HardenSysvol.psm1
<#
.SYNOPSIS Sysvol Security Audit Module .DESCRIPTION This module is designed to scan the Sysvol folder for files containing sensitive information, such as passwords, usernames, certificates, and configuration data. It identifies potential security risks by detecting files that may expose sensitive content, such as documents, scripts, and configuration files. The tool also analyzes file integrity and flags files that require additional scrutiny, helping administrators to harden their Sysvol directory and Ensure a secure Active Directory environment. .VERSION 1.6 .Contribution Credit : HardenAD Community HardenAD Credit : It-connect Community It-Connect .AUTHOR DAKHAMA Mehdi .PARAMETER dnsDomain Specifies the DNS domain to be scanned. Defaults to the current user's DNS domain if not provided. .PARAMETER ignoreExtensions Specifies file extensions to ignore during the scan. .EXAMPLE # Scan the Sysvol folder of the current domain Invoke-HardenSysvol # Scan the Sysvol folder of a specific domain, ignoring .txt and .log files Invoke-HardenSysvol -dnsDomain "example.com" -ignoreExtensions "txt", "log" -Addpattern admin -AddExtensions adml,admx,adm .NOTES This script not requires administrative privileges to access and scan the Sysvol directory. .LINK https://github.com/dakhama-mehdi/Harden-Sysvol #> function Invoke-HardenSysvol { [CmdletBinding()] Param( [Parameter(Mandatory = $false)] [String]$dnsDomain = $env:USERDNSDOMAIN, [Parameter(Mandatory = $false)] [String[]]$ignoreExtensions, [Parameter(Mandatory = $false)] [String[]]$AddExtensions, [Parameter(Mandatory = $false)] [String[]]$Addpattern, [Parameter(Mandatory = $false)] [String[]]$removepattern, #Scann all extensions [Parameter(ValueFromPipeline = $true, HelpMessage = "Scann all extension")] [switch]$Allextensions, #Location the report will be saved [Parameter(ValueFromPipeline = $true, HelpMessage = "Enter desired directory path to save; Default: %temp%")] [String]$SavePath = $env:TEMP, #Location Custom pattern file [Parameter(ValueFromPipeline = $true, HelpMessage = "Enter Custome XML file path; Default: %module%\patterns.xml")] [String] [ValidateScript({ if ($_ -match '\.xml$') { return $true } else { throw "The file must have a .xml extension." } })]$Custompatterns ) #region script #region code #region load prerequist # Test access to the share $testpath = Test-Path "\\$dnsDomain\sysvol\" if ($testpath -eq $false) { throw "Cannot access domain or share, pls check with GCI $dnsDomain" } # Test Modules $modulesToCheck = @("PSWriteOffice", "PSWritePDF", "PSWriteHTML") foreach ($module in $modulesToCheck) { try { # Check if module installed if (!(Get-Module -ListAvailable -Name $module)) { Write-Output "Installation du module : $module." install-Module -Name $module -Force -Scope CurrentUser -ErrorAction Stop Write-Output "The module $module has been successfully installed" } else { Write-Output "Module $module is installed" } } catch { Write-Error "Erreur lors d'installation du module $module : $_" throw "Script stopped due to an error during module installation $module." } } #check about work if installed or not function Is-WordInstalled { try { $wordApp = New-Object -ComObject Word.Application # If the COM object is created successfully, Word is installed [System.Runtime.Interopservices.Marshal]::ReleaseComObject($wordApp) | Out-Null return $true } catch { return $false } } $wordinstalled = Is-WordInstalled # Removing ghost runspaces $PreviousRS = get-runspace | where-object {($_.id -ne 1)} if ($PreviousRS) { $PreviousRS.dispose() } $Results = $null # Script start: obtain the current date and time $startDate = Get-Date #region getxmlcontenant # Retrieve file extensions from the XML file $xmlFileExtensions = Join-Path -Path $PSScriptRoot -ChildPath "file_extensions.xml" $extensionsXML = [xml](Get-Content $xmlFileExtensions -Encoding UTF8) if (!