Obs/bin/ObsDep/content/Powershell/Roles/Common/Servicing/Scripts/Install-Update.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> # TODO: Use Common functions for session re-use # TODO: Clean up trace execution to full sentences. # FUTURE: Implement MSPs - postponed # FUTURE: Allow computer arrays rather than just one at a time # FUTURE: Use other mechanisms in Test-UpdateRebootRequested similar to MSFT_xPendingReboot from DSC $Script:UpdateRebootRequestedPath = Join-Path $env:SystemDrive UpdateRebootRequest.xml <# .Synopsis Updates a running computer. .Description Runs PowerShell scripts and KB .MSUs from the source path, without rebooting it. Requires CredSSP enabled from this computer to each of the targets. Does not reboot targets, caller can use Test-UpdateRebootRequired to determine status and reboot it if necessary. It is assumed that additional orchestration with existing roles is necessary, so it is not safe to do this "all in one" similar to Cluster Aware Updating. For scripts: Scripts will be invoked directly from the source location, allowing the script to know and reference additional materials relative to the script location. Default execution policy of the computer will be respected unless BypassExecutionPolicy is set. This allows the source directory to be remote to the computer, yet not require signing for test scenarios. .Link Test-UpdateRebootRequested #> function Install-Update { [CmdletBinding()] Param ( # Computer name to update [Parameter(Mandatory=$true)] [string] $ComputerName, # Explicit Credential for CredSSP [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential, # Source for updates [Parameter(Mandatory=$true)] [string] $SourcePath, # Optional Scratch directory for update installation [string] $ScratchDirectory = $null, # Bypass default execution policy [switch] $BypassExecutionPolicy ) $ErrorActionPreference = "Stop" Install-UpdateScript -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "Script") -BypassExecutionPolicy:$BypassExecutionPolicy Install-UpdateKB -ComputerName $ComputerName -Credential $Credential -SourcePath $SourcePath -ScratchDirectory $ScratchDirectory } <# .Synopsis Indicates whether a computer needs a reboot to complete updating .Description Timestamp in file indicates when reboot was last requested, Test-UpdateRebootRequested will compare this timestamp to the actual time of last reboot. This function does not check other side effect locations of other software install or update processes. Update scripts, in particular, may need a reboot without marking the other locations so this mechanism provides a definitive marking. Future implementations may check the other locations, such as those checked by the DSC resource MSFT_xPendingReboot. .Link Install-Update .Link Set-UpdateRebootRequested #> function Test-UpdateRebootRequested { [CmdletBinding()] Param ( [Parameter(Mandatory=$true)] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential ) $ErrorActionPreference = "Stop" $result = Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock { if (!(Test-Path $using:UpdateRebootRequestedPath)) { return $false } $request = [DateTime]::MaxValue try { # incoming time is in UTC ticks [DateTime] $request = Import-Clixml -Path $using:UpdateRebootRequestedPath } catch { Write-Warning "Invalid incoming UpdateRebootRequestedPath time, assuming reboot required" } $os = Get-CimInstance -Class Win32_OperatingSystem [DateTime] $lastBoot = $os.LastBootUpTime.ToUniversalTime() if ($lastBoot -lt $request) { return $true } else { Remove-Item -Path $using:UpdateRebootRequestedPath return $false } } return $result } <# .Synopsis Marks a computer to indicate a reboot is needed to complete updating .Description Timestamp in file indicates when reboot was last