Private/GetWorkingCredentials.ps1
function GetWorkingCredentials { [CmdletBinding(DefaultParameterSetName='PSCredential')] Param( [Parameter(Mandatory=$False)] [string]$RemoteHostNameOrIP, [Parameter( Mandatory=$False, ParameterSetName='PSCredential' )] [System.Management.Automation.PSCredential]$AltCredentials, [Parameter( Mandatory=$False, ParameterSetName='NoCredentialObject' )] [string]$UserName, [Parameter( Mandatory=$False, ParameterSetName='NoCredentialObject' )] [System.Security.SecureString]$Password ) #region >> Helper Functions function Check-CredsAndLockStatus { [CmdletBinding()] Param( [Parameter(Mandatory=$True)] $RemoteHostNetworkInfo, [Parameter( Mandatory=$True, ParameterSetName='PSCredential' )] [System.Management.Automation.PSCredential]$AltCredentials ) $CurrentlyLoadedAssemblies = [System.AppDomain]::CurrentDomain.GetAssemblies() if (![bool]$($CurrentlyLoadedAssemblies -match "System.DirectoryServices.AccountManagement")) { Add-Type -AssemblyName System.DirectoryServices.AccountManagement } $SimpleDomain = $RemoteHostNetworkInfo.Domain $SimpleDomainWLDAPPort = $SimpleDomain + ":3268" $DomainLDAPContainers = "DC=" + $($SimpleDomain -split "\.")[0] + "," + "DC=" + $($SimpleDomain -split "\.")[1] try { $SimpleUserName = $($AltCredentials.UserName -split "\\")[1] $PrincipleContext = [System.DirectoryServices.AccountManagement.PrincipalContext]::new( [System.DirectoryServices.AccountManagement.ContextType]::Domain, "$SimpleDomainWLDAPPort", "$DomainLDAPContainers", [System.DirectoryServices.AccountManagement.ContextOptions]::SimpleBind, "$($AltCredentials.UserName)", "$([Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($AltCredentials.Password)))" ) try { $UserPrincipal = [System.DirectoryServices.AccountManagement.UserPrincipal]::FindByIdentity($PrincipleContext, [System.DirectoryServices.AccountManagement.IdentityType]::SamAccountName, "$SimpleUserName") $AltCredentialsAreValid = $True } catch { $AltCredentialsAreValid = $False } if ($AltCredentialsAreValid) { # Determine if the User Account is locked $AccountLocked = $UserPrincipal.IsAccountLockedOut() if ($AccountLocked -eq $True) { Write-Error "The provided UserName $($AltCredentials.Username) is locked! Please unlock it before additional attempts at getting working credentials!" $global:FunctionResult = "1" return } } } catch { Write-Error $_ $global:FunctionResult = "1" return } $Output = [ordered]@{ AltCredentialsAreValid = $AltCredentialsAreValid } if ($AccountLocked) { $Output.Add("AccountLocked",$AccountLocked) } [pscustomobject]$Output } #endregion >> Helper Functions #region >> Variable/Parameter Transforms and PreRun Prep $CurrentlyLoadedAssemblies = [System.AppDomain]::CurrentDomain.GetAssemblies() $ResolveHostSplatParams = @{ ErrorAction = "Stop" } if ($RemoteHostNameOrIP) { $ResolveHostSplatParams.Add("HostNameOrIP",$RemoteHostNameOrIP) } else { $ResolveHostSplatParams.Add("HostNameOrIP",$env:ComputerName) } try { $RemoteHostNetworkInfo = ResolveHost @ResolveHostSplatParams } catch { if ($env:ComputerName -eq $($RemoteHostNameOrIP -split "\.")