Obs/bin/ObsDep/content/Powershell/Common/SecurityHelpers.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module $PSScriptRoot\Tracer.psm1 <# .Synopsis Returns deployment configuration setting: Cloud.PublicInfo.SecuritySetting.SecureBoot.EnforceOnAllInfraVms Default value is $false #> function Get-DisableSecureBootOnInfraVms { Param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $cloudRolePublicInfo = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo if($cloudRolePublicInfo.SecuritySetting) { if($cloudRolePublicInfo.SecuritySetting.SecureBoot) { $DisableSecureBootOnInfraVms = $cloudRolePublicInfo.SecuritySetting.SecureBoot.GetAttribute("DisableSecureBootOnInfraVms") return $DisableSecureBootOnInfraVms -eq "True" } } return $false } function Clear-SecurityItem { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $false)] [string] $ClusterName ) Import-Module $PSScriptRoot\..\Roles\Common\DscHelper.psm1 -DisableNameChecking $clusterNames = @($ClusterName) if ([System.string]::IsNullOrEmpty($ClusterName)) { $clusterNames = Get-ClusterNames $Parameters } Trace-Execution "Clearing security items on: $($clusterNames -join ', ')" $domainAdminUser = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.SecurityInfo.DomainUsers.User | Where-Object Role -EQ "DomainAdmin" $domainAdminCredential = $Parameters.GetCredential($domainAdminUser.Credential) $domainAdminName = $domainAdminCredential.GetNetworkCredential().UserName $domainAdminPassword = $domainAdminCredential.GetNetworkCredential().Password $domainFqdn = $Parameters.Roles["Domain"].PublicConfiguration.PublicInfo.DomainConfiguration.FQDN $domainCredential = New-Credential -UserName "$domainFqdn\$domainAdminName" -Password $domainAdminPassword $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $clusterRole = $Parameters.Roles["Cluster"].PublicConfiguration foreach ($clusterName in $clusterNames) { $physicalHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName foreach($physicalHost in $physicalHosts) { $session = New-PSSession "$physicalHost.$domainFqdn" -Credential $domainCredential Set-SecurityOnHost -Session $session -IsOneNode:$($physicalHosts.Count -eq 1) $session | Remove-PSSession -ErrorAction SilentlyContinue } $clusterId = ($clusterRole.Clusters.Node | ? Name -eq $clusterName).Id $guestVmNames = $Parameters.Roles["VirtualMachines"].PublicConfiguration.Nodes.Node | where { $_.ProvisioningStatus -eq "Complete" -and $_.RefClusterId -eq $clusterId } | Select-Object -ExpandProperty Name foreach($guestVmName in $guestVmNames) { $vmSession = New-PSSession "$guestVmName.$domainFqdn" -Credential $domainCredential Set-SecurityOnVm -Session $vmSession $vmSession | Remove-PSSession -ErrorAction SilentlyContinue } } $ercsVmNames = $Parameters.Roles["SeedRing"].PublicConfiguration.Nodes.Node | Foreach-Object Name $activeErcsVmNames = $virtualMachinesRole.Nodes.Node | where { $_.Name -in $ercsVmNames } ` | where { $_.ProvisioningStatus -eq 'Complete' } | Foreach-Object Name Revoke-CompleteBootDSCShareAccess -ComputerName $activeErcsVmNames -Parameters $Parameters } function Set-SecurityOnHost { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession] $Session, [Parameter(Mandatory = $true)] [switch] $isOneNode ) if ($Session) { $computerName = $Session.ComputerName Trace-Execution "Applying security actions on: $computerName" Trace-Execution "Deleting not needed files on: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\Unattend\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Trace-Execution "Removing unnecessary registry keys from: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoAdminLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name ForceAutoLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoLogonCount -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\unattend.xml" } -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther first location for $computerName" } $exists = Invoke-Command -Session $Session -ScriptBlock { Test-Path -Path "$env:windir\Panther\Unattend\unattend.xml" } -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther second location for $computerName" } # If this is a one node, do not disable administrator/rename on host. Host is the same as DVM if (-not $isOneNode) { Disable-LocalAdmins -Session $Session Set-BuildinUsers -Session $Session } } } function Set-SecurityOnVm { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [System.Management.Automation.Runspaces.PSSession] $Session ) if ($Session) { $computerName = $Session.ComputerName Trace-Execution "Applying security actions on: $computerName" Trace-Execution "Deleting not needed files on: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:SystemDrive\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-Item -Path "$env:windir\Panther\unattend.xml" -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Trace-Execution "Removing unnecessary registry keys from: $computerName" Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultUserName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultPassword -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Remove-ItemProperty -Name DefaultDomainName -path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoAdminLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name ForceAutoLogon -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Set-ItemProperty -Name AutoLogonCount -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon' -Value 0 -Force -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:SystemDrive\unattend.xml"} -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from system drive for $computerName" } $exists = Invoke-Command -Session $Session -ScriptBlock {Test-Path -Path "$env:windir\Panther\unattend.xml"} -ErrorAction SilentlyContinue if ($exists) { Trace-Warning "Unable to delete not needed file from panther location for $computerName" } Disable-LocalAdmins -Session $Session Set-BuildinUsers -Session $Session } } function Disable-LocalAdmins { [CmdletBinding()] param( [System.Management.Automation.Runspaces.PSSession] $Session ) Trace-Execution "Disabling local administrators on: $($Session.ComputerName)" $localAdmins = $null $localAdmins = Invoke-Command -Session $Session -ScriptBlock {(((Get-LocalGroupMember -SID "S-1-5-32-544") | ? {$_.PrincipalSource -eq "Local" -and $_.ObjectClass -eq "User"}).Name) | % {$_.split("\")[1]}} -ErrorAction SilentlyContinue if ($localAdmins) { Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue $adminsObjects = Invoke-Command -Session $Session -ScriptBlock {Get-LocalUser -Name $using:localAdmins -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue if ($true -in $adminsObjects.Enabled) { Trace-Warning "One or more local administrators are still enabled on: $($Session.ComputerName)" } else { Trace-Execution "Successfully force disabled local administrators on: $($Session.ComputerName)" } } } function Set-BuildinUsers { [CmdletBinding()] param( [System.Management.Automation.Runspaces.PSSession] $Session ) Trace-Execution "Disabling and renaming specific built-in users $($Session.ComputerName)" # Start with local built-in Administrator $builtinAdmin = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-500"} } if ($builtinAdmin) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinAdmin.SID -NewName LMASAdmin -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinAdmin.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } # built-in Guest $builtinGuest = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-501"} } if ($builtinGuest) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinGuest.SID -NewName LMASGuest -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinGuest.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } # built-in Guest $builtinDefaultAccount = Invoke-Command -Session $Session -ScriptBlock { Get-LocalUser |? {$_.SID -like "S-1-5-21-*-503"} } if ($builtinDefaultAccount) { Invoke-Command -Session $Session -ScriptBlock {Rename-LocalUser -SID $using:builtinDefaultAccount.SID -NewName LMASDefaultAccount -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue Invoke-Command -Session $Session -ScriptBlock {Disable-LocalUser -SID $using:builtinDefaultAccount.SID -ErrorAction SilentlyContinue} -ErrorAction SilentlyContinue } } function Set-AzsSecurityParam { [CmdletBinding()] param() $ErrorActionPreference = "Stop" Trace-Execution "Creating/Updating AzsSecurity parameters" try { $eceImported = $false try { Trace-Execution "Trying: Import-Module -Name ECEClient" Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking $eceImported = $true } catch { Trace-Execution "Failed Import-Module -Name ECEClient. Exception: $($_.Exception)" } if ($eceImported -eq $false) { try { Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1" Trace-Execution "Trying: Import-Module PSScriptRoot\..\ECEServiceClient\ECEClient.psm1" Import-Module $PSScriptRoot\..\ECEngine\EnterpriseCloudEngine.psd1 -Force -DisableNameChecking Import-Module $PSScriptRoot\..\ECEServiceClient\ECEClient.psm1 -Force -DisableNameChecking $eceImported = $true } catch { Trace-Execution "Failed Import-Module ECEngine\EnterpriseCloudEngine.psd1 and ECEServiceClient\ECEClient.psm1. Exception $($_.Exception)" } } if ($eceImported -eq $false) { throw "Failed to import modules for ECE. Unable to check and/or modify required AzsSecurity AzureStackHardened, SkipSEDProtection and AzureStackEnhancedEncryptionMethod parameters" } $updateECEXml = $false $azsSecCategory = $null $azsHardenedParam = $null $skipSEDProtectParam = $null $azsEnhancedEncryptionMethodParam = $null $eceClient = Create-ECEClientWithApplicationGateway $eceXml = [XML]($eceClient.GetCloudParameters().getAwaiter().GetResult().CloudDefinitionAsXmlString) Trace-Execution "Check if AzsSecurity node exists in ECE xml" $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']") if ($null -eq $azsSecCategory) { Trace-Execution "AzsSecurity node does not exist in ECE xml. Creating AzsSecurity node" $azsSecCategory = $ecexml.CreateElement("Category") $azsSecCategory.SetAttribute("Name", "AzsSecurity") $eceXml.SelectSingleNode("Parameters").AppendChild($azsSecCategory) | Out-Null $updateECEXml = $true } Trace-Execution "Check if AzureStackHardened parameter node exists in ECE xml" $azsHardenedParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackHardened']") if ($null -eq $azsHardenedParam) { Trace-Execution "AzureStackHardened parameter node does not exist in ECE xml. Creating AzureStackHardened parameter node" $azsHardenedParam = $eceXml.CreateElement("Parameter") $azsHardenedParam.SetAttribute("Name", "AzureStackHardened") $azsHardenedParam.SetAttribute("Type", "string") $azsHardenedParam.SetAttribute("Value", "Disabled") $azsHardenedParam.SetAttribute("AllowedValues", "") $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]") $azsSecCategory.AppendChild($azsHardenedParam) | Out-Null $updateECEXml = $true } Trace-Execution "Get AzureStackHardened parameter value from ECE xml" $azsHardenedParamValue = $azsHardenedParam.Value Trace-Execution "AzureStackHardened parameter value from ECE xml is: $azsHardenedParamValue" if ([string]::IsNullOrEmpty($azsHardenedParamValue)) { Trace-Execution "AzureStackHardened parameter value from ECE xml is null or