requested, Test-UpdateRebootRequested will compare this timestamp to the actual time of last reboot. Scripts can mark local machine request with the following snippet: $UpdateRebootRequestedPath = Join-Path $env:SystemDrive UpdateRebootRequest.xml [DateTime]::UtcNow.Ticks | Export-Clixml -Path $Script:UpdateRebootRequestedPath .Link Test-UpdateRebootRequested #> function Set-UpdateRebootRequested { [CmdletBinding(SupportsShouldProcess=$true)] Param ( [Parameter(Mandatory=$true)] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential ) $ErrorActionPreference = "Stop" Trace-Execution "Setting UpdateRebootRequest on $ComputerName" # Using UTC and Ticks to avoid format and timezone change issues if ($PSCmdlet.ShouldProcess($ComputerName)) { Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock { [DateTime]::UtcNow.Ticks | Export-Clixml -Path $using:UpdateRebootRequestedPath } } } <# .Synopsis Internal function to apply cabs for KBs to a computer .Link Install-Update #> function Install-UpdateKB { Param ( # Computer name to update [Parameter(Mandatory=$true)] [string] $ComputerName, # Explicit Credential for CredSSP [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential, # Source for updates. [Parameter(Mandatory=$true)] [string] $SourcePath, # Optional Scratch directory for update installation [string] $ScratchDirectory = $null, # Install KBs sequentially - test hook [switch] $Sequential ) Install-UpdateKBSubFolder -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "SSU") -ScratchDirectory $ScratchDirectory -Sequential:$Sequential Install-UpdateKBSubFolder -ComputerName $ComputerName -Credential $Credential -SourcePath (Join-Path $SourcePath "LCU") -ScratchDirectory $ScratchDirectory -Sequential:$Sequential } <# .Synopsis Internal function to apply cabs for KBs to a computer #> function Install-UpdateKBSubFolder { Param ( # Computer name to update [Parameter(Mandatory=$true)] [string] $ComputerName, # Explicit Credential for CredSSP [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential, # Source for updates. [Parameter(Mandatory=$true)] [string] $SourcePath, # Optional Scratch directory for update installation [string] $ScratchDirectory = $null, # Install KBs sequentially - test hook [switch] $Sequential ) $ErrorActionPreference = "Stop" $stopWatch = New-Object Diagnostics.Stopwatch $stopWatch.Start() Trace-Execution "$([DateTime]::Now): Starting Install-UpdateKB" Trace-Execution ($PSBoundParameters | Out-String) Trace-Execution "invoking to $computername" [ScriptBlock] $block = { Write-Verbose "At $env:COMPUTERNAME, using $using:SourcePath" if (!(Test-Path $using:SourcePath)) { Write-Warning "$using:SourcePath not reachable" return } if (!(Get-ChildItem -Path $using:SourcePath -Filter "*.cab")) { Write-Warning "There is no KB existing in $using:SourcePath" return } Write-Verbose "Tested sourcepath" $stopWatch = New-Object Diagnostics.Stopwatch $stopWatch.Start() Write-Verbose "$([DateTime]::Now): Starting Add-WindowsPackage" $PackageArgs = @{ Online = $true NoRestart = $true PackagePath = $using:SourcePath Verbose=$true } if ($using:ScratchDirectory) { Write-Verbose "Installing updates using ScratchDirectory '$($using:ScratchDirectory)'" New-Item -ItemType Directory -Path $using:ScratchDirectory -Force try { $result = Add-WindowsPackage @PackageArgs -ScratchDirectory $using:ScratchDirectory } finally { Remove-Item -Force -Recurse -Path $using:ScratchDirectory -ErrorAction Ignore } } else { $result = Add-WindowsPackage @PackageArgs } $stopWatch.Stop() Write-Verbose "$([DateTime]::Now), Elapsed: $($stopWatch.Elapsed), Restart Needed $($result.RestartNeeded)" return $result } $result = $null if (!