[0]) { $ResolveHostSplatParams = @{ ErrorAction = "Stop" } $ResolveHostSplatParams.Add("HostNameOrIP",$env:ComputerName) try { $RemoteHostNetworkInfo = ResolveHost @ResolveHostSplatParams } catch { Write-Error $_ Write-Error "Unable to resolve $RemoteHostNameOrIP! Halting!" $global:FunctionResult = "1" return } } else { Write-Error $_ Write-Error "Unable to resolve $RemoteHostNameOrIP! Halting!" $global:FunctionResult = "1" return } } if (!$Username -and !$AltCredentials -and $RemoteHostNetworkInfo.HostName -eq $env:ComputerName) { #Write-Warning "The Remote Host is actually the Local Host (i.e. $env:ComputerName)!" $Output = [ordered]@{ LogonType = "LocalAccount" DeterminedCredsThatWorkedOnRemoteHost = $True WorkingCredsAreValidOnDomain = $False WorkingCredentials = "$(whoami)" RemoteHostWorkingLocation = $RemoteHostNetworkInfo.FQDN CurrentLoggedInUserCredsWorked = $True } [pscustomobject]$Output return } $EnvironmentInfo = Get-ItemProperty 'Microsoft.PowerShell.Core\Registry::HKEY_CURRENT_USER\Volatile Environment\' $CurrentUserLogonServer = $EnvironmentInfo.LogonServer -replace '\\\\','' if ($CurrentUserLogonServer -eq $env:ComputerName) { $LogonServerIsDomainController = $False $LoggedInAsLocalUser = $True } else { $LogonServerIsDomainController = $True $LoggedInAsLocalUser = $False } if ($UserName) { while ($UserName -notmatch "\\") { $UserName = Read-Host -Prompt "The provided UserName is NOT in the correct format! Please enter a UserName with access to $($RemoteHostNetworkInfo.FQDN) using format <DomainPrefix_Or_$($RemoteHostNetworkInfo.HostName)>\<UserName>" } if (!$Password) { $Password = Read-Host -Prompt "Please enter the password for $UserName" -AsSecureString } $AltCredentials = [System.Management.Automation.PSCredential]::new($UserName,$Password) } #endregion >> Variable/Parameter Transforms and PreRun Prep #region >> Main Body if ($AltCredentials) { while ($AltCredentials.UserName -notmatch "\\") { $AltUserName = Read-Host -Prompt "The provided UserName is NOT in the correct format! Please enter a UserName with access to $($RemoteHostNetworkInfo.FQDN) using format <DomainPrefix_Or_$($RemoteHostNetworkInfo.HostName)>\<UserName>" $AltPassword = Read-Host -Prompt "Please enter the password for $AltUserName" -AsSecureString $AltCredentials = [System.Management.Automation.PSCredential]::new($AltUserName,$AltPassword) } if ($($AltCredentials.UserName -split "\\")[0] -ne $RemoteHostNetworkInfo.HostName -and $($AltCredentials.UserName -split "\\")[0] -ne $($RemoteHostNetworkInfo.Domain -split "\.")[0] ) { $ErrMsg = "Using the credentials provided we will not be able to find a Logon Server. The credentials do not " + "indicate a Local Logon (i.e. $($RemoteHostNetworkInfo.HostName)\$($($AltCredentials.UserName -split "\\")[1]) " + "or a Domain Logon (i.e. $($($($RemoteHostNetworkInfo.Domain) -split "\.")