrtp # TXKZ5fEyLVH6Ya1N6iaObfypSJg+8kYNabG3bvQF20EFxhjAUOT4rf6sY2FHkbxG # tUZTbMX04YYnk4Q5bHXgHQx6WYsuy/RkLEJH9FRYhTflx2mn0iWLlr/GreC9sTf3 # H99Ce6rrHOnrPVrd+NKQ1UmaOh2DGld/HAHCzhx9zPuWFcUCAwEAAaOCAYIwggF+ # MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBQlLmg8 # a5orJBSpH6LfJjrPFKbx4DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAW # BgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAEQzBBMDUGDCsGAQQBsjEBAgED # CDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3RpZ28uY29tL0NQUzAIBgZngQwB # BAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0 # aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsGAQUFBwEBBGgwZjA/BggrBgEF # BQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1w # aW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAN # BgkqhkiG9w0BAQwFAAOCAgEAc9rtaHLLwrlAoTG7tAOjLRR7JOe0WxV9qOn9rdGS # DXw9NqBp2fOaMNqsadZ0VyQ/fg882fXDeSVsJuiNaJPO8XeJOX+oBAXaNMMU6p8I # VKv/xH6WbCvTlOu0bOBFTSyy9zs7WrXB+9eJdW2YcnL29wco89Oy0OsZvhUseO/N # RaAA5PgEdrtXxZC+d1SQdJ4LT03EqhOPl68BNSvLmxF46fL5iQQ8TuOCEmLrtEQM # dUHCDzS4iJ3IIvETatsYL254rcQFtOiECJMH+X2D/miYNOR35bHOjJRs2wNtKAVH # fpsu8GT726QDMRB8Gvs8GYDRC3C5VV9HvjlkzrfaI1Qy40ayMtjSKYbJFV2Ala8C # +7TRLp04fDXgDxztG0dInCJqVYLZ8roIZQPl8SnzSIoJAUymefKithqZlOuXKOG+ # fRuhfO1WgKb0IjOQ5IRT/Cr6wKeXqOq1jXrO5OBLoTOrC3ag1WkWt45mv1/6H8So # f6ehSBSRDYL8vU2Z7cnmbDb+d0OZuGktfGEv7aOwSf5bvmkkkf+T/FdpkkvZBT9t # hnLTotDAZNI6QsEaA/vQ7ZohuD+vprJRVNVMxcofEo1XxjntXP/snyZ2rWRmZ+iq # MODSrbd9sWpBJ24DiqN04IoJgm6/4/a3vJ4LKRhogaGcP24WWUsUCQma5q6/YBXd # hvUxggWCMIIFfgIBATCBkDB8MQswCQYDVQQGEwJVUzELMAkGA1UECBMCTUkxEjAQ # BgNVBAcTCUFubiBBcmJvcjESMBAGA1UEChMJSW50ZXJuZXQyMREwDwYDVQQLEwhJ # bkNvbW1vbjElMCMGA1UEAxMcSW5Db21tb24gUlNBIENvZGUgU2lnbmluZyBDQQIQ # RbkDLNyjy9TlrnXGABPhkzAJBgUrDgMCGgUAoHgwGAYKKwYBBAGCNwIBDDEKMAig # AoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgEL # MQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUk8Q3CjPJ3U2tOdLrOhF7 # CQHIfgswDQYJKoZIhvcNAQEBBQAEggEAMK8ErootJA5cSQxklnpjc+FJ8XSx6YNH # lZoPrKz6A4W+EfHIE1az2nDe6L6QSQUvmG8zoQJoXMjiQMKBNfdFx5AcP1Bg4mnn # 4dkrT2J9EAlD5FZvtAQfE01Fv0AnTQJWu5tJ2rnJPhyBSEK/EK0y5sXyNFosiu7U # q3wX8Ybz8puBydjto15/Cyux2wqNMT2okA5Ty16JTicEYmm6iWnY8YUeQP7RHFsL # lFFR37xJbBSsUVhDGX1ACr3NqJMxaI7Sr5bW6S8syMiR/bNDWc9Nuk5/9F4IE79G # 3ZpitQkcTyA9oeDEc+XQhzi296mhu8AFsjjjv6JNhG8BLyuY7rFSNaGCA0wwggNI # BgkqhkiG9w0BCQYxggM5MIIDNQIBATCBkjB9MQswCQYDVQQGEwJHQjEbMBkGA1UE # CBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQK # Ew9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3Rh # bXBpbmcgQ0ECEQCQOX+a0ko6E/K9kV8IOKlDMA0GCWCGSAFlAwQCAgUAoHkwGAYJ # KoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjIwNjA4MTQ1 # NDM4WjA/BgkqhkiG9w0BCQQxMgQwY9tX9JcbKShOfXc/yBk80zgJc4kLtbXl9ueo # WZCpMyRVAVbW98Hg5ZvzdhcH3d97MA0GCSqGSIb3DQEBAQUABIICAGKmxLwNDVoQ # FDWFjeNNMjs1YTZKk4LpUR5/Utp1TdIrVfbsFTlhb0y0mZLEKr4lydjuFRkJ2oM9 # DnfCHShorv6XJV9V25ZW5qoKDowvkzpY0dKHD13+GL2/QiCFkyrGQO1r63dzDKXz # WMlrdOJF8Koyx8iqZyO87XiwU6hwJmJLhT7crRbeqF34Rd4xSOFm+aFeqI/pqRRo # RT3PMF1ZR0xqOpkshsWaeiqB9K+Fkstx7VcPhi1Lnc3ZRtPaNwC/ywClU8aaYSmU # 1wIBvMWCVFB8aomnGshI/B9O+YplYaYg02qXX9F1vVdEx1iAU4Om5b1TmdSx78la # HYooCEIcBKNh8Xm6GzK8CCVh9+X7hVGpPVxwXiXr/WxgWkFwShYbNiKIYPPcOaZx # /Y5/y1uVbJ/U9/QjVWwtJUcT7tYBvWMxLomGBLqrou5m8f3t014yF9FTzpxU/QzA # g4K4tqDZPmwZqRL0Ywgxsw2SU7VyyZ6ClfVKP40L+BQ5VVps4huGX+xjHRkb1Rrs # asqJCnLG5hBLp5GwVMjynYH9k3QYexmBNygItLe9braBODRfmTwmxOVdDoOHNglc # bbBZT55xzBi1CkLQh40iVEgIcrcYWML7xbihZuX2CXEPfMKv78b9A3kUByyjdbym # JqtrRAKfTLN8qNjdpJVqy7RPELGowIIV # SIG # End signature block |