$Allextensions) { $fileExtensions = $extensionsXML.root.FileExtensions.Extension } else { $fileExtensions = "*.*" } if ($AddExtensions) { $fileExtensions = [System.Collections.ArrayList]@($fileExtensions) $AddExtensions | ForEach-Object { $fileExtensions.Add("*." + $_) } } # Retrieve password patterns from the XML file if ($Custompatterns) { try { $CustomextensionsXML = [xml](Get-Content $Custompatterns -Encoding UTF8) $passwordPatterns = $CustomextensionsXML.root.PasswordPatterns.Pattern } catch { Write-Error "Error while reading the custom patterns file: $_" throw "The custom patterns file could not be found or is invalid." } } else { $passwordPatterns = $extensionsXML.root.PasswordPatterns.Pattern } if ($passwordPatterns.Count -eq 0) { throw "The custom patterns file could not be found or is invalid." } if ($Addpattern) { $passwordPatterns = [System.Collections.ArrayList]@($passwordPatterns) $Addpattern | ForEach-Object { $passwordPatterns.Add($_) } } if ($removepattern) { $passwordPatterns = [System.Collections.ArrayList]@($passwordPatterns) $removepattern | ForEach-Object { $patternToRemove = $_ $patternsToRemove = $passwordPatterns | Where-Object { $_ -like "*$patternToRemove*" } foreach ($pattern in $patternsToRemove) { $passwordPatterns.Remove($pattern) } } } if ($ignoreExtensions) { $ignoreExtensions = $ignoreExtensions | ForEach-Object { "*." + $_ } } #get binary sign from json and load module path $module = Join-Path -Path $PSScriptRoot -ChildPath "FileHandlers.psm1" $jsonfile = Join-Path -Path $PSScriptRoot -ChildPath "extensions.json" try { $jsonContent = Get-Content -Path $jsonfile -Raw | ConvertFrom-Json } catch { throw "Script stopped due to an error during json file $_ " } # Initialize a list to store the results $Results = @() #endregion getxmlcontenant #Initialize the variables $notAccessibleFiles = $fichiertraite = $Results = $null $pool = $runspaces = $null # Pool definition (creation of slots) $pool = [RunspaceFactory]::CreateRunspacePool(1,10) $pool.ApartmentState = "MTA" $pool.Open() $runspaces = @() #endregion load prerequist # Region Scriptfunction $scriptblock = { Param ( [string]$sysfiles, [string[]]$passwordPatterns, [string]$wordinstalled, [string]$module, [object]$jsonContent ) # Import modul FileHandlers.psm1 Import-Module $module -Verbose [String]$detectedType = Get-FileType -filePath $sysfiles -jsonContent $jsonContent # Function to search pattern by extensions switch ($detectedType) { 'docx' { $results = Get-DocxContent -filePath $sysfiles -patterns $passwordPatterns } 'xlsx' { $results = Get-XlsxContent -filepath $sysfiles -patterns $passwordPatterns } 'pptx' { $results = Get-PPTContent -filepath $sysfiles -patterns $passwordPatterns -wordinstalled $wordinstalled } 'doc' { $results = Get-DocContent -filepath $sysfiles -patterns $passwordPatterns -wordinstalled $wordinstalled } 'xls' { $results = Get-XlsContent -filepath $sysfiles -patterns $passwordPatterns -wordinstalled $wordinstalled } {$_ -in "odp","ods","odt"} { $results = Get-OdsContent -filepath $sysfiles -patterns $passwordPatterns # Même traitement que ods } 'pdf' { $results = Get-PdfContent -filepath $sysfiles -patterns $passwordPatterns } 'xml' { $results = Get-XmlContent -filepath $sysfiles -patterns $passwordPatterns } {$_ -in "exe","dll","msi"} { $results = Get-ExecutablesContent -filepath $sysfiles } {$_ -in "pfx","cer","der"} { $results = Get-CertifsContent -filepath $sysfiles } {$_ -in "p7b","p7c"} { $results = Get-P7bCertContent -filepath $sysfiles } {$_ -in "jpg","jpeg","bmp","webp","png","ico","gif","bmp","tif"} { $results = Get-HiddenFilesInImage -filepath $sysfiles } 'requires_check' { $results = Get-RequiredCheckContent -filepath $sysfiles } 'others' { $results = Get-OthersContent -filepath $sysfiles -patterns $passwordPatterns } } # Execute the appropriate command based on the detected file type return $results } if (Is-WordInstalled) { # Terminate the running Word and Excel processes