$Sequential) { # ISSUE: This a long running job, potentially affected by network glitches # or service fabric failovers. # Consider potentially converting to a scheduled task type approach. # Even creating PS Jobs as in Common\Helpers\Invoke-JobCommon wouldn't # necessarily re-connect if the PS session goes away. Need to verify # underlying DISM behavior when this disconnects abruptly. try { $result = Invoke-Command -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock $block if ($result.RestartNeeded) { Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential } } catch { # Due to throw, unable to determine if batch application required reboot. Assume yes. Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential if ($_.Exception -imatch "0x800f081e") { Trace-Warning "Skipping not applicable update $($package.PackageName) from $($cab.Name), HRESULT 0x$('{0:X8}' -f $_.Exception.HResult)" } else { throw $_.Exception } } } else # Sequential install of updates { # build install state list $targetPackages = Invoke-Command -Credential $Credential -ComputerName $ComputerName -ScriptBlock { Get-WindowsPackage -Online -Verbose } $installStates = @{} foreach ($package in $targetPackages) { $installStates[$package.PackageName] = $package } $originalSourcePath = $SourcePath $cabs = Get-ChildItemLocalOrUnc -Path $originalSourcePath -Include "*.cab" -ComputerName $ComputerName -Credential $Credential $rebootRequested = $false $thrownException = @() try { foreach ($cab in $cabs) { $package = Invoke-Command -Credential $Credential -ComputerName $ComputerName -Authentication Credssp -ScriptBlock { return Get-WindowsPackage -Online -PackagePath $using:cab } $remotePackage = $installStates[$package.PackageName] Trace-Execution "$cab, Target package state: $($remotePackage.PackageState), $($package.PackageName)" if ((!$remotePackage) -or ($remotePackage.PackageState -ne "Installed")) { $SourcePath = $cab.FullName try { $result = Invoke-Command -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock $block if ($result.RestartNeeded) { $rebootRequested = $true } } catch { if ($_.Exception -imatch "0x800f081e") { Trace-Warning "Skipping not applicable update $($package.PackageName) from $($cab.Name), HRESULT 0x$('{0:X8}' -f $_.Exception.HResult)" } else { # Something unexpected happened. Continue applying other updates, # but assume reboot is probably required. $rebootRequested = $true $thrownException += $_ } } } else { Trace-Execution "Skipping $cab, $($package.InstallTime), $($package.PackageName)" } } } finally { if ($rebootRequested) { Set-UpdateRebootRequested -ComputerName $ComputerName -Credential $Credential } } if ($thrownException) { Trace-Warning "Re-throwing aggregated exceptions from sequential update installs" throw $thrownException } } $stopWatch.Stop() Trace-Execution "$([DateTime]::Now): Ending Install-UpdateKB, Elapsed: $($stopWatch.Elapsed), $ComputerName" return $result } <# .Synopsis Internal function to apply update scripts to computer. .Link Install-Update #> function Install-UpdateScript { Param ( # Computer name to update [Parameter(Mandatory=$true)] [string] $ComputerName, # Explicit Credential for CredSSP [Parameter(Mandatory=$true)] [PSCredential] [System.Management.Automation.Credential()] $Credential, # Source for updates [Parameter(Mandatory=$true)] [string] $SourcePath, # Allow unsigned PowerShell scripts [switch] $BypassExecutionPolicy ) $ErrorActionPreference = "Stop" $scripts = Get-ChildItemLocalOrUnc -Path $SourcePath -Include "*.ps1" -ComputerName $ComputerName -Credential $Credential foreach ($script in $scripts) { # Execute scripts on computers, respecting the signing requirements for remote scripts unless a bypass is set. Trace-Execution "Invoking $script at $ComputerName, BypassExecutionPolicy: $BypassExecutionPolicy" Invoke-Command -Verbose -Credential $Credential -Authentication Credssp -ComputerName $ComputerName -ScriptBlock { if ($using:BypassExecutionPolicy) { Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass } & $using:script } | Out-Null } } <# .Synopsis Internal function to validate KBs were installed successfully to a computer. #> function Test-UpdateKB { Param ( # Computer name to validate [Parameter(Mandatory=$true)] [string] $ComputerName, # Explicit Credential for CredSSP [Parameter(Mandatory=$true)] [PSCredential] $Credential, # Source for updates. [Parameter(Mandatory=$true)] [string] $SourcePath ) $ErrorActionPreference = "Stop" Trace-Execution "$([DateTime]::Now): Starting Test-UpdateKB" Trace-Execution "Testing state of Windows Update installation on $ComputerName." $cabs = @() $cabPaths = @((Join-Path $SourcePath "SSU"), (Join-Path $SourcePath "LCU")) $cabs = Get-ChildItemLocalOrUnc -Path $cabPaths -Include "*.cab" -ComputerName $ComputerName -Credential $Credential $notInstalledKBs = @() foreach ($cab in $cabs) { try { $package = Invoke-Command -Credential $Credential -ComputerName $ComputerName -Authentication Credssp -ScriptBlock { return Get-WindowsPackage -Online -PackagePath $using:cab } if ($package -and ($package.PackageState -ieq "Installed" -or $package.PackageState -ieq "Superseded")) { Trace-Execution "$cab was installed successfully on $ComputerName." } else { Trace-Warning "$cab was not installed on $ComputerName." $notInstalledKBs += $cab } } catch { Trace-Warning "$cab was not installed on $ComputerName." $notInstalledKBs += $cab } } if ($notInstalledKBs.Count -ge 1) { Trace-Error "The following KBs were not installed on $ComputerName : $notInstalledKBs." } Trace-Execution "$([DateTime]::Now): Test-UpdateKB completed successfully on $ComputerName." } <# .Synopsis Pre-processes a directory containing to extract the underlying cabs. .Description This is typically a pre-packaging step not performed on a running stamp. Caller is assumed to have access to Source and Destination, without requiring credentials. #> function Copy-ContentToStagingFolder { [CmdletBinding()] Param ( # Folder containing raw MSUs downloaded from Microsoft Catalog [Parameter(Mandatory=$true)] [string] $Source, # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage [Parameter(Mandatory=$true)] [string] $Destination, # Source is a WSUS Export [switch] $WSUSExport = $false, # Delete all existing content in the staging folder [switch] $PurgeExisting ) $ErrorActionPreference = "Stop" # Imports Import-Module (Join-Path $PSScriptRoot "Modules\Get-FreeDriveLetter.psm1") $stopWatch = New-Object Diagnostics.Stopwatch $stopWatch.Start() Trace-Execution "$([DateTime]::Now): Starting Copy-ContentToStagingFolder from $Source to $Destination, Purge: $PurgeExisting" # Find all MSUs, expand, copy the .CAB to a single folder if (!(Test-Path $Source)) { Trace-Error "$Source not accessible as source for MSUs" } $DestinationDrive = $null $SourceDrive = $null # MSU folder and file names can be very long and will exceed .NET limits in # a reasonably named share. Persistent PS drives will act as shortened # path names. # PSDrives, even though declared persistent, will only remain # mapped for the duration of their scope. No finally clean-up needed. $SourceDrive = New-PSDrive -Scope Local -Persist -Name (Get-FreeDriveLetter) -Root $Source -Description "Source for MSUs" -PSProvider FileSystem $Source = "$SourceDrive`:" $DestinationDrive = New-PSDrive -Scope Local -Persist -Name (Get-FreeDriveLetter) -Root $Destination -Description "Destination for extracted cabinets" -PSProvider FileSystem $Destination = "$DestinationDrive`:" if ($PurgeExisting) { Remove-Item (Join-Path $Destination *) -Include "*.cab" } if ($WSUSExport) { Copy-WSUSContentToStagingFolder -Source $Source -Destination $Destination } else { Copy-MSUContentToStagingFolder -Source $Source -Destination $Destination } $stopWatch.Stop() Trace-Execution "Ending Copy-ContentCabsToStagingFolder $([DateTime]::Now), Elapsed: $($stopWatch.Elapsed)" } function Copy-FileViaRoboCopy { [Diagnostics.CodeAnalysis.SuppressMessage("PSAvoidGlobalVars", "global:LASTEXITCODE", Scope="Function")] Param ( [Parameter(Mandatory=$true)] [string] $Source, [Parameter(Mandatory=$true)] [string] $Destination, [Parameter(Mandatory=$true)] [string] $Name ) # Robocopy can handle the long file names robocopy /R:5 /W:5 /NP /NJH /NJS /NDL /NFL $cab.DirectoryName $Destination $cab.Name $result = $LASTEXITCODE switch ($result) { 0 { # No file copied, okay in a merging (non-Purge) scenario if ($PurgeExisting) { Trace-Error "No file copied, but -Purge was specified" $global:LASTEXITCODE = 1 } } 1 { # Expected result $global:LASTEXITCODE = 0 } default { Trace-Error "RoboCopy returned unexpected LastExitCode: $result" } } } function Copy-MSUContentToStagingFolder { Param ( # Folder containing raw Content [Parameter(Mandatory=$true)] [string] $Source, # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage [Parameter(Mandatory=$true)] [string] $Destination ) # Extracted files are assumed not to hit long file name issues $extractTemp = Join-Path $env:TEMP "UpdateContentExpansion" $packages = Get-ChildItem -Recurse -Path $Source -Include "*.msu" foreach ($msu in $Packages) { if (Test-Path $extractTemp) { Remove-Item $extractTemp -Recurse -Force } New-Item -ItemType Directory $extractTemp | Out-Null try { #Expand.exe can handle the long file names. # Note that a non-compressed file will "expand" with no error - it's just a straight file copy. expand.exe -F:* $msu $extractTemp | Out-Null $result = $LastExitCode if (0 -ne $result) { Trace-Error "Expand.exe returned unexpected non-zero result: $result" } $cab = Get-ChildItem "$extractTemp\*" -Include "*.cab" -Exclude "WSUSSCAN.cab" if ($cab -and $cab.Count -eq 1) { Trace-Execution "Writing $($cab.Name) from $msu" Copy-FileViaRoboCopy $cab.DirectoryName $Destination $cab.Name } else { Trace-Error "Unexpected cabinet state found in $msu" } } finally { Remove-Item $extractTemp -Recurse -Force } } } function Copy-WSUSContentToStagingFolder { Param ( # Folder containing raw Content [Parameter(Mandatory=$true)] [string] $Source, # Output directory for flat folder of .CAB files suitable for DISM Add-WindowsPackage [Parameter(Mandatory=$true)] [string] $Destination ) # Extracted files are assumed not to hit long file name issues $extractTemp = Join-Path $env:TEMP "UpdateContentExpansion" $packages = Get-ChildItem -Recurse -Path $Source -Include "*.cab" if ($PurgeExisting) { Remove-Item (Join-Path $Destination *) -Include "*.cab" } foreach ($cab in $packages) { if (Test-Path $extractTemp) { Remove-Item $extractTemp -Recurse -Force } New-Item -ItemType Directory $extractTemp | Out-Null try { $keyFile = "update.cat" # Expand.exe can handle the long file names. # Note that a non-compressed file will "expand" with no error - it's just a straight file copy. expand.exe -F:$keyFile $cab $extractTemp | Out-Null $result = $LastExitCode if (0 -ne $result) { Trace-Error "Expand.exe returned unexpected non-zero result: $result" } $manifest = Get-ChildItem "$extractTemp\*" -Include $keyFile if ($manifest) { Trace-Execution "Staging $($cab.Name) from $Source" Copy-FileViaRoboCopy $cab.DirectoryName $Destination $cab.Name } else { Trace-Execution "Skipping non MSU package $($cab.Name)" } } finally { Remove-Item $extractTemp -Recurse -Force } } } # Test if the specified path is a UNC path. function Test-IsUncPath { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $Path ) Trace-Execution "Testing if $Path is a UNC