[0])\$($($AltCredentials.UserName -split "\\")[1])! " + "Halting!" Write-Error $ErrMsg $global:FunctionResult = "1" return } if ($LoggedInAsLocalUser) { # If we ARE trying a Local Account on the Remote Host if ($($AltCredentials.Username -split "\\")[0] -eq $RemoteHostNetworkInfo.HostName) { $LogonType = "LocalAccount" $AltCredentialsUncertain = $True $CurrentUserCredentialsMightWork = $False } # If we ARE NOT trying a Local Account on the Remote Host, we are necessarily trying Domain Credentials if ($($AltCredentials.Username -split "\\")[0] -ne $RemoteHostNetworkInfo.HostName) { $LogonType = "DomainAccount" $CurrentUserCredentialsMightWork = $False $CredsAndLockStatus = Check-CredsAndLockStatus -RemoteHostNetworkInfo $RemoteHostNetworkInfo -AltCredentials $AltCredentials $AltCredentialsAreValid = $CredsAndLockStatus.AltCredentialsAreValid if ($AltCredentialsAreValid) { $AccountLocked = $CredsAndLockStatus.AccountLocked } } } if (!$LoggedInAsLocalUser) { if ($AltCredentials.Username -eq $(whoami)) { # If we ARE trying a Local Account on the Remote Host if ($($AltCredentials.Username -split "\\")[0] -eq $RemoteHostNetworkInfo.HostName) { $LogonType = "LocalAccount" $AltCredentialsUncertain = $True $CurrentUserCredentialsMightWork = $False } # If we ARE NOT trying a Local Account on the Remote Host, we are necessarily trying Domain Credentials if ($($AltCredentials.Username -split "\\")[0] -ne $RemoteHostNetworkInfo.HostName) { $LogonType = "DomainAccount" # We know we're staying within the same Domain... $CurrentUserCredentialsMightWork = $True } } if ($AltCredentials.Username -ne $(whoami)) { # If we ARE trying a Local Account on the Remote Host if ($($AltCredentials.Username -split "\\")[0] -eq $RemoteHostNetworkInfo.HostName) { $LogonType = "LocalAccount" $AltCredentialsUncertain = $True $CurrentUserCredentialsMightWork = $False } # If we ARE NOT trying a Local Account on the Remote Host, we are necessarily trying Domain Credentials if ($($AltCredentials.Username -split "\\")[0] -ne $RemoteHostNetworkInfo.HostName) { $LogonType = "DomainAccount" # If we're staying in the same Domain... if ($EnvironmentInfo.UserDNSDomain -eq $RemoteHostNetworkInfo.Domain) { $CurrentUserCredentialsMightWork = $True } # If we're trying a machine on a different Domain... if ($EnvironmentInfo.UserDNSDomain -ne $RemoteHostNetworkInfo.Domain) { $CredsAndLockStatus = Check-CredsAndLockStatus -RemoteHostNetworkInfo $RemoteHostNetworkInfo -AltCredentials $AltCredentials $AltCredentialsAreValid = $CredsAndLockStatus.AltCredentialsAreValid if ($AltCredentialsAreValid) { $AccountLocked = $CredsAndLockStatus.AccountLocked } } # end Different Domain 'if' block } # end Domain Creds 'if' block } # end $AltCredentials.Username -ne $(whoami) 'if block' } # end !$LoggedInAsLocalUser 'if' block } # end $AltCredentials 'if' block if (!