Obs/bin/ObsDep/content/Powershell/Roles/Common/WindowsDefender.psm1

Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" -DisableNameChecking
Import-Module -Name "$PSScriptRoot\..\VirtualMachine\VirtualMachine.psm1" -DisableNameChecking

function Apply-DefenderUpdate
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration
    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration

    $clusterNames = @($ClusterName)
    if ([System.string]::IsNullOrEmpty($ClusterName))
    {
        $clusterNames = Get-ClusterNames $Parameters
    }

    Trace-Execution "Apply Windows Defender Update on $($clusterNames -join ', ')"

    $domainAdminCredential = Get-TemporaryDomainCredential -Parameters $Parameters
    Trace-Execution "Domain Admin Account: $($domainAdminCredential.UserName)"

    foreach ($clusterName in $clusterNames)
    {
        # {Infrastructure_2}\CloudMedia\Security\Defender
        $defenderUpdatePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.DefenderFolder.Path $clusterName
        Trace-Execution "Defender update path: $defenderUpdatePath"
        Set-DefenderPlatformFile -Parameters $Parameters -UpdatePath $defenderUpdatePath
        Set-DefenderSignatureFile -Parameters $Parameters -UpdatePath $defenderUpdatePath

        try
        {
            $localUpdatePath = Get-LocalCsvPathFromSharePath -Parameters $Parameters -UNCSharePath $defenderUpdatePath -ClusterName $ClusterName
            Trace-Execution "CSV local path for Defender update folder: $localUpdatePath"
        }
        catch
        {
            Trace-Warning "Failed to convert UNC path $defenderUpdatePath into CSV local path: $_"
            $localUpdatePath = $null
        }

        $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id
        $vmNodes = $virtualMachinesRole.Nodes.Node | Where-Object { $_.RefClusterId -eq $clusterId } | where { $_.Role -ne "InfraRing" } | Select-Object -ExpandProperty Name
        if ($null -ne $vmNodes -and $vmNodes.Count -gt 0)
        {
            Update-DefenderPlatform -NodeSet $vmNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath
            Update-DefenderSignature -NodeSet $vmNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath
        }

        $hostNodes = Get-ClusterNodes -Parameters $Parameters -ClusterName $clusterName
        if ($null -ne $hostNodes -and $hostNodes.Count -gt 0)
        {
            Update-DefenderPlatform -NodeSet $hostNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath -CsvLocalPath $localUpdatePath
            Update-DefenderSignature -NodeSet $hostNodes -Credential $domainAdminCredential -UpdatePath $defenderUpdatePath -CsvLocalPath $localUpdatePath
        }
    }
}


<#
 .Synopsis
  Find out nodes in the stamp that need to receive that CAMP platform update
#>

function Get-DefenderPlatformUpdateNodes
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [string[]]
        $NodeSet,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory = $true)]
        [string]
        $PlatformFilePath
    )

    $platformUpdateVersion = Get-Item $PlatformFilePath | Select-Object -ExpandProperty "VersionInfo" | Select-Object -ExpandProperty "ProductVersion"
    Trace-Execution "Latest version of Windows Defender Platform found is filePath = $PlatformFilePath ; platformUpdateVersion = $platformUpdateVersion"

    # Bug 9350406: to avoid the issue caused by PowerShell broken session
    Trace-Execution "Querying version of Windows Defender Platform"
    $outdatedNodes = @()
    foreach ($node in $NodeSet)
    {
        try
        {
            $currentVersion = Invoke-Command -ComputerName $node -Credential $Credential -ScriptBlock {
                # Attempt to start Windows Defender if not already running
                $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue
                if ($null -ne $service -and $service.Status -ine "Running")
                {
                    $service | Start-Service -ErrorAction SilentlyContinue | Out-Null
                }

                try
                {
                    Get-MpComputerStatus | Select-Object -ExpandProperty "AMProductVersion"
                }
                catch
                {
                    Write-Warning -Message "Could not retrieve 'AMProductVersion' for Windows Defender, non-terminating error is: $_"
                    # Fall back to the default version
                    "0.00.0000.00000"
                }
            }
        }
        catch
        {
            Trace-Warning "Failed to query version of Windows Defender Platform on $node : $_"
        }

        if ([System.Version]$currentVersion -lt [System.Version]$platformUpdateVersion)
        {
            $outdatedNodes += $node
            Trace-Execution "Found outdated CAMP of version '$currentVersion' on $node"
        }
    }