path." if ($Path.Contains(":")) { return $false } else { return $true } } # If the path is a UNC path we can directly find the files from this path. However if this is a local CSV path # used for host update, we have to do the file search in a remote session to the node being updated. function Get-ChildItemLocalOrUnc { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] $Path, [Parameter(Mandatory=$true)] $Include, [Parameter(Mandatory=$true)] $ComputerName, [Parameter(Mandatory=$true)] $Credential ) if (Test-IsUncPath -Path $Path) { return Get-ChildItem -Path (Join-Path $Path *) -Include $Include } else { return (Invoke-Command -Credential $Credential -ComputerName $ComputerName -ScriptBlock { if (-not (Test-Path $using:Path)) { return $null } else { Get-ChildItem -Path (Join-Path $using:Path *) -Include $using:Include } }) } } # Public Export-ModuleMember -Function Set-UpdateRebootRequested Export-ModuleMember -Function Test-UpdateRebootRequested Export-ModuleMember -Function Install-Update Export-ModuleMember -Function Copy-ContentToStagingFolder # Internal Export-ModuleMember -Function Install-UpdateScript Export-ModuleMember -Function Install-UpdateKB Export-ModuleMember -Function Install-UpdateCIPolicy Export-ModuleMember -Function Test-UpdateKB Export-ModuleMember -Function Test-IsUncPath Export-ModuleMember -Function Get-ChildItemLocalOrUnc # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQWPm5eXrjpV6a # gTr+wnhmXDhod7yhkgVFRcICxlMuGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHpSCoUokvw7evTjCvUhHcpg # IAuouFozI5lRHzOUQOivMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEABW+acw7qy5z6LXiBzMDvp2AgHYgaHI5dZfQjZxKJ3KLxapr9O9d0VSmn # uj0EBNqdvm7dN58HYnezMNQ6XR1Y746j5+nYNPWhZ2Htn5FuCghRjitlS8azWwyx # 6jJ1DUoBZHHdb/cKtAmOdf7DYHberzRf7luJyW+jBI32nB72498HmC53WQyr+N+t # Q0gPO/wAZW3CbCqxrQTxXbhSh9Cl9Evjrsj2fs0UuLnmm5CHolFAkRdvYd6pLKaD # qfdqaNg0xd5q0C+z1cCL+tpy0dhNW14TiE/kUJBOmXadTv5XPDKxar89vCxEY3Ie # YJZ2j1GkMTF70kVr7V5OGvkHsRWBE6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD1ouSanN1geIyFNMo7JTVRsdoSKgrDkSB9LSqjUXHEOgIGZr4da0Ie # GBMyMDI0MDgyMjE5MDQyNy4wMDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6nHVvTAiGA8yMDI0MDgyMjE1MjAy # OVoYDzIwMjQwODIzMTUyMDI5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqcdW9 # AgEAMAcCAQACAhwJMAcCAQACAhNeMAoCBQDqcyc9AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBALnyxIfzrIwh6vi/1aH/gWah2Qg6yycxahIUkhw2cEfEixxJ # GcoqapYbR2P1gwcoFUWHdMFtjXcU9KA1tb7rBCQoRo6+3g7pZPa5D9xb1YDdKntw # Yal6YzW3NTjPIckIWPuspbuICDaKS/k426/EWJbkm2c38IDiwRIwCg5daFFHJJVa # xoxlGKpY1dc622oX4mOOGKhM8hGItT+TIbpr7TE7NqJv7oVgczLloQxtRXqGoj1E # Mfw3fCnqT383Ajy3fT8bg0Mikp5uxTL24TO+qeWfv3ztjY2v4hpDohDeaAePwUgj # aKBr70sCtCOuFO6k9e6pr8veKIWHC88n1Jd6MjoxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAPl0C1bA5EZEChV1W4atFKM7utNwI2t4XmZ2DnSnuXizCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS # DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgqzMln4Pin5rgYyBBBmiC4Vw2vo+5 # ZwNwNXyzDftUHuYwDQYJKoZIhvcNAQELBQAEggIASvoVVNOia+K05chV02n59nYW # aLhml8RH+oJl537/KpYumNqj+pFGClghv4NYk4sWBAwVhHr+DFgANBwfpHGH94DC # TfvlKyai8s8rUFXzd9sIhQrxgWxexcJiocyQd4fwRbtGNmiyENRns8cAWcj8SMdt # YOy136pDymIGKQQsp3MAR1Oi4wGWdIH5Z+oEnY8bh7Ki7UIvRhhW/vd5bm0Y7QEa # aj8MHLgH7r+Q+frjK4RGoJlvpbMO/oWRPKV94HLGF9vvJ1dW+pVmAUZWu2VxS2/F # 1vKiWpRS8EpMLC1KFkxKFMc6uw+N16h2BGGcyebGeoj92/Lkcg1qXMmbBpr+7eRs # xsN52Nq1EbxUSA8afEzn61iaxofSW+j1ToPGyOrsY0jTztu+Fsq2dxvyT3jAGOf1 # YdNpN/kbQXBCeJUI8jridGIdx+rZPYgQECiBC4vEXABdXZfydy8idRNx1hz6nHyq # ABBkRPbPFjxt2TXNI+DAqLzazBHOiGxk2DDY8nl6DzfRNCZ+j2AvHe1CfgxbY/9P # zie9zlNyoXTYMSffcNhvEkeLHN9e/x2bUh1z0FU0apqQGYRA1uTinJ6ntNQaD1yS # jyUTtFk7bIUPkhp2ZHlDm3chVqigHAVZgwNhg9ueklOgQV/7jxyQptSM9SoCX/+m # MI1LticveCpEWPaXL/8= # SIG # End signature block |