$AltCredentials) { # $AltCredentialsAreValid -eq $False because they are not provided... $AltCredentialsAreValid = $False if ($LoggedInAsLocalUser) { $CurrentUserCredentialsMightWork = $False } else { if ($RemoteHostNetworkInfo.Domain -eq $EnvironmentInfo.UserDNSDomain) { $LogonType = "DomainAccount" $CurrentUserCredentialsMightWork = $True } else { $CurrentUserCredentialsMightWork = $False } } } if ($AltCredentialsAreValid -or $AltCredentialsUncertain) { # NOTE: For some reason, there are situations where FQDN works over HostName or visa versa. So we use # logic to try FQDN, and if that fails, try HostName try { $InvokeCommandOutput = Invoke-Command -ComputerName $RemoteHostNetworkInfo.FQDN -Credential $AltCredentials -ScriptBlock {"Success"} -ErrorAction Stop $TargetHostLocation = $RemoteHostNetworkInfo.FQDN $CredentialsWorked = $True $ProvidedCredsWorked = $True } catch { try { $InvokeCommandOutput = Invoke-Command -ComputerName $RemoteHostNetworkInfo.HostName -Credential $AltCredentials -ScriptBlock {"Success"} -ErrorAction Stop $TargetHostLocation = $RemoteHostNetworkInfo.HostName $CredentialsWorked = $True $ProvidedCredsWorked = $True } catch { if ($CurrentUserCredentialsMightWork) { $TryCurrentUserCreds = $True } else { Write-Warning "Unable to determine working credentials for $RemoteHostNameOrIP!" } } } } if ($($AltCredentialsAreValid -and $TryCurrentUserCreds) -or $(!$AltCredentials -and $CurrentUserCredentialsMightWork) -or $(!$LoggedInAsLocalUser -and $AltCredentials.Username -eq $(whoami)) ) { try { $InvokeCommandOutput = Invoke-Command -ComputerName $RemoteHostNetworkInfo.FQDN -ScriptBlock {"Success"} -ErrorAction Stop $TargetHostLocation = $RemoteHostNetworkInfo.FQDN $CredentialsWorked = $True $TriedCurrentlyLoggedInUser = $True } catch { try { $InvokeCommandOutput = Invoke-Command -ComputerName $RemoteHostNetworkInfo.HostName -ScriptBlock {"Success"} -ErrorAction Stop $TargetHostLocation = $RemoteHostNetworkInfo.HostName $CredentialsWorked = $True $TriedCurrentlyLoggedInUser = $True } catch { Write-Warning "Unable to determine working credentials for $RemoteHostNameOrIP!" } } } # Create Output $Output = [ordered]@{ LogonType = $LogonType } $CredentialsWorked = if ($CredentialsWorked) {$True} else {$False} $Output.Add("DeterminedCredsThatWorkedOnRemoteHost",$CredentialsWorked) if ($CredentialsWorked) { if ($LogonType -eq "LocalAccount") { $Output.Add("WorkingCredsAreValidOnDomain",$False) } else { $Output.Add("WorkingCredsAreValidOnDomain",$True) } if ($AltCredentials -and $ProvidedCredsWorked) { $WorkingCredentials = $AltCredentials } else { $WorkingCredentials = "$(whoami)" } $Output.Add("WorkingCredentials",$WorkingCredentials) $Output.Add("RemoteHostWorkingLocation",$TargetHostLocation) } if ($WorkingCredentials.UserName -eq "$(whoami)" -or $WorkingCredentials -eq "$(whoami)") { $Output.Add("CurrentLoggedInUserCredsWorked",$True) } else { if (!$TriedCurrentlyLoggedInUser) { $Output.Add("CurrentLoggedInUserCredsWorked","NotTested") } elseif ($TriedCurrentlyLoggedInUser -and $CredentialsWorked) { $Output.Add("CurrentLoggedInUserCredsWorked",$True) } elseif ($TriedCurrentlyLoggedInUser -and !