    Trace-Execution "Done querying version of Windows Defender Platform"
    $outdatedNodes
}

<#
 .Description
  Expand UpdatePlatform.exe from the security nuget
  And copy it to \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Security\Defender
#>

function Set-DefenderPlatformFile
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $UpdatePath
    )

    Import-Module -Name "$PSScriptRoot\..\..\Common\Helpers.psm1" -DisableNameChecking

    $clusterName = Get-ManagementClusterName $Parameters
    $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration

    # If UpdatePlatform.exe from the nuget is older than the one in \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Security\Defender
    # Do not use the one from the nuget to make sure that the Defender platform does not fall back to an older version
    $platformFilePath = Join-Path $UpdatePath "UpdatePlatform.exe"
    $platformBackupFilePath = Join-Path $UpdatePath "UpdatePlatform.exe.bk"
    if (Test-Path $platformFilePath)
    {
        if (Test-Path $platformBackupFilePath)
        {
            Remove-Item $platformBackupFilePath -Force
        }

        Rename-Item -Path $platformFilePath -NewName "UpdatePlatform.exe.bk"
    }

    $nugetStorePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.LibraryShareNugetStoreFolder.Path $clusterName
    $nugetName = "Microsoft.AzureStack.Solution.Deploy.Security"
    # Extract Common Antimalware Platform (aka. CAMP) update from "Microsoft.AzureStack.Solution.Deploy.Security.x.x.x.x.nupkg"
    # NOTE: Expand-NugetContent automatically creates a new folder if it doesn't exist
    Trace-Execution "Expand $nugetName and copy Windows Defender Platform update to $UpdatePath"
    Expand-NugetContent `
        -NugetName $nugetName `
        -NugetStorePath $nugetStorePath `
        -SourceIsFile `
        -SourcePath "content\Defender\UpdatePlatform.exe" `
        -DestinationPath $UpdatePath `
        -IsUnc | Out-Null

    if (-not (Test-Path $platformFilePath))
    {
        if (Test-Path $platformBackupFilePath)
        {
            Rename-Item -Path $platformBackupFilePath -NewName "UpdatePlatform.exe"
        }
        else
        {
            Trace-Error "Could not proceed further with Windows Defender Platform update since '$platformFilePath' doesn't exist"
        }
    }
    if (Test-Path $platformBackupFilePath)
    {
        $platformVersion = [System.Version](Get-Item -Path $platformFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion)
        $backupVersion = [System.Version](Get-Item -Path $platformBackupFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion)
        if ($platformVersion -gt $backupVersion)
        {
            Remove-Item -Path $platformBackupFilePath
        }
        else
        {
            Remove-Item -Path $platformFilePath
            Rename-Item -Path $platformBackupFilePath -NewName "UpdatePlatform.exe"
        }
    }

    $platformVersion = Get-Item -Path $platformFilePath | Select-Object -ExpandProperty VersionInfo | Select-Object -ExpandProperty ProductVersion
    Trace-Execution "Defender UpdatePlatform.exe version: $platformVersion"
}

function Update-DefenderPlatform
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [string[]]
        $NodeSet,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory = $true)]
        [string]
        $UpdatePath,

        [Parameter(Mandatory = $false)]
        [string]
        $CsvLocalPath
    )

    Trace-Execution "Starting to update Windows Defender platform on $($NodeSet -join ',')"

    $FilePath = Join-Path $UpdatePath "UpdatePlatform.exe"
    $targetNodes = Get-DefenderPlatformUpdateNodes -NodeSet $NodeSet -Credential $Credential -PlatformFilePath $FilePath
    if ($null -eq $targetNodes -or $targetNodes.Count -eq 0)
    {
        Trace-Execution "Looks like Windows Defender Platform on all the nodes is up to date, nothing to do"
        return
    }

    if (-not [System.string]::IsNullOrEmpty($CsvLocalPath))
    {
        $FilePath = Join-Path $CsvLocalPath "UpdatePlatform.exe"
    }

    Trace-Execution "UpdatePlatform file: $FilePath"

    try
    {
        Invoke-Command -AsJob -ComputerName $targetNodes -Credential $Credential -Authentication Credssp -ErrorAction SilentlyContinue -ScriptBlock {
            $versionBeforeUpdate = Get-MpComputerStatus -ErrorAction SilentlyContinue | Select-Object -ExpandProperty AMProductVersion
    