empty. Setting value to Disabled" $azsHardenedParam.SetAttribute("Value", "Disabled") $azsHardenedParam.SetAttribute("AllowedValues", "") $azsHardenedParam.SetAttribute("Reference", "[{AzureStackHardened}]") $updateECEXml = $true } Trace-Execution "Check if SkipSEDProtection parameter node exists in ECE xml" $skipSEDProtectParam = $eceXml.SelectSingleNode("//Parameter[@Name='SkipSEDProtection']") if ($null -eq $skipSEDProtectParam) { Trace-Execution "SkipSEDProtection parameter node does not exist in ECE xml. Creating SkipSEDProtection parameter node" $skipSEDProtectParam = $eceXml.CreateElement("Parameter") $skipSEDProtectParam.SetAttribute("Name", "SkipSEDProtection") $skipSEDProtectParam.SetAttribute("Type", "string") $skipSEDProtectParam.SetAttribute("Value", "Disabled") $skipSEDProtectParam.SetAttribute("AllowedValues", "") $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]") $azsSecCategory.AppendChild($skipSEDProtectParam) | Out-Null $updateECEXml = $true } Trace-Execution "Get SkipSEDProtection parameter value from ECE xml" $skipSEDProtectParamValue = $skipSEDProtectParam.Value Trace-Execution "SkipSEDProtection parameter value from ECE xml is: $skipSEDProtectParamValue" if ([string]::IsNullOrEmpty($skipSEDProtectParamValue)) { Trace-Execution "SkipSEDProtection parameter value from ECE xml is null or empty. Setting value to Disabled" $skipSEDProtectParam.SetAttribute("Value", "Disabled") $skipSEDProtectParam.SetAttribute("AllowedValues", "") $skipSEDProtectParam.SetAttribute("Reference", "[{SkipSEDProtection}]") $updateECEXml = $true } Trace-Execution "Check if AzureStackEnhancedEncryptionMethod parameter node exists in ECE xml" $azsEnhancedEncryptionMethodParam = $eceXml.SelectSingleNode("//Parameter[@Name='AzureStackEnhancedEncryptionMethod']") if ($null -eq $azsEnhancedEncryptionMethodParam) { Trace-Execution "AzureStackEnhancedEncryptionMethod parameter node does not exist in ECE xml. Creating AzureStackEnhancedEncryptionMethod parameter node" $azsEnhancedEncryptionMethodParam = $eceXml.CreateElement("Parameter") $azsEnhancedEncryptionMethodParam.SetAttribute("Name", "AzureStackEnhancedEncryptionMethod") $azsEnhancedEncryptionMethodParam.SetAttribute("Type", "string") $azsEnhancedEncryptionMethodParam.SetAttribute("Value", "") $azsEnhancedEncryptionMethodParam.SetAttribute("AllowedValues", "") $azsEnhancedEncryptionMethodParam.SetAttribute("Reference", "[{AzureStackEnhancedEncryptionMethod}]") $azsSecCategory.AppendChild($azsEnhancedEncryptionMethodParam) | Out-Null $updateECEXml = $true } if ($updateECEXml) { Trace-Execution "Updating ECE xml with AzsSecurity parameters" $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription $eceCloudParametersDefinition.ConfigurationName = 'AzureStack' $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult() Trace-Execution "Created\updated AzsSecurity category with AzsSecurity parameters" } } catch { Trace-Execution "Failed to create/update AzsSecurity category with AzsSecurity parameters in ECE. Exception: $($_.Exception)" throw } } function Update-AzsSecurityParam { [CmdletBinding()] Param ( [Parameter(Mandatory = $true)] [string] $Name, [Parameter(Mandatory = $true)] [string] $Value, [Parameter(Mandatory = $true)] [string] $Reference ) $ErrorActionPreference = "Stop" Trace-Execution "Update security parameter $Name in ECE" Import-Module -Name ECEClient -Verbose:$false -DisableNameChecking $eceClient = Create-ECEClientWithServiceResolver $eceXml = [XML]$eceClient.GetCloudParameters().GetAwaiter().GetResult().CloudDefinitionAsXmlString $needUpdate = $true $azsSecCategory = $eceXml.SelectSingleNode("//Category[@Name='AzsSecurity']") $parameter = $eceXml.SelectSingleNode("//Parameter[@Name='$Name']") if ($null -eq $parameter) { Trace-Execution "$Name parameter node does not exist in ECE xml. Creating $Name parameter node" $parameter = $eceXml.CreateElement("Parameter") $parameter.SetAttribute("Name", $Name) $parameter.SetAttribute("Type", "string") $parameter.SetAttribute("Value", $Value) $parameter.SetAttribute("AllowedValues", "") $parameter.SetAttribute("Reference", "[{$Reference}]") $azsSecCategory.AppendChild($parameter) | Out-Null } else { if ($Value -eq $parameter.Value) { $needUpdate = $false Trace-Execution "No need to update Security parameter $Name updated in ECE" } else { $parameter.SetAttribute("Value", $Value) } } if ($needUpdate) { $eceCloudParametersDefinition = New-Object Microsoft.AzureStack.Solution.Deploy.EnterpriseCloudEngine.Controllers.Models.CloudDefinitionDescription $eceCloudParametersDefinition.ConfigurationName = 'AzureStack' $eceCloudParametersDefinition.CloudDefinitionAsXmlString = $eceXml.OuterXml $null = $eceClient.ImportCloudParameters($eceCloudParametersDefinition).GetAwaiter().GetResult() Trace-Execution "Security parameter $Name updated in ECE" } } Export-ModuleMember -Function Get-DisableSecureBootOnInfraVms Export-ModuleMember -Function Clear-SecurityItem Export-ModuleMember -Function Set-AzsSecurityParam Export-ModuleMember -Function Update-AzsSecurityParam # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDcERv5QPcvOjm # GArCioMHysRd5pn3CZ0GIikEYN9tO6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJlv # PwlkS6yH/w5X8KX+DTL9qcdKAAUUwlVl9ylUJEV9MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAf6TF6+Eb+KYAQHBJZldV0dmZ898B/4tQk/he # zIQGKeCjE+z+b6ap/lsgxCbX40ax8FWqSYzu5Kc1iQw7/oSyxHbAODv1kv1xpRcp # 6XzesNTlLEBq+iFbWJAJkUBHPvlNiR/5OmWsZQ4G5G8qFZ4eeZkj38v/pziiBqLd # zCYZ+ZKy2T/Xf3MLpEPZLwEgmEsny/Hg5wAyHtKmQ+7U+b5OeaniCZ9TrIRIZlFz # JBNi7ECF95OVE+m1HYJfPn7K9RxCfW9Lb+QTZI7bsbgrPvAHrcM1apj8B7RyqysF # KxpnwZaGkyGcykvvNQuNd7nJF6DpU35kg7Ef2rCf7JhvC8f0aKGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBD/ezDSRA5bbClUdqMCUn6IGFPrUCJ2ULF # ggHUKU5GiAIGZeeoE9ruGBMyMDI0MDMxMTE4MTgxOC4zMTFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZlmfjAi # GA8yMDI0MDMxMTExMTYxNFoYDzIwMjQwMzEyMTExNjE0WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpmWZ+AgEAMAoCAQACAg8eAgH/MAcCAQACAhL0MAoCBQDpmrf+ # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAAcbAXx8X0tBj9wnmikwjVT # d98uRHkrqMk8xsgKo9QRCrKyzXvEfty8jd+gKj/X5NZ47Kc4Vkb+9ZZMuijML3be # MeFmdrmJNBtQm2JnCmOHR0ZjGpTOVGpBz3+hs0Ukl4IpQNbgVN45u1J0ty5yekJp # ExdK/K99neHjcDh43kmR7W9ItwZWSySQU0MGHq5cV/rqPjscnausfTtKWzG3ZFep # aSHqS3kKSWXSvAW43kulKjyWgkzCUDTnrQMQrfksuBWe7FXcKgO04JACLyP595bO # xZumEHYkjkMco+uqXVzXKt+vwhlWRFvUuBN+/Ian3sLf3xs98sfFF+zG3tTGfBkx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AeqaJHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCB5dSb3QvNgRqJUfTW/1OKd # i9inEfjWY0MUuaJ6wR3/cTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmP # odXjZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg4iGe # ly1SmvrVSgxEk2f1t3oBbsL8vnFhQYpEzDqDlmUwDQYJKoZIhvcNAQELBQAEggIA # rDkWBej9u03dWCzCD0TpimjQkHVfYjub59LJh68UNAYDtgDis84KnzssKD2K743H # Lf6h2h6O425TJd1hzoCTUjbGjBXSRhP2/I10mggWvqHUVkZ1XvMVD0n9NLtbFqYq # CV6Ke3TONwy7vHHjhUL4JeVhusHbRxR6kZHRLYyfA9NKqIWwuNRZRp6IWYuDWadv # NYRqHz3einAObw92vEU0DwZZhQ/8g5Igt/vQw+yeKIVjquYEzMSL6ypK0y2BRqkj # /vHhwiYnvz9ocXqJvztmIxRdWrFbpvZPszgxKNq+WfoW5Q9iTbXS81TIVnBszTJw # 1OUss8ZNuB/HbXya+8mFEHnBq3YmeVf+z04F3Hzm4nmJwm5ipzT3eg7g4umqG4Yi # 2ELeAJ7ZM/k9dFg+I1S+tJk6fhcujyXROzkTSO/xuTZUUmCQOdGPaH8tKlHjTNZ5 # 9ReMDlDtosA7JQ7jn3Kj5mVNhqz4Lw6KkaNTob1cD3lEGUix5XdC36KOKRBIK0a8 # wLTvIAZFcAkxGh6+j90Sgadf6d8etItUWt4uUxCavLJEZCai6KaORLSNrkhmlNJ2 # vuqKFKR8vtkucwhSOUgzhgdrCwHfPV+RFxTjsO3Q/tgVInlqR0Cx1cXGhmlYW+zU # g7Zfo8zNvsiQPq3QhzSMnmhMjBpMzT2n6+WNHdd8cSU= # SIG # End signature block |