$CredentialsWorked) { $Output.Add("CurrentLoggedInUserCredsWorked",$False) } } if ($AltCredentials) { if ($LogonType -eq "LocalAccount" -or $AltCredentialsAreValid -eq $False) { $Output.Add("ProvidedCredsAreValidOnDomain",$False) } elseif ($AltCredentialsAreValid -eq $True -or $ProvidedCredsWorked) { $Output.Add("ProvidedCredsAreValidOnDomain",$True) } elseif ($ProvidedCredsWorked -eq $null) { $Output.Add("ProvidedCredsAreValidOnDomain","NotTested") } elseif ($ProvidedCredsWorked -eq $False) { $Output.Add("ProvidedCredsAreValidOnDomain",$False) } else { $Output.Add("ProvidedCredsAreValidOnDomain",$AltCredentialsAreValid) } } if ($AltCredentialsAreValid -and !$CredentialsWorked) { $FinalWarnMsg = "Either $($RemoteHostNetworkInfo.FQDN) and/or $($RemoteHostNetworkInfo.HostName) " + "and/or $($RemoteHostNetworkInfo.IPAddressList[0]) is not part of the WinRM Trusted Hosts list " + "(see '`$(Get-ChildItem WSMan:\localhost\Client\TrustedHosts).Value'), or the WinRM Service on " + "$($RemoteHostNetworkInfo.FQDN) is not running, or $($AltCredentials.UserName) specifically " + "does not have access to $($RemoteHostNetworkInfo.FQDN)! If $($RemoteHostNetworkInfo.FQDN) is " + "not part of a Domain, then you may also need to add this regsitry setting on $($RemoteHostNetworkInfo.FQDN):`n" + " reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f" + "Lastly, use the 'Get-NetConnectionProfile' cmdlet on $($RemoteHostNetworkInfo.FQDN) to determine if any " + "network adapters have a 'NetworkCategory' of 'Public'. If so you must change them to 'Private' via:`n" + " Get-NetConnectionProfile | Where-Object {`$_.NetworkCategory -eq 'Public'} | Set-NetConnectionProfile -NetworkCategory 'Private'" Write-Warning $FinalWarnMsg } [pscustomobject]$Output #endregion >> Main Body } # SIG # Begin signature block # MIIMiAYJKoZIhvcNAQcCoIIMeTCCDHUCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUyDFdli89q9LP7DAozKaqJuJp # q0ygggn9MIIEJjCCAw6gAwIBAgITawAAAB/Nnq77QGja+wAAAAAAHzANBgkqhkiG # 9w0BAQsFADAwMQwwCgYDVQQGEwNMQUIxDTALBgNVBAoTBFpFUk8xETAPBgNVBAMT # CFplcm9EQzAxMB4XDTE3MDkyMDIxMDM1OFoXDTE5MDkyMDIxMTM1OFowPTETMBEG # CgmSJomT8ixkARkWA0xBQjEUMBIGCgmSJomT8ixkARkWBFpFUk8xEDAOBgNVBAMT # B1plcm9TQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDCwqv+ROc1 # bpJmKx+8rPUUfT3kPSUYeDxY8GXU2RrWcL5TSZ6AVJsvNpj+7d94OEmPZate7h4d # gJnhCSyh2/3v0BHBdgPzLcveLpxPiSWpTnqSWlLUW2NMFRRojZRscdA+e+9QotOB # aZmnLDrlePQe5W7S1CxbVu+W0H5/ukte5h6gsKa0ktNJ6X9nOPiGBMn1LcZV/Ksl # lUyuTc7KKYydYjbSSv2rQ4qmZCQHqxyNWVub1IiEP7ClqCYqeCdsTtfw4Y3WKxDI # JaPmWzlHNs0nkEjvnAJhsRdLFbvY5C2KJIenxR0gA79U8Xd6+cZanrBUNbUC8GCN # wYkYp4A4Jx+9AgMBAAGjggEqMIIBJjASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsG # AQQBgjcVAgQWBBQ/0jsn2LS8aZiDw0omqt9+KWpj3DAdBgNVHQ4EFgQUicLX4r2C # Kn0Zf5NYut8n7bkyhf4wGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwDgYDVR0P # AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUdpW6phL2RQNF # 7AZBgQV4tgr7OE0wMQYDVR0fBCowKDAmoCSgIoYgaHR0cDovL3BraS9jZXJ0ZGF0 # YS9aZXJvREMwMS5jcmwwPAYIKwYBBQUHAQEEMDAuMCwGCCsGAQUFBzAChiBodHRw # Oi8vcGtpL2NlcnRkYXRhL1plcm9EQzAxLmNydDANBgkqhkiG9w0BAQsFAAOCAQEA # tyX7aHk8vUM2WTQKINtrHKJJi29HaxhPaHrNZ0c32H70YZoFFaryM0GMowEaDbj0 # a3ShBuQWfW7bD7Z4DmNc5Q6cp7JeDKSZHwe5JWFGrl7DlSFSab/+a0GQgtG05dXW # YVQsrwgfTDRXkmpLQxvSxAbxKiGrnuS+kaYmzRVDYWSZHwHFNgxeZ/La9/8FdCir # MXdJEAGzG+9TwO9JvJSyoGTzu7n93IQp6QteRlaYVemd5/fYqBhtskk1zDiv9edk # mHHpRWf9Xo94ZPEy7BqmDuixm4LdmmzIcFWqGGMo51hvzz0EaE8K5HuNvNaUB/hq # MTOIB5145K8bFOoKHO4LkTCCBc8wggS3oAMCAQICE1gAAAH5oOvjAv3166MAAQAA # AfkwDQYJKoZIhvcNAQELBQAwPTETMBEGCgmSJomT8ixkARkWA0xBQjEUMBIGCgmS # JomT8ixkARkWBFpFUk8xEDAOBgNVBAMTB1plcm9TQ0EwHhcNMTcwOTIwMjE0MTIy # WhcNMTkwOTIwMjExMzU4WjBpMQswCQYDVQQGEwJVUzELMAkGA1UECBMCUEExFTAT # BgNVBAcTDFBoaWxhZGVscGhpYTEVMBMGA1UEChMMRGlNYWdnaW8gSW5jMQswCQYD # VQQLEwJJVDESMBAGA1UEAxMJWmVyb0NvZGUyMIIBIjANBgkqhkiG9w0BAQEFAAOC # AQ8AMIIBCgKCAQEAxX0+4yas6xfiaNVVVZJB2aRK+gS3iEMLx8wMF3kLJYLJyR+l # rcGF/x3gMxcvkKJQouLuChjh2+i7Ra1aO37ch3X3KDMZIoWrSzbbvqdBlwax7Gsm # BdLH9HZimSMCVgux0IfkClvnOlrc7Wpv1jqgvseRku5YKnNm1JD+91JDp/hBWRxR # 3Qg2OR667FJd1Q/5FWwAdrzoQbFUuvAyeVl7TNW0n1XUHRgq9+ZYawb+fxl1ruTj # 3MoktaLVzFKWqeHPKvgUTTnXvEbLh9RzX1eApZfTJmnUjBcl1tCQbSzLYkfJlJO6 # eRUHZwojUK+TkidfklU2SpgvyJm2DhCtssFWiQIDAQABo4ICmjCCApYwDgYDVR0P # AQH/BAQDAgeAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMB0GA1UdDgQWBBS5d2bhatXq # eUDFo9KltQWHthbPKzAfBgNVHSMEGDAWgBSJwtfivYIqfRl/k1i63yftuTKF/jCB # 6QYDVR0fBIHhMIHeMIHboIHYoIHVhoGubGRhcDovLy9DTj1aZXJvU0NBKDEpLENO # PVplcm9TQ0EsQ049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNl # cnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9emVybyxEQz1sYWI/Y2VydGlmaWNh # dGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlv # blBvaW50hiJodHRwOi8vcGtpL2NlcnRkYXRhL1plcm9TQ0EoMSkuY3JsMIHmBggr # BgEFBQcBAQSB2TCB1jCBowYIKwYBBQUHMAKGgZZsZGFwOi8vL0NOPVplcm9TQ0Es # Q049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENO # PUNvbmZpZ3VyYXRpb24sREM9emVybyxEQz1sYWI/Y0FDZXJ0aWZpY2F0ZT9iYXNl # P29iamVjdENsYXNzPWNlcnRpZmljYXRpb25BdXRob3JpdHkwLgYIKwYBBQUHMAKG # Imh0dHA6Ly9wa2kvY2VydGRhdGEvWmVyb1NDQSgxKS5jcnQwPQYJKwYBBAGCNxUH # BDAwLgYmKwYBBAGCNxUIg7j0P4Sb8nmD8Y84g7C3MobRzXiBJ6HzzB+P2VUCAWQC # AQUwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzANBgkqhkiG9w0BAQsFAAOC # AQEAszRRF+YTPhd9UbkJZy/pZQIqTjpXLpbhxWzs1ECTwtIbJPiI4dhAVAjrzkGj # DyXYWmpnNsyk19qE82AX75G9FLESfHbtesUXnrhbnsov4/D/qmXk/1KD9CE0lQHF # Lu2DvOsdf2mp2pjdeBgKMRuy4cZ0VCc/myO7uy7dq0CvVdXRsQC6Fqtr7yob9NbE # OdUYDBAGrt5ZAkw5YeL8H9E3JLGXtE7ir3ksT6Ki1mont2epJfHkO5JkmOI6XVtg # anuOGbo62885BOiXLu5+H2Fg+8ueTP40zFhfLh3e3Kj6Lm/NdovqqTBAsk04tFW9 # Hp4gWfVc0gTDwok3rHOrfIY35TGCAfUwggHxAgEBMFQwPTETMBEGCgmSJomT8ixk # ARkWA0xBQjEUMBIGCgmSJomT8ixkARkWBFpFUk8xEDAOBgNVBAMTB1plcm9TQ0EC # E1gAAAH5oOvjAv3166MAAQAAAfkwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwx # CjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGC # NwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFBIDFObRroeBmB8L # GrTTh8x7BHh6MA0GCSqGSIb3DQEBAQUABIIBAH2N82sZ06gbZOzikikwI+/0ju3L # T8wXirLb6rEmvcagHsvLfqYM99zbCecYthNxhUg4v+XvMo+rY2mn1LVu2U5pPR1L # bhIPeMAXPs4i1B8S7CQsvUpgf9YfLZrTNSIjSS7gq/hdzfgaQq/q1J3itrR/l44Z # ghNbNUhuAqv1YXJI9kudhmXnvSKcftAd2DBQsC8z/OBc8oyj2ovQ7ylI278X/8/P # bdOW32VqV83K29qPl/zDbqXPan3KMUeUCbaBGgXE6KXLram1O32gz6DQzPKBKx9g # swTXenJsshTEyLp5C8/LMJoDZdQBdocC4tajbFDaO6zvIIUaPbJ0GsQ4qaI= # SIG # End signature block |