            $process = [System.Diagnostics.Process]::new()
            $process.StartInfo.FileName = $using:FilePath
            $timeout = New-TimeSpan -Minutes 10
            try
            {
                $process.Start() | Out-Null
                if (-not $process.WaitForExit($timeout.TotalMilliseconds))
                {
                    $status = "WARNING: MoCAMP update process didn't finish within the time allocated ({0} seconds).`r`n" -f $timeout.TotalSeconds
                }
            }
            finally
            {
                $process.Close()
                $process = $null
            }
    
            $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue
            if ($null -ne $service -and $service.Status -ine "Running")
            {
                $service | Start-Service -ErrorAction SilentlyContinue
            }
    
            try
            {
                $versionAfterUpdate = Get-MpComputerStatus | Select-Object -ExpandProperty AMProductVersion

                if ($versionBeforeUpdate -eq $versionAfterUpdate)
                {
                    # If Defender is not updated, collect logs for later analysis
                    & "C:\Program Files\Windows Defender\MpCmdRun.exe" -GetFiles | Out-Null
                    # Move the log file MpSupportFiles.cab to other path in case it's overwritten
                    Copy-Item -Path "C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab" -Destination "C:\ProgramData\Microsoft\Windows Defender"
                }
            }
            catch
            {
                Write-Warning "Failed to run Get-MpComputerStatus after Defender has been updated: $_"
                & "C:\Program Files\Windows Defender\MpCmdRun.exe" -GetFiles | Out-Null
                Copy-Item -Path "C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab" -Destination "C:\ProgramData\Microsoft\Windows Defender"
            }
    
            # Trace out update log file (btw, could be missing) for troubleshooting purposes (regardless of the exit code)
            $status += Get-Content -Raw "$env:windir\temp\mpsigstub.log" -ErrorAction SilentlyContinue
            if (-not $status)
            {
                $status = "Couldn't find '$env:windir\temp\mpsigstub.log', maybe '$using:FilePath' didn't get a chance to be executed."
            }
            return "[$env:ComputerName]: {0}" -f $status
        } | Wait-Job -Timeout 1800 | Receive-Job | Write-Verbose -Verbose
    }
    catch
    {
        Trace-Warning "Failed to update Windows Defender Platform: $_"
    }

    Trace-Execution "Done updating Windows Defender platform"
}

<#
 .Description
  Put Defender signature update files in \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64
#>

function Set-DefenderSignatureFile
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $UpdatePath
    )

    Import-Module -Name "$PSScriptRoot\RoleHelpers.psm1" -DisableNameChecking

    $clusterName = Get-ManagementClusterName $Parameters

    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration
    $windowsDefenderRole = $Parameters.Roles["WindowsDefender"].PublicConfiguration

    # Path of Defender signature files for Deployment, e.g. C:\CloudDeployment\Updates\DefenderUpdates\x64
    $signatureFilePath = $global:ExecutionContext.InvokeCommand.ExpandString($physicalMachinesRole.PublicInfo.DefenderUpdates.Path)

    if($signatureFilePath -like "*{*}*")
    {
        # Resolved into \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Updates\DefenderUpdates\x64 but effectively no-op.
        # It is used to avoid errors from Test-Path when variable is not a valid path
        $signatureFilePath = Get-SharePath $Parameters $signatureFilePath $clusterName
    }

    if ($null -ne (Get-InProgressUpdateVersion -Parameters $Parameters))
    {
        # Path of Defender signature files for Update, e.g. \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\Current\D
        $sharePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.WindowsUpdateStagingFolder.Path $clusterName
        try
        {
            # If OEMUpdate is run after P&U, there will be a versioned path
            $versionedPath = Get-AzSVersionedPath -Path $sharePath -ErrorAction Stop
        }
        catch
        {
            # If OEMUpdate is run before P&U, there will not be a versioned path
            $versionedPath = $sharePath
        }
        if ([System.string]::IsNullOrEmpty($versionedPath))
        {
            $versionedPath = $sharePath
        }

        $defenderSourceFolderName = $windowsDefenderRole.PublicInfo.UpdatePackagePaths.DefenderFolder.Name
        $signatureFilePath = Join-Path -Path $versionedPath -ChildPath "$defenderSourceFolderName\x64"
    }