to prevent double opening Get-process *winword* -erroraction SilentlyContinue | Stop-Process Get-Process excel -erroraction SilentlyContinue | Stop-Process } $fichiertraite = 0 # Define the array to store inaccessible files $notAccessibleFiles = @() # Create Jobs Get-ChildItem -Path \\$dnsDomain\sysvol -Recurse -File -Include $fileExtensions -Exclude $ignoreExtensions -Force -ErrorAction SilentlyContinue -ErrorVariable notacess | ForEach-Object { if ($notacess) { Write-Output $notacess -ForegroundColor Red $errorDetails = [PSCustomObject]@{ FilePath = $_.FullName Error = $notacess } $notAccessibleFiles += $errorDetails $notacess = $null } else { $fichiertraite++ $sysfiles = $_.FullName #clear Write-Host scans : $sysfiles -ForegroundColor Cyan $keepscrenn += "scans :" + $sysfiles $runspace = [PowerShell]::Create() $null = $runspace.AddScript($scriptblock) $null = $runspace.AddArgument($sysfiles) $null = $runspace.AddArgument($passwordPatterns) $null = $runspace.AddArgument($wordinstalled) $null = $runspace.AddArgument($module) $null = $runspace.AddArgument($jsonContent) $runspace.RunspacePool = $pool $runspaces += [PSCustomObject]@{ Pipe = $runspace; Status = $runspace.BeginInvoke() } } } Write-Host "scan finished prepare analyse ..." -ForegroundColor Green # Display the slots and current statistic while ($runspaces.Status -ne $null) { Start-Sleep 2 Clear-Host $slt_tot = Get-Runspace | Where-Object { $_.Id -ne 1 -and $_.RunspaceIsRemote -eq $false } $slt_encours = Get-Runspace | Where-Object { $_.Id -ne 1 -and $_.RunspaceAvailability -like "InUse" } Write-Host "All Objects = " $runspaces.Count Write-Host "Total Slots = " $slt_tot.Count Write-Host "Used SLots= " $slt_encours.Count Write-Host "Remaining objects =" ($runspaces | Where-Object { $_.Status.IsCompleted -eq $false }).Count $completed = $runspaces | Where-Object { $_.Status.IsCompleted -eq $true } foreach ($runspace in $completed) { $Results += $runspace.Pipe.EndInvoke($runspace.Status) $runspace.Status = $null } } #endregion code #region summary Write-Host "Scan completed, calculating statistics" -ForegroundColor Green # Sort results in unique mode $Results = $Results | Select-Object -Unique FilePath, pattern, Reason $sortedGroups = $Results.filepath | Group-Object | Sort-Object -Property Count -Descending # Select the first 5 Path $top5path = $sortedGroups | Select-Object Count,Name -First 5 # Remove commun domain path $commonPath = "\\$dnsDomain\sysvol\$dnsDomain" $top5path = $top5path | ForEach-Object { $_.Name = $_.Name -replace [regex]::Escape($commonPath), '' -replace ("\\"), '\\' $_ } # Top 5 words $top5Words= $Results.pattern | Group-Object | Sort-Object -Property Count -Descending | Select-Object Count,name -First 5 $Allwords = $Results.pattern | Group-Object | Sort-Object -Property Count -Descending | Select-Object Count,name #Number found objects $Objectfound = 0 $Objectfound = $sortedGroups.Count # Group file paths by file extension $groupedFiles = $sortedGroups.name | Group-Object -Property { ($_ -split "\.")[-1] } | select Count,name # End of the script: obtain the current date and time $endDate = Get-Date # Calculate the time difference $elapsedTime = New-TimeSpan -Start $startDate -End $endDate $elapsedTime = $($elapsedTime.ToString("hh\:mm\:ss")) #region Calcul potentiel risk # Assume that $top5Groups, $Allwords, and $Objectfound are already defined" $totalRisk = 0 # Assess the risk based on the number of files containing passwords if ($Objectfound -gt 10) { $totalRisk += 10 } else { $totalRisk += ($Objectfound/10) * 10 } # Iterate through the keywords in $Allwords and adjust the risk score foreach ($word in $Allwords) { switch -Regex ($word.Name) { "Password|Pass|\bpass\b|\bpwd\b" { $totalRisk += 5 * $word.Count break } "cpassword" { $totalRisk += 10 * $word.Count break } "net use|net user|NotSigned|\bidentifiant\b" { $totalRisk += 5 * $word.Count break } "AutoLogon|sha1|md5" { $totalRisk += 10 * $word.Count break } "credentials|\bsecret\b" { $totalRisk += 5 * $word.Count break } } } # Limiter le score de risque à 100% if ($totalRisk -gt 100) { $totalRisk = 100 } #endregion Calcul potentiel risk #endregion Summary # Close all Slots and pool $pool.Close() $pool.Dispose() #endregion Script #region HTML $logo = "https://github.com/dakhama-mehdi/Harden-Sysvol/blob/main/Pictures/HardenSysvol.png?raw=true" $rightlogo = "https://github.com/dakhama-mehdi/Harden-Sysvol/blob/main/Pictures/Rightlogo.png?raw=true" # Generation du rapport HTML Write-Host "Generate HTML" -ForegroundColor Green [String]$SavePath = $SavePath + '\hardensysvol.html' New-HTML -TitleText 'HardenSysvol' -FilePath $SavePath -ShowHTML:$true { New-HTMLHeader { New-HTMLSection -Invisible { New-HTMLPanel -Invisible { New-HTMLText -Text "Domain : $($dnsDomain)" -Alignment left -FontSize 30 -FontWeight 100 -Color Blue New-HTMLText -Text "Report date: $startDate" -Alignment left -FontSize 15 New-HTMLText -Text "Elapsed : $elapsedTime" -Alignment left -FontSize 15 } -AlignContentText left New-HTMLPanel -Invisible -AlignContentText right { New-HTMLImage -Source $logo -Class 'otehr' -Width 30% -Height 20% } } } New-HTMLTab -Name 'Tab 1 : Dashboard' -IconRegular chart-bar { New-HTMLTabStyle -BackgroundColorActive Teal New-HTMLSection -Width "80%" -Invisible { New-HTMLSection -Width "40%" -Invisible { New-HTMLGage -Label 'Indicator Risk' -MinValue 0 -MaxValue 100 -Value $totalRisk -ValueColor Black -LabelColor Black -Pointer -StrokeColor Akaroa -SectorColors AirForceBlue } New-HTMLSection -Width "60%" -name 'Total processed' -HeaderBackGroundColor Teal { New-HTMLChart -Gradient -TitleAlignment center -Height 200 { New-ChartTheme -Palette palette4 New-ChartPie -Name 'Total objects' -Value $runspaces.count New-ChartPie -Name 'Found objects' -Value $Objectfound } } New-HTMLSection -Width "60%" -name 'Extensions by type' -HeaderBackGroundColor Teal { if ($groupedFiles) { New-HTMLChart -Gradient -TitleAlignment center -Height 200 { New-ChartTheme -Mode light foreach ($grpfiles in $groupedFiles) { New-ChartPie -Name $grpfiles.name -Value $grpfiles.count } } } } } New-HTMLSection -name 'Resume' -HeaderBackGroundColor Teal { New-HTMLPanel { if ($top5path) { New-HTMLChart -Title 'Top 5 Files' -TitleAlignment center -Height "140%" { $legendNames = @() $chartValues = @() foreach ($word in $top5path) { $legendNames += $word.name $chartValues += $word.count } New-ChartToolbar -Download pan New-ChartLegend -Name $legendNames -HideLegend New-ChartBarOptions -Type barStacked New-ChartBar -Name 'Path' -Value $chartValues } } else { New-HTMLText -FontSize 20px -Text "<br><br>Top files<br>No data" -Alignment center -Color Grey } } New-HTMLPanel { if ($top5Words) { New-HTMLChart -Title 'Top 5 Reason' -TitleAlignment Center -Height 100% { $legendNames = @() $chartValues = @() foreach ($word in $top5Words) { $legendNames += $word.name $chartValues += $word.count } New-ChartToolbar -Download -Pan New-ChartBarOptions -Gradient New-ChartLegend -Name $legendNames -HideLegend New-ChartBar -Name 'Pattern' -Value $chartValues } } else { New-HTMLText -FontSize 20px -Text "<br><br>Top reason<br>No data" -Alignment center -Color Grey } } New-HTMLPanel -Width "70%" { New-HTMLList { New-HTMLListItem -Text 'Harden-Sysvol _ Version : 1.6 _ Release : 10/2024' New-HTMLListItem -Text 'Author : Dakhama Mehdi<br> <br> Credit : HardenAD Community [HardenAD](https://www.hardenad.net/) <br> Credit : It-connect Community [It-Connect](https://www.it-connect.fr/) <br> Thanks : Przemyslaw Klys [Evotec](https://evotec.xyz) for Module PSWriteHTML/PswriteOffice' } -FontSize 14 } } New-HTMLSection -Width "60%" -HeaderBackGroundColor Teal -name 'Tips & Best pratices' { New-HTMLPanel -Width "60%" { New-HTMLImage -Source $rightlogo } New-HTMLPanel { New-HTMLTabPanel -Orientation vertical -Theme 'pills' { New-HTMLTab -Name 'Why check