    # For Deployment, the Defender signature files are put in C:\CloudDeployment\Updates\DefenderUpdates\x64
    # and then copied to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64
    # For Update, the Defender signature files are put in \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\Current\D\x64
    # and then copied to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64
    # For other scenarios like FRU/AddScaleUnit/AddScaleUnitNodes/.., $signatureFilePath is INCORRECT as \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\Updates\DefenderUpdates\x64\
    # However, since we have the lastest Defender signature files in \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64, we can skip the copy here
    if (Test-Path $signatureFilePath)
    {
        # Copy Defender signature files to \\su1fileserver\su1_infrastructure_2\CloudMedia\Security\Defender\x64
        $UpdateCopyPath = Join-Path -Path $UpdatePath -ChildPath "x64"
        Trace-Execution "Copy files from $signatureFilePath to $UpdateCopyPath"
        & robocopy.exe $signatureFilePath $UpdateCopyPath mpam-fe.exe mpam-d.exe nis_full.exe /R:5 /W:10 /V /FP /BYTES 2>&1
    }
}

function Update-DefenderSignature
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [string[]]
        $NodeSet,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory = $true)]
        [string]
        $UpdatePath,

        [Parameter(Mandatory = $false)]
        [string]
        $CsvLocalPath
    )
    
    Trace-Execution "Starting to update Windows Defender signature on $($NodeSet -join ',')"

    if (-not [System.string]::IsNullOrEmpty($CsvLocalPath))
    {
        $UpdatePath = $CsvLocalPath
    }

    Trace-Execution "Use update path $UpdatePath"

    try
    {
        # NOTE: Since "$env:ProgramFiles\Windows Defender\MpCmdRun.exe" reaches out for a resource on the local network,
        # hence the use of Authentication="Credssp" to delegate user's credentials to the target server for remote authentication.
        Invoke-Command -AsJob -ComputerName $NodeSet -Credential $Credential -Authentication Credssp -ErrorAction SilentlyContinue -ScriptBlock {
            # Give update process enough attempts to recover from errors (if any)
            $attempts = 5
            $sleepSeconds = 10
            # Summary of all attempts for troubleshooting purposes
            $summary = ""
            while ($attempts -gt 0)
            {
                # Send error output to stdout to get support for detailed tracing
                $status = & "$env:ProgramFiles\Windows Defender\MpCmdRun.exe" -SignatureUpdate -UNC -Path "$using:UpdatePath" 2>&1 | Out-string
                # Append current results to the summary
                $summary += $status + "`n"

                if ($status -notmatch "ERROR") { break }

                $attempts--
                Start-Sleep -Second $sleepSeconds
                $sleepSeconds += 15
            }

            # Send back resulting message, eq:
            # - [n25r0402-DC01]: Signature update started ...
            # Signature update finished.
            # or
            # - [n25r0402-DC01]: Signature update started ...
            # ERROR: Signature Update failed with hr=80070002
            # CmdTool: Failed with hr = 0x80070002. Check C:\Users\<...>\AppData\Local\Temp\1\MpCmdRun.log for more information
            return "[$env:ComputerName]: {0}" -f $summary
        } | Wait-Job -Timeout 1800 | Receive-Job | Write-Verbose -Verbose
    }
    catch
    {
        Trace-Warning "Failed to update Windows Defender signature: $_"
    }

    Trace-Execution "Done updating Windows Defender signature"
}

<#
 .Synopsis
  Gets Windows Defender update signatures share path which is configured in Defender for auto-update of signatures
#>

function Get-DefenderUpdateSignaturesPath
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = 'Stop'

    $windefendRole = $Parameters.Roles["WindowsDefender"].PublicConfiguration

    $clusterName = Get-ManagementClusterName $Parameters

    $defenderSignatures = $windefendRole.PublicInfo.UpdatePackagePaths.UpdateDefenderSignatureFilesFolder
    # \\SU1FileServer\SU1_Public\DefenderUpdates
    $defenderUpdatesPath = Get-SharePath $Parameters $defenderSignatures.Path $clusterName

    return $defenderUpdatesPath
}

function Test-DefenderEngineVersion
{
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [string[]]
        $NodeSet,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential
    )

    Trace-Execution "Validate Defender Engine version on hosts $($NodeSet -join ',')"

    $errorNodes = @()
    foreach ($node in $NodeSet)
    {
        $engineVersion = Invoke-Command $node -Credential $Credential { Get-MpComputerStatus | Select-Object -ExpandProperty AMEngineVersion }
        if ([System.Version]$engineVersion -lt [System.Version]"1.1.17300.4")
        {
            Trace-Execution "[$node]: Defender engine version is $engineVersion"
            $errorNodes += $node
        }
    }

    if ($errorNodes.Count -gt 0)
    {
        Trace-Error "RTP cannot be enabled on $($errorNodes -join ',') because Defender Engine is not updated to 1.1.17300.4"
    }
}


Export-ModuleMember -Function Get-DefenderUpdateSignaturesPath
Export-ModuleMember -Function Apply-DefenderUpdate
Export-ModuleMember -Function Update-DefenderSignature
Export-ModuleMember -Function Update-DefenderPlatform

Export-ModuleMember -Function Set-DefenderSignatureFile
Export-ModuleMember -Function Test-DefenderEngineVersion
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCaCbvvjaGFnFvy
# 0NE90GQdU8504QGfYoreztk6CE22QqCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL/5KpRwQqyaCj8zZiyplrHm
# LqsZ5ArpC/62+NN8LhOXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAihumItIa+NYfaeB4EWT4BlzY/bq/8cYCiuL7TyBOLQtA6Vn7BomlXZuh
# J0gcAKDpsyUpSYdOCoDPavwdYEnNOYN/YTcZ7BSaSSr+RMZyXtt7REG4uNMoDPyH
# 7eLgOM0KSIyFUdPgYHTHR6n3jo1q9c8bhrpDQz+fr8hZsAQlaPd1ha1djM7dvqLo
# lvzzg3CYMYuU0lvb1joEtMcnY5AZMCZKw7IQ47Li4iEX0zkevKPJzz3GhetEAGpx
# k57zxFLHDDvJrHGPNm759kPjkEJbL2ADEvjhOTPi2rZi4ToIX+Xsa2cSFCb+tFm3
# ggH0h9f5edRkUiC1NljEpVFY4zCZb6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCHbQ5TSboU2TDgIgw11weijSLM8XqQgKpt+cUU9FxNkQIGZMvRGra7
# GBMyMDIzMDgwNzIxMzM1MS4xNzRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAc1VByrnysGZHQABAAABzTANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MDVaFw0yNDAyMDExOTEyMDVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDTOCLVS2jmEWOqxzygW7s6YLmm29pjvA+Ch6VL7HlT
# L8yUt3Z0KIzTa2O/Hvr/aJza1qEVklq7NPiOrpBAIz657LVxwEc4BxJiv6B68a8D
# QiF6WAFFNaK3WHi7TfxRnqLohgNz7vZPylZQX795r8MQvX56uwjj/R4hXnR7Na4L
# lu4mWsml/wp6VJqCuxZnu9jX4qaUxngcrfFT7+zvlXClwLah2n0eGKna1dOjOgyK
# 00jYq5vtzr5NZ+qVxqaw9DmEsj9vfqYkfQZry2JO5wmgXX79Ox7PLMUfqT4+8w5J
# kdSMoX32b1D6cDKWRUv5qjiYh4o/a9ehE/KAkUWlSPbbDR/aGnPJLAGPy2qA97YC
# BeeIJjRKURgdPlhE5O46kOju8nYJnIvxbuC2Qp2jxwc6rD9M6Pvc8sZIcQ10YKZV
# YKs94YPSlkhwXwttbRY+jZnQiDm2ZFjH8SPe1I6ERcfeYX1zCYjEzdwWcm+fFZml
# JA9HQW7ZJAmOECONtfK28EREEE5yzq+T3QMVPhiEfEhgcYsh0DeoWiYGsDiKEuS+
# FElMMyT456+U2ZRa2hbRQ97QcbvaAd6OVQLp3TQqNEu0es5Zq0wg2CADf+QKQR/Y
# 6+fGgk9qJNJW3Mu771KthuPlNfKss0B1zh0xa1yN4qC3zoE9Uq6T8r7G3/OtSFms
# 4wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFKGT+aY2aZrBAJVIZh5kicokfNWaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSqG3ppKIU+i/EMwwtotoxnKfw0SX/3T16
# EPbjwsAImWOZ5nLAbatopl8zFY841gb5eiL1j81h4DiEiXt+BJgHIA2LIhKhSscd
# 79oMbr631DiEqf9X5LZR3V3KIYstU3K7f5Dk7tbobuHu+6fYM/gOx44sgRU7YQ+Y
# TYHvv8k4mMnuiahJRlU/F2vavcHU5uhXi078K4nSRAPnWyX7gVi6iVMBBUF4823o