Sysvol' -IconBrands 500px { New-HTMLText -FontSize 18px -Text "The Sysvol folder is crucial for distributing scripts and Group Policy Objects (GPOs) to all domain computers. It may contain sensitive information, such as plain-text passwords, making it a prime target for attackers. <br>A vulnerability in Sysvol can compromise the entire domain. Therefore, it is essential to restrict permissions, monitor changes, and regularly audit its contents to ensure network security and compliance." } New-HTMLTab -Name 'Audit GPO' -IconBrands 500px { New-HTMLText -FontSize 18px -Text "Regularly audit GPOs to verify their contents, such as plain-text passwords in configuration files or auto-logon scripts, and the presence of unsigned sources. <br>Frequently run the GPOZaurr tool, which provides a comprehensive report to help identify and mitigate these risks. <br>[GPOZaurr](https://github.com/EvotecIT/GPOZaurr/)<br>" } New-HTMLTab -Name 'Best Pratic' -IconBrands 500px { New-HTMLText -FontSize 18px -Text "Enable audits on the Sysvol folder and monitor logs for multiple search attempts, as this may indicate enumeration attempts. Some elements in the Sysvol folder are not meant to be accessed by everyone. If possible, place a honeypot script in the Netlogon folder to trigger alerts for suspicious activity. <br>[Autologon](https://learn.microsoft.com/fr-fr/sysinternals/downloads/autologon/)<br>" } New-HTMLTab -Name 'Tips ' -IconBrands 500px { New-HTMLText -FontSize 18px -Text "Do not store large files, such as ISO or .zip files, in the Sysvol folder. This can lead to replication issues and unnecessary consumption of storage resources, impacting the performance and reliability of your network<br> Move your scripts to a shared folder and grant access only to the relevant groups, not authenticated users. This will reduce vulnerabilities, especially if the scripts contain credentials or deploy critical applications." } New-HTMLTab -Name 'Hardening AD' -IconBrands 500px { New-HTMLText -FontSize 18px -Text "Use AD hardening to ensure security and reduce risks. <br>Disable old protocols like SMB1 and anonymous enumeration on DC shares. <br>Implement an N-tier architecture model, a PAW, and Silos. To facilitate this, refer to the HardenAD project. <br>[HardenAD](https://github.com/LoicVeirman/HardenAD/)<br>" } } } } } New-HTMLTab -Name 'Tab 2 : Details' -IconSolid user-alt { New-HTMLSection -Invisible { New-HTMLTableOption -DataStore JavaScript New-htmlTable -HideFooter -DataTable $Results -TextWhenNoData 'Information: No sentivity data found' } New-HTMLSection -HeaderBackGroundColor CarrotOrange -HeaderText 'Errors log' { New-HTMLTableOption -DataStore JavaScript New-htmlTable -HideFooter -DataTable $notAccessibleFiles -TextWhenNoData 'No errors during scanning' } } } #endregion HTML } # SIG # Begin signature block # MIImYwYJKoZIhvcNAQcCoIImVDCCJlACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA06Yyx8nFr4tbA # F05If4BdDlJPQ1iqk94uKcI0ar8r66CCH/kwggWNMIIEdaADAgECAhAOmxiO+dAt # 5+/bUOIIQBhaMA0GCSqGSIb3DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNV # BAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0yMjA4MDEwMDAwMDBa # Fw0zMTExMDkyMzU5NTlaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2Vy # dCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lD # ZXJ0IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC # ggIBAL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3E # MB/zG6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKy # unWZanMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsF # xl7sWxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU1 # 5zHL2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJB # MtfbBHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObUR # WBf3JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6 # nj3cAORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxB # YKqxYxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5S # UUd0viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+x # q4aLT8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjggE6MIIB # NjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwP # TzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMC # AYYweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdp # Y2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNv # bS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDigNoY0 # aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENB # LmNybDARBgNVHSAECjAIMAYGBFUdIAAwDQYJKoZIhvcNAQEMBQADggEBAHCgv0Nc # Vec4X6CjdBs9thbX979XB72arKGHLOyFXqkauyL4hxppVCLtpIh3bb0aFPQTSnov # Lbc47/T/gLn4offyct4kvFIDyE7QKt76LVbP+fT3rDB6mouyXtTP0UNEm0Mh65Zy # oUi0mcudT6cGAxN3J0TU53/oWajwvy8LpunyNDzs9wPHh6jSTEAZNUZqaVSwuKFW # juyk1T3osdz9HNj0d1pcVIxv76FQPfx2CWiEn2/K2yCNNWAcAgPLILCsWKAOQGPF # mCLBsln1VWvPJ6tsds5vIy30fnFqI2si/xK4VC0nftg62fC2h5b9W9FcrBjDTZ9z # twGpn1eqXijiuZQwggY1MIIEHaADAgECAhB/Kidy8q3kVvTPaSZfaX+zMA0GCSqG # SIb3DQEBCwUAMFYxCzAJBgNVBAYTAlBMMSEwHwYDVQQKExhBc3NlY28gRGF0YSBT # eXN0ZW1zIFMuQS4xJDAiBgNVBAMTG0NlcnR1bSBDb2RlIFNpZ25pbmcgMjAyMSBD # QTAeFw0yMzExMDIwNjUzMjVaFw0yNDExMDEwNjUzMjRaMFsxCzAJBgNVBAYTAkZS # MQ8wDQYDVQQHDAZUb3Vsb24xCzAJBgNVBAsMAklUMRYwFAYDVQQKDA1NZWhkaSBE # YWtoYW1hMRYwFAYDVQQDDA1NZWhkaSBEYWtoYW1hMIIBojANBgkqhkiG9w0BAQEF # AAOCAY8AMIIBigKCAYEAujQ+veep1KIlqcEmDI6UEPFQ/BjmnsnNVZW5XNSLQLhU # OpsgbTkjGKW8Bso8gS3ul5qunY1ONd2h2sscJXuXmpUZDWSFI1emriL7yXPdQKX9 # dku2ucbVxmdnRHxtgPh0zqLZP//kgkDale3PjCI3kkBQWSJcVC66VdabhhHFafGa # JSRTd13AB0hoC107AMXLBAuw73znDd4dfZxJMW4FTQzQT/MYr332Rn4YtFGbxi0f # mNtm+uOR5YDGi//s51FnETxpeDV2NtyQsDPMn0OYjNxul931CVTLQJ87TlyMIxvt # jswJ+Y5B8E9RqAOSNpSXk1p33y7vJJSKuIgbn2Bce8bugy2Gi6soca1yge1O2PZW # lWEWz3dNCeWad7u040KTZ5WxHnE2UuBDYNPBhldcLZ21ZWdD8J5vY0iPVPjZfyw4 # eZzsj6PEyBMVI1U5FP9wX6D7qWlxGOFNKOQzg+Fk11ut+2b55aeDLrSwUUNtFCRZ # /xZffJLyaFanwFfgLV2bAgMBAAGjggF4MIIBdDAMBgNVHRMBAf8EAjAAMD0GA1Ud # HwQ2MDQwMqAwoC6GLGh0dHA6Ly9jY3NjYTIwMjEuY3JsLmNlcnR1bS5wbC9jY3Nj # YTIwMjEuY3JsMHMGCCsGAQUFBwEBBGcwZTAsBggrBgEFBQcwAYYgaHR0cDovL2Nj # c2NhMjAyMS5vY3NwLWNlcnR1bS5jb20wNQYIKwYBBQUHMAKGKWh0dHA6Ly9yZXBv # c2l0b3J5LmNlcnR1bS5wbC9jY3NjYTIwMjEuY2VyMB8GA1UdIwQYMBaAFN10XUwA # 23ufoHTKsW73PMAywHDNMB0GA1UdDgQWBBRTARHa/eTNBE999ctVnkA6rW5HwzBL # BgNVHSAERDBCMAgGBmeBDAEEATA2BgsqhGgBhvZ3AgUBBDAnMCUGCCsGAQUFBwIB # FhlodHRwczovL3d3dy5jZXJ0dW0ucGwvQ1BTMBMGA1UdJQQMMAoGCCsGAQUFBwMD # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYiRKgn05ElQ35lhw # NYle+DsOwLLCAJV1XN9SM78CxW/G4ASVXMDySbQseVIzJr7HXQxfqWK9mC1dqd6q # 2cYexoG3sR2nQY0g/ylpseUt3GHUJi6rKVmH3Ii6a+iSv5LBf5L7wZCrCfrNHqj8 # W++l2Yh9s0l2goE+TGAfKSwfiHKE4gN0OKpmREsBS+VJAQhr437Jk2MwaZIpf9IQ # fKDcdnY48x0qDr7NKqc8F+Iux8P9j4mrVfTw2by8t2JLXBdvsKwe/YTeW9JX5KIv # hq7g+x8nl80i1xkgeZ1lJw/aZ8QRCt/AqvzrJk+CcdcDWjtaOEKV73w60j6fAbgz # +DxF/i25caXESj51Lt0Op1pgEB9rhQHP0dxBhgA/3rhwfBfXTjFiYjSsZyrJyJoO # YZecSNaQ9t5/pnocQg8AUQVYqA1l5R0dD5AEgvd6IlrKyBD9NZDALmcUljyghqDP # /GdhecuQp7whAptt5MJQ2qq/LYulgDA8OFi+6SLe/TvYHYb6wMexzu/dD7duDAKt # gLoMNVKCN/5kvai8ulL1bUnG0nAq9IoKyZqxHoQtiAk1IzCoAzYTofai5zZrlVNn # z36+mDoXLwB7GBt2NZgAXFwSuH7386G3ZZNtOag5f96T4Zss7KFCzxxj2OOWFRLa # 8mppbeJHflrjP/jI9pQRaB+e0dcwggauMIIElqADAgECAhAHNje3JFR82Ees/Shm # Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp # Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp # Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy # MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 # MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l # U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG # SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc # iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr # PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw # N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm # xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu # 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH # kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 # o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN # iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT # yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA # DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s # BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP # MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW # b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP # kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa # zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv # xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 # 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB # T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n # LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt # lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm # 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh # K/bt1nz8MIIGuTCCBKGgAwIBAgIRAJmjgAomVTtlq9xuhKaz6jkwDQYJKoZIhvcN # AQEMBQAwgYAxCzAJBgNVBAYTAlBMMSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xv # Z2llcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3Jp # dHkxJDAiBgNVBAMTG0NlcnR1bSBUcnVzdGVkIE5ldHdvcmsgQ0EgMjAeFw0yMTA1 # MTkwNTMyMThaFw0zNjA1MTgwNTMyMThaMFYxCzAJBgNVBAYTAlBMMSEwHwYDVQQK # ExhBc3NlY28gRGF0YSBTeXN0ZW1zIFMuQS4xJDAiBgNVBAMTG0NlcnR1bSBDb2Rl # IFNpZ25pbmcgMjAyMSBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AJ0jzwQwIzvBRiznM3M+Y116dbq+XE26vest+L7k5n5TeJkgH4Cyk74IL9uP61ol # RsxsU/WBAElTMNQI/HsE0uCJ3VPLO1UufnY0qDHG7yCnJOvoSNbIbMpT+Cci75sc # Cx7UsKK1fcJo4TXetu4du2vEXa09Tx/bndCBfp47zJNsamzUyD7J1rcNxOw5g6FJ # g0ImIv7nCeNn3B6gZG28WAwe0mDqLrvU49chyKIc7gvCjan3GH+2eP4mYJASflBT # Q3HOs6JGdriSMVoD1lzBJobtYDF4L/GhlLEXWgrVQ9m0pW37KuwYqpY42grp/kSY # E4BUQrbLgBMNKRvfhQPskDfZ/5GbTCyvlqPN+0OEDmYGKlVkOMenDO/xtMrMINRJ # S5SY+jWCi8PRHAVxO0xdx8m2bWL4/ZQ1dp0/JhUpHEpABMc3eKax8GI1F03mSJVV # 6o/nmmKqDE6TK34eTAgDiBuZJzeEPyR7rq30yOVw2DvetlmWssewAhX+cnSaaBKM # Ej9O2GgYkPJ16Q5Da1APYO6n/6wpCm1qUOW6Ln1J6tVImDyAB5Xs3+JriasaiJ7P # 5KpXeiVV/HIsW3ej85A6cGaOEpQA2gotiUqZSkoQUjQ9+hPxDVb/Lqz0tMjp6RuL # SKARsVQgETwoNQZ8jCeKwSQHDkpwFndfCceZ/OfCUqjxAgMBAAGjggFVMIIBUTAP # BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTddF1MANt7n6B0yrFu9zzAMsBwzTAf # BgNVHSMEGDAWgBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMCAQYw # EwYDVR0lBAwwCgYIKwYBBQUHAwMwMAYDVR0fBCkwJzAloCOgIYYfaHR0cDovL2Ny # bC5jZXJ0dW0ucGwvY3RuY2EyLmNybDBsBggrBgEFBQcBAQRgMF4wKAYIKwYBBQUH # MAGGHGh0dHA6Ly9zdWJjYS5vY3NwLWNlcnR1bS5jb20wMgYIKwYBBQUHMAKGJmh0 # dHA6Ly9yZXBvc2l0b3J5LmNlcnR1bS5wbC9jdG5jYTIuY2VyMDkGA1UdIAQyMDAw # LgYEVR0gADAmMCQGCCsGAQUFBwIBFhhodHRwOi8vd3d3LmNlcnR1bS5wbC9DUFMw # DQYJKoZIhvcNAQEMBQADggIBAHWIWA/lj1AomlOfEOxD/PQ7bcmahmJ9l0Q4SZC+ # j/v09CD2csX8Yl7pmJQETIMEcy0VErSZePdC/eAvSxhd7488x/Cat4ke+AUZZDtf # Cd8yHZgikGuS8mePCHyAiU2VSXgoQ1MrkMuqxg8S1FALDtHqnizYS1bIMOv8znyJ # jZQESp9RT+6NH024/IqTRsRwSLrYkbFq4VjNn/KV3Xd8dpmyQiirZdrONoPSlCRx # CIi54vQcqKiFLpeBm5S0IoDtLoIe21kSw5tAnWPazS6sgN2oXvFpcVVpMcq0C4x/ # CLSNe0XckmmGsl9z4UUguAJtf+5gE8GVsEg/ge3jHGTYaZ/MyfujE8hOmKBAUkVa # 7NMxRSB1EdPFpNIpEn/pSHuSL+kWN/2xQBJaDFPr1AX0qLgkXmcEi6PFnaw5T17U # dIInA58rTu3mefNuzUtse4AgYmxEmJDodf8NbVcU6VdjWtz0e58WFZT7tST6EWQm # x/OoHPelE77lojq7lpsjhDCzhhp4kfsfszxf9g2hoCtltXhCX6NqsqwTT7xe8LgM # kH4hVy8L1h2pqGLT2aNCx7h/F95/QvsTeGGjY7dssMzq/rSshFQKLZ8lPb8hFTmi # GDJNyHga5hZ59IGynk08mHhBFM/0MLeBzlAQq1utNjQprztZ5vv/NJy8ua9AGbwk # MWkOMIIGvDCCBKSgAwIBAgIQC65mvFq6f5WHxvnpBOMzBDANBgkqhkiG9w0BAQsF # ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV # BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w # aW5nIENBMB4XDTI0MDkyNjAwMDAwMFoXDTM1MTEyNTIzNTk1OVowQjELMAkGA1UE # BhMCVVMxETAPBgNVBAoTCERpZ2lDZXJ0MSAwHgYDVQQDExdEaWdpQ2VydCBUaW1l # c3RhbXAgMjAyNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL5qc5/2 # lSGrljC6W23mWaO16P2RHxjEiDtqmeOlwf0KMCBDEr4IxHRGd7+L660x5XltSVhh # K64zi9CeC9B6lUdXM0s71EOcRe8+CEJp+3R2O8oo76EO7o5tLuslxdr9Qq82aKcp # A9O//X6QE+AcaU/byaCagLD/GLoUb35SfWHh43rOH3bpLEx7pZ7avVnpUVmPvkxT # 8c2a2yC0WMp8hMu60tZR0ChaV76Nhnj37DEYTX9ReNZ8hIOYe4jl7/r419CvEYVI # rH6sN00yx49boUuumF9i2T8UuKGn9966fR5X6kgXj3o5WHhHVO+NBikDO0mlUh90 # 2wS/Eeh8F/UFaRp1z5SnROHwSJ+QQRZ1fisD8UTVDSupWJNstVkiqLq+ISTdEjJK # GjVfIcsgA4l9cbk8Smlzddh4EfvFrpVNnes4c16Jidj5XiPVdsn5n10jxmGpxoMc # 6iPkoaDhi6JjHd5ibfdp5uzIXp4P0wXkgNs+CO/CacBqU0R4k+8h6gYldp4FCMgr # XdKWfM4N0u25OEAuEa3JyidxW48jwBqIJqImd93NRxvd1aepSeNeREXAu2xUDEW8 # aqzFQDYmr9ZONuc2MhTMizchNULpUEoA6Vva7b1XCB+1rxvbKmLqfY/M/SdV6mwW # TyeVy5Z/JkvMFpnQy5wR14GJcv6dQ4aEKOX5AgMBAAGjggGLMIIBhzAOBgNVHQ8B # Af8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAg # BgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZ # bU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFJ9XLAN3DigVkGalY17uT5IfdqBb # MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdp # Q2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAG # CCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2Vy # dC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9E # aWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQw # DQYJKoZIhvcNAQELBQADggIBAD2tHh92mVvjOIQSR9lDkfYR25tOCB3RKE/P09x7 # gUsmXqt40ouRl3lj+8QioVYq3igpwrPvBmZdrlWBb0HvqT00nFSXgmUrDKNSQqGT # dpjHsPy+LaalTW0qVjvUBhcHzBMutB6HzeledbDCzFzUy34VarPnvIWrqVogK0qM # 8gJhh/+qDEAIdO/KkYesLyTVOoJ4eTq7gj9UFAL1UruJKlTnCVaM2UeUUW/8z3fv # jxhN6hdT98Vr2FYlCS7Mbb4Hv5swO+aAXxWUm3WpByXtgVQxiBlTVYzqfLDbe9Pp # BKDBfk+rabTFDZXoUke7zPgtd7/fvWTlCs30VAGEsshJmLbJ6ZbQ/xll/HjO9JbN # VekBv2Tgem+mLptR7yIrpaidRJXrI+UzB6vAlk/8a1u7cIqV0yef4uaZFORNekUg # QHTqddmsPCEIYQP7xGxZBIhdmm4bhYsVA6G2WgNFYagLDBzpmk9104WQzYuVNsxy # oVLObhx3RugaEGru+SojW4dHPoWrUhftNpFC5H7QEY7MhKRyrBe7ucykW7eaCuWB # sBb4HOKRFVDcrZgdwaSIqMDiCLg4D+TPVgKx2EgEdeoHNHT9l3ZDBD+XgbF+23/z # BjeCtxz+dL/9NWR6P2eZRi7zcEO1xwcdcqJsyz/JceENc2Sg8h3KeFUCS7tpFk7C # rDqkMYIFwDCCBbwCAQEwajBWMQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNv # IERhdGEgU3lzdGVtcyBTLkEuMSQwIgYDVQQDExtDZXJ0dW0gQ29kZSBTaWduaW5n # IDIwMjEgQ0ECEH8qJ3LyreRW9M9pJl9pf7MwDQYJYIZIAWUDBAIBBQCggYQwGAYK # KwYBBAGCNwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIB # BDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg # P+oO91rMQRGM99l4PCNuLbI7LaMakkS/HhcoLhCtlRswDQYJKoZIhvcNAQEBBQAE # ggGAjWFxOikBnWwiEqpBKGNXeDOnscLKpWxZMCGG1Q01S6VMuHlIg4UpA+a58ig7 # W5ez22FDGFgwDScIqfsPWEJZlo31JI+CkAADPk98oR+5tOv4Z+uv119moA9P5EdD # Z/xfWSRE6wLcbdkq7FHLzCdauJbnMqd7BicHIStRd+F01v5GmdiJKggotiIvY8Yw # wEWaDosFtCJ2t/DklaUFvUM1ouC4daSLgTWkMSq8FT2EcDpVxN9z+7fn3MWVmhOi # k2cMd6CJxAaya/ee72FMyoRchRW4knI3HkOt4X0NJCdpxipTSveUmk1oGpED7I3+ # yhmKTU9QyukrhlyfrvyWZ8ERT71oVQEumtw4Gin5WGbNgUhR43HBrG6F/hh/oPt/ # kl2AeT03OhMY9jWAFamlwAULLElHfekepDe3Z6QvHJLawvPxWuiksTYjEhEcvdY+ # UY2WXadDu0RYGuDanIiU4ddmuLjyS3jRNAIUeMPBXtSRKxaOxeIw24N92tFCXFuj # Ab7EoYIDIDCCAxwGCSqGSIb3DQEJBjGCAw0wggMJAgEBMHcwYzELMAkGA1UEBhMC # VVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdpQ2VydCBU # cnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQC65mvFq6 # f5WHxvnpBOMzBDANBglghkgBZQMEAgEFAKBpMBgGCSqGSIb3DQEJAzELBgkqhkiG # 9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTI0MTAyOTIzMzcyOVowLwYJKoZIhvcNAQkE # MSIEIAClSpd+pGsTKN2MV/uFL3ek/6lCYzdC6c0xRJ32ek0DMA0GCSqGSIb3DQEB # AQUABIICAClsGaC2RI/xg7F5KXIBZUUTMszSFXOtABQwza9Lsf82JrVY1diqNJLo # d6bCt2a9akMTw53gq2LIb0IButwTCkUzMawY+NFGSUG4zWxbleJx+ApwbyXJmIll # cxcrXBjj0B9KNJ2tOANdYguseQ5Cc0eBLk1WLsDixZD/glWzhkshnMBhVgazPBtp # gLF7RMX0TLAFN1afWzGjnePWu8Zey5/9nrzJh0WhmzYyVwuAxdCH/bKgMXJCUcNN # 3XPc1nz0qRCjC0ynXMSlk3SZKWrkpCvooccQ7YnGC2xNHux2OaQZes55bDAa8ChK # 7za1llZkLFRYtneepGzyuyj3DOPaprh7zl+OGbHq5XtG95xQLH2llG6i2xDEY7TH # J2R6PelCN0rWZKEB3ZDCUKtvoRjTvuNC6rOluVmA4pCtbReL4mOisvv7mF+zxEI0 # MtNKtZ5FYbdRnnsTqW4iRv+Z54vNesWx7iX1CBKiD96N3vYuEv7pYq2QoK3q+Ht3 # TzzmGmmoaKF/W1I/XYbAhMCq4rigjunV3Lb+vi/0I0p7+ZUNtyybtqloKNtKm2la # lGcxOfpsyJQjYFBm+dRT+I6Q1ZdPbEtaJEc3qVfgDwuoUa002EyCu1Qe5dNqdtYX # U5flMq6W045MBQyFQMHEZZOb3cv1sX3pyl1Eu/xXfK18+O9huItf # SIG # End signature block |