# PFznEcHup7VNGRtGe1xvnlMd1CuyxctM8d/oqyTsxwlJAM5F/lDxnEWoSzAkad1n
# WvkaAeMV7+39IpXhuf9G3xbffKiyBnj3cQeiA4SxSwCdnx00RBlXS6r9tGDa/o9R
# S01FOABzKkP5CBDpm4wpKdIU74KtBH2sE5QYYn7liYWZr2f/U+ghTmdOEOPkXEcX
# 81H4dRJU28Tj/gUZdwL81xah8Kn+cB7vM/Hs3/J8tF13ZPP+8NtX3vu4NrchHDJY
# gjOi+1JuSf+4jpF/pEEPXp9AusizmSmkBK4iVT7NwVtRnS1ts8qAGHGPg2HPa4b2
# u9meueUoqNVtMhbumI1y+d9ZkThNXBXz2aItT2C99DM3T3qYqAUmvKUryVSpMLVp
# se4je5WN6VVlCDFKWFRH202YxEVWsZ5baN9CaqCbCS0Ea7s9OFLaEM5fNn9m5s69
# lD/ekcW2qTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBo
# qfem2KKzuRZjISYifGolVOdyBKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6HuVhjAiGA8yMDIzMDgwNzE2MDgz
# OFoYDzIwMjMwODA4MTYwODM4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDoe5WG
# AgEAMAcCAQACAgRMMAcCAQACAhNxMAoCBQDofOcGAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAJQRZ1vcOW4+o2v4V6s7L/TfM6gQ9JOZkm00XQQsIAhCuDGH
# gPsSr41+iec9jWaz0GM2ukEtL5+ZtnRZKXpMxColbihewDpcOFqhSyyDg7z6Bx4M
# RutqmVFt6/9OSTCT7d13+9D70/YQ5ATx415W7SWCZvJo6nfJhghFFfWBo+y4aIs4
# tqUQAdxBbNHfqOtwuS2Inr8DrMIpsx7jG72uAeNDp6DDW8mRY8F554cZqGuhPHa/
# S3lJQ/iivO5p8EEnaprru8/NPf9031NY3iym6aLL9tmw1nzSUE4XKBpnrl++7hyx
# ivU5QFUMyBzia7xfpGKVqyshDIeW/sdvix1zT8QxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc1VByrnysGZHQABAAABzTAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBThqtoXYaGgUDlzyKyrGEVdrWZeDnP0v6JTP5pRt108TCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOJmpfitVr1PZGgvTEdTpStUc6GN
# h7LNroQBKwpURpkKMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHNVQcq58rBmR0AAQAAAc0wIgQgKR1sVYk7o1mj5uikzt6YACleXD0u
# LlGRwrUNjeP76S8wDQYJKoZIhvcNAQELBQAEggIAL3B+kfy3gEKStkrUwm8RW8VC
# jXZ8jhKV6UxT1+hkwgio4cibOAV3QLkMoqRfLWJXwT5dcdcn0b4x45p47z+OiGAD
# ldkIRqe9aU/4Sn0mbbIFBlyEYFWJeDrRSsNkYwmn4IDf6V3yrF9n5O8ZekGtgjuu
# JHdgcP6b7e81kGdNrxH26xHnT86VZHM1bX7OhrbhHiElbBH2ClJALKlnXPyoNMt0
# Zrxb+SuvDUs4mjsbWN7iU7/gCoOTl2mQBmIaL3N0BTdh5xt966xCsLTdOTBMZRy+
# JOHBNYaP0eVgzXqHBOKEKegWoqE3gp+4gB3k+5NU0zdmN4uBrcnsRGm0wmfKfcNr
# Gp/04bP9jFhannbtjqgc9GzxtY49cYp/3hVWaU4oA1kfMXn9iotI7f0QGYlFdbXA
# W3PlSfdoDatCorxFXU7UkzZv+N6cCHNpUETfa5zZJK3WbmWUhM/fNFwbsgJ6KDCe
# HwhzjE54YICKJCevTtyZHOC9zFM55B8hC8xW83kvRP/EeCcVX16tFxleh34AUbiw
# Z6z6z34XYf+ISpI/BKLKCLnCu3pFyA02y/qMfqQ3zkxzhK8ECfjyU5fvGqlIg8NM
# 6sGK8ssa+3ve6V1M3glYQMbl3RhoepB4Mg/ZD4B/+Ksvae+qOZT6qOuHXmgP1Zkz
# BJiSRe82OEuHUqOmr94=
# SIG # End signature block