public/Install-KbUpdate.ps1
# requires 5 function Install-KbUpdate { <# .SYNOPSIS Installs KBs on local and remote servers on Windows-based systems .DESCRIPTION Installs KBs on local and remote servers on Windows-based systems PowerShell 5.1 must be installed and enabled on the target machine and the target machine must be Windows-based Note that if you use a DSC Pull server, this may impact your LCM .PARAMETER ComputerName Used to connect to a remote host .PARAMETER Credential The optional alternative credential to be used when connecting to ComputerName .PARAMETER PSDscRunAsCredential Run the install as a specific user (other than SYSTEM) on the target node .PARAMETER HotfixId The HotfixId of the patch .PARAMETER FilePath The filepath of the patch. Not required - if you don't have it, we can grab it from the internet Note this does place the hotfix files in your local and remote Downloads directories .PARAMETER Guid If the file is an exe and no GUID is specified, we will have to get it from Get-KbUpdate .PARAMETER Title If the file is an exe and no Title is specified, we will have to get it from Get-KbUpdate .PARAMETER Method Not yet implemented but will be used to specify DSC or Windows Update .PARAMETER ArgumentList This is an advanced parameter for those of you who need special argumentlists for your platform-specific update. The argument list required by SQL updates are already accounted for. .PARAMETER InputObject Allows infos to be piped in from Get-KbUpdate .PARAMETER EnableException By default, when something goes wrong we try to catch it, interpret it and give you a friendly warning message. This avoids overwhelming you with "sea of red" exceptions, but is inconvenient because it basically disables advanced scripting. Using this switch turns this "nice by default" feature off and enables you to catch exceptions with your own try/catch. .NOTES Author: Jess Pomfret (@jpomfret), Chrissy LeMaire (@cl) Copyright: (c) licensed under MIT License: MIT https://opensource.org/licenses/MIT .EXAMPLE PS C:\> Install-KbUpdate -ComputerName sql2017 -FilePath C:\temp\windows10.0-kb4534273-x64_74bf76bc5a941bbbd0052caf5c3f956867e1de38.msu Installs KB4534273 from the C:\temp directory on sql2017 .EXAMPLE PS C:\> Install-KbUpdate -ComputerName sql2017 -FilePath \\dc\sql\windows10.0-kb4532947-x64_20103b70445e230e5994dc2a89dc639cd5756a66.msu Installs KB4534273 from the \\dc\sql\ directory on sql2017 .EXAMPLE PS C:\> Install-KbUpdate -ComputerName sql2017 -HotfixId kb4486129 Downloads an update, stores it in Downloads and installs it from there .EXAMPLE PS C:\> $params = @{ ComputerName = "sql2017" FilePath = "C:\temp\sqlserver2017-kb4498951-x64_b143d28a48204eb6ebab62394ce45df53d73f286.exe" Verbose = $true } PS C:\> Install-KbUpdate @params PS C:\> Uninstall-KbUpdate -ComputerName sql2017 -HotfixId KB4498951 Installs KB4498951 on sql2017 then uninstalls it ✔ #> [CmdletBinding(SupportsShouldProcess, ConfirmImpact = "Medium")] param ( [PSFComputer[]]$ComputerName = $env:ComputerName, [PSCredential]$Credential, [PSCredential]$PSDscRunAsCredential, [Parameter(ValueFromPipelineByPropertyName)] [Alias("Name", "KBUpdate", "Id")] [string]$HotfixId, [Alias("Path")] [string]$FilePath, [string]$RepositoryPath, [ValidateSet("WindowsUpdate", "DSC")] [string]$Method, [Parameter(ValueFromPipelineByPropertyName)] [Alias("UpdateId")] [string]$Guid, [Parameter(ValueFromPipelineByPropertyName)] [string]$Title, [string]$ArgumentList, [Parameter(ValueFromPipeline)] [pscustomobject[]]$InputObject, [switch]$EnableException ) process { if (-not $PSBoundParameters.HotfixId -and -not $PSBoundParameters.FilePath -and -not $PSBoundParameters.InputObject) { Stop-PSFFunction -EnableException:$EnableException -Message "You must specify either HotfixId or FilePath or pipe in the results from Get-KbUpdate" return } if ($IsLinux -or $IsMacOs) { Stop-PSFFunction -Message "This command using remoting and only supports Windows at this time" -EnableException:$EnableException return } if (-not $HotfixId.ToUpper().StartsWith("KB") -and $PSBoundParameters.HotfixId) { $HotfixId = "KB$HotfixId" } if ($Credential.UserName) { $PSDefaultParameterValues["*:Credential"] = $Credential } foreach ($item in $ComputerName) { $computer = $item.ComputerName if ($item.IsLocalHost -and -not (Test-ElevationRequirement -ComputerName $computer)) { Stop-PSFFunction -EnableException:$EnableException -Message "You must be an administrator to run this command on the local host" -Continue } #if (-not $item.IsLocalHost -and $Method -eq "WindowsUpdate") { if ($Method -eq "WindowsUpdate") { Stop-PSFFunction -EnableException:$EnableException -Message "The WindowsUpdate method is not yet implemented" -Continue } # null out a couple things to be safe $remotefileexists = $programhome = $remotesession = $null Write-PSFMessage -Level Verbose -Message "Processing $computer" if ($Method -eq "WindowsUpdate") { if ($InputObject.InputObject) { $searchresult = $InputObject.InputObject } else { $session = New-Object -ComObject Microsoft.Update.Session $session.ClientApplicationID = "kbupdate installer" $sessiontype = [type]::GetTypeFromProgID("Microsoft.Update.Session") $session = [activator]::CreateInstance($sessiontype) if ($InputObject.InputObject) { $searchresult.Updates = $InputObject.InputObject } else { $searcher = $session.CreateUpdateSearcher() $searchresult = $searcher.Search("IsInstalled=0 and Type='Software'") } } # iterate the updates in searchresult # it must be force iterated like this foreach ($update in $searchresult.Updates) { foreach ($bundle in $update.BundledUpdates) { $files = New-Object -ComObject "Microsoft.Update.StringColl.1" foreach ($file in $bundle.DownloadContents) { if ($file.DownloadUrl) { $filename = Split-Path -Path $file.DownloadUrl -Leaf $fullpath = Join-Path -Path $RepositoryPath -ChildPath $filename $null = $files.Add($fullpath) } } # load into Windows Update API try { #$bundle.CopyToCache($files) } catch { write-warning $PSItem } } } $installer = $session.CreateUpdateInstaller() $installer.Updates = $searchresult.Updates $installer.Install() } else { # Method is DSC if ($PSDefaultParameterValues["Invoke-PSFCommand:ComputerName"]) { $null = $PSDefaultParameterValues["Invoke-PSFCommand:ComputerName"].Remove() } if ($item.IsLocalHost) { # a lot of the file copy work will be done in the $home dir $programhome = Invoke-PSFCommand -ScriptBlock { $home } } else { Write-PSFMessage -Level Verbose -Message "Adding $computer to PSDefaultParameterValues for Invoke-PSFCommand:ComputerName" $PSDefaultParameterValues["Invoke-PSFCommand:ComputerName"] = $computer Write-PSFMessage -Level Verbose -Message "Initializing remote session to $computer and also getting the remote home directory" $programhome = Invoke-PSFCommand -ScriptBlock { $home } if (-not $remotesession) { $remotesession = Get-PSSession -ComputerName $computer -Verbose | Where-Object { $PsItem.Availability -eq 'Available' -and ($PsItem.Name -match 'WinRM' -or $PsItem.Name -match 'Runspace') } | Select-Object -First 1 } if (-not $remotesession) { $remotesession = Get-PSSession -ComputerName $computer | Where-Object { $PsItem.Availability -eq 'Available' } | Select-Object -First 1 } if (-not $remotesession) { Stop-PSFFunction -EnableException:$EnableException -Message "Session for $computer can't be found or no runspaces are available. Please file an issue on the GitHub repo at https://github.com/potatoqualitee/kbupdate/issues" -Continue } } # fix for SYSTEM which doesn't have a downloads directory by default Write-PSFMessage -Level Verbose -Message "Checking for home downloads directory" Invoke-PSFCommand -ScriptBlock { if (-not (Test-Path -Path "$home\Downloads")) { Write-Warning "Creating Downloads directory at $home\Downloads" $null = New-Item -ItemType Directory -Force -Path "$home\Downloads" } } $hasxhotfix = Invoke-PSFCommand -ScriptBlock { Get-Module -ListAvailable xWindowsUpdate } if (-not $hasxhotfix) { try { # Copy xWindowsUpdate to Program Files. The module is pretty much required to be in the PS Modules directory. $oldpref = $ProgressPreference $ProgressPreference = "SilentlyContinue" $programfiles = Invoke-PSFCommand -ScriptBlock { $env:ProgramFiles } if ($item.IsLocalhost) { $null = Copy-Item -Path "$script:ModuleRoot\library\xWindowsUpdate" -Destination "$programfiles\WindowsPowerShell\Modules\xWindowsUpdate" -Recurse -Force } else { $null = Copy-Item -Path "$script:ModuleRoot\library\xWindowsUpdate" -Destination "$programfiles\WindowsPowerShell\Modules\xWindowsUpdate" -ToSession $remotesession -Recurse -Force } $ProgressPreference = $oldpref } catch { Stop-PSFFunction -EnableException:$EnableException -Message "Couldn't auto-install xHotfix on $computer. Please Install-Module xWindowsUpdate on $computer to continue." -Continue } } if ($PSBoundParameters.FilePath) { $remotefileexists = Invoke-PSFCommand -ArgumentList $FilePath -ScriptBlock { Get-ChildItem -Path $args -ErrorAction SilentlyContinue } } if (-not $remotefileexists) { if ($FilePath) { # try really hard to find it locally $updatefile = Get-ChildItem -Path $FilePath -ErrorAction SilentlyContinue if (-not $updatefile) { Write-PSFMessage -Level Verbose -Message "Update file not found, try in Downloads" $filename = Split-Path -Path $FilePath -Leaf $updatefile = Get-ChildItem -Path "$home\Downloads\$filename" -ErrorAction SilentlyContinue } } if (-not $updatefile) { Write-PSFMessage -Level Verbose -Message "Update file not found, download it for them" # try to automatically download it for them if (-not $PSBoundParameters.InputObject) { $InputObject = Get-KbUpdate -Architecture x64 -Latest -Pattern $HotfixId | Where-Object Link } # note to reader: if this picks the wrong one, please download the required file manually. if ($InputObject.Link) { if ($InputObject.Link -match 'x64') { $file = $InputObject | Where-Object Link -match 'x64' | Select-Object -ExpandProperty Link -Last 1 | Split-Path -Leaf } else { $file = Split-Path $InputObject.Link -Leaf | Select-Object -Last 1 } } else { Stop-PSFFunction -EnableException:$EnableException -Message "Could not find file on $computer and couldn't find it online. Try piping in exactly what you'd like from Get-KbUpdate." -Continue } if ((Test-Path -Path "$home\Downloads\$file")) { $updatefile = Get-ChildItem -Path "$home\Downloads\$file" } else { if ($PSCmdlet.ShouldProcess($computer, "File not detected, downloading now to $home\Downloads and copying to remote computer")) { $warnatbottom = $true # fix for SYSTEM which doesn't have a downloads directory by default Write-PSFMessage -Level Verbose -Message "Checking for home downloads directory" if (-not (Test-Path -Path "$home\Downloads")) { Write-PSFMessage -Level Warning -Message "Creating Downloads directory at $home\Downloads" $null = New-Item -ItemType Directory -Force -Path "$home\Downloads" } $updatefile = $InputObject | Select-Object -First 1 | Save-KbUpdate -Path "$home\Downloads" } } } if (-not $PSBoundParameters.FilePath) { $FilePath = "$programhome\Downloads\$(Split-Path -Leaf $updateFile)" } if ($item.IsLocalhost) { $remotefile = $updatefile } else { $remotefile = "$programhome\Downloads\$(Split-Path -Leaf $updateFile)" } # copy over to destination server unless # it's local or it's on a network share if (-not "$($PSBoundParameters.FilePath)".StartsWith("\\") -and -not $item.IsLocalhost) { Write-PSFMessage -Level Verbose -Message "Update is not located on a file server and not local, copying over the remote server" try { $exists = Invoke-PSFCommand -ComputerName $computer -ArgumentList $remotefile -ScriptBlock { Get-ChildItem -Path $args -ErrorAction SilentlyContinue } if (-not $exists) { $null = Copy-Item -Path $updatefile -Destination $remotefile -ToSession $remotesession -ErrorAction Stop $deleteremotefile = $remotefile } } catch { $null = Invoke-PSFCommand -ComputerName $computer -ArgumentList $remotefile -ScriptBlock { Remove-Item $args -Force -ErrorAction SilentlyContinue } try { Write-PSFMessage -Level Warning -Message "Copy failed, trying again" $null = Copy-Item -Path $updatefile -Destination $remotefile -ToSession $remotesession -ErrorAction Stop $deleteremotefile = $remotefile } catch { $null = Invoke-PSFCommand -ComputerName $computer -ArgumentList $remotefile -ScriptBlock { Remove-Item $args -Force -ErrorAction SilentlyContinue } Stop-PSFFunction -EnableException:$EnableException -Message "Could not copy $updatefile to $remotefile" -ErrorRecord $PSItem -Continue } } } else { Stop-PSFFunction -EnableException:$EnableException -Message "Could not find $HotfixId and no file was specified" -Continue } } # if user doesnt add kb, try to find it for them from the provided filename if (-not $PSBoundParameters.HotfixId) { $HotfixId = $FilePath.ToUpper() -split "\-" | Where-Object { $psitem.Startswith("KB") } } # i probably need to fix some logic but until then, check a few things if ($item.IsLocalHost) { if ($updatefile) { $FilePath = $updatefile } else { $updatefile = Get-ChildItem -Path $FilePath } if (-not $PSBoundParameters.Title) { Write-PSFMessage -Level Verbose -Message "Trying to get Title from $($updatefile.FullName)" $Title = $updatefile.VersionInfo.ProductName } } else { $FilePath = $remotefile } if ($FilePath.EndsWith("exe")) { if (-not $PSBoundParameters.ArgumentList -and $FilePath -match "sql") { $ArgumentList = "/action=patch /AllInstances /quiet /IAcceptSQLServerLicenseTerms" } else { # Setting a default argumentlist that hopefully works for most things? $ArgumentList = "/install /quiet /notrestart" } if (-not $Guid) { if ($InputObject) { $Guid = $PSBoundParameters.InputObject.Guid $Title = $PSBoundParameters.InputObject.Title } else { if ($true) { try { $hotfixid = $guid = $null Write-PSFMessage -Level Verbose -Message "Trying to get Title from $($updatefile.FullName)" $updatefile = Get-ChildItem -Path $updatefile.FullName -ErrorAction SilentlyContinue $Title = $updatefile.VersionInfo.ProductName Write-PSFMessage -Level Verbose -Message "Trying to get GUID from $($updatefile.FullName)" <# The reason you want to find the GUID is to save time, mostly, I guess? It saves time because it won't even attempt the install if there are GUID matches in the registry. If you pass a fake but compliant GUID, it attempts the install and fails, no big deal. Overall, it just seems like a good idea to get a GUID if it's required. #> <# It's better to just read from memory but I can't get this to work $cab = New-Object Microsoft.Deployment.Compression.Cab.Cabinfo "C:\path\path.exe" $file = New-Object Microsoft.Deployment.Compression.Cab.CabFileInfo($cab, "0") $content = $file.OpenRead() #> $cab = New-Object Microsoft.Deployment.Compression.Cab.Cabinfo $updatefile.FullName $files = $cab.GetFiles("*") $index = $files | Where-Object Name -eq 0 if (-not $index) { $index = $files | Where-Object Name -match "none.xml| ParameterInfo.xml" } $temp = Get-PSFPath -Name Temp $indexfilename = $index.Name $xmlfile = Join-Path -Path $temp -ChildPath "$($updatefile.BaseName).xml" $null = $cab.UnpackFile($indexfilename, $xmlfile) if ((Test-Path -Path $xmlfile)) { $xml = [xml](Get-Content -Path $xmlfile) $tempguid = $xml.BurnManifest.Registration.Id } if (-not $tempguid -and $xml.MsiPatch.PatchGUID) { $tempguid = $xml.MsiPatch.PatchGUID } if (-not $tempguid -and $xml.Setup.Items.Patches.MSP.PatchCode) { $tempguid = $xml.Setup.Items.Patches.MSP.PatchCode } Get-ChildItem -Path $xmlfile -ErrorAction SilentlyContinue | Remove-Item -Confirm:$false -ErrorAction SilentlyContinue # if we can't find the guid, use one that we know # is valid but not associated with any hotfix if (-not $tempguid) { $tempguid = "DAADB00F-DAAD-B00F-B00F-DAADB00FB00F" } $guid = ([guid]$tempguid).Guid } catch { $guid = "DAADB00F-DAAD-B00F-B00F-DAADB00FB00F" } Write-PSFMessage -Level Verbose -Message "GUID is $guid" } } } # this takes care of things like SQL Server updates $hotfix = @{ Name = 'Package' ModuleName = 'PSDesiredStateConfiguration' Property = @{ Ensure = 'Present' ProductId = $Guid Name = $Title Path = $FilePath Arguments = $ArgumentList ReturnCode = 0, 3010 } } } else { # this takes care of WSU files $hotfix = @{ Name = 'xHotFix' ModuleName = 'xWindowsUpdate' Property = @{ Ensure = 'Present' Id = $HotfixId Path = $FilePath } } if ($PSDscRunAsCredential) { $hotfix.Property.PSDscRunAsCredential = $PSDscRunAsCredential } } if ($PSCmdlet.ShouldProcess($computer, "Installing file from $FilePath")) { try { Invoke-PSFCommand -ScriptBlock { param ( $Hotfix, $VerbosePreference, $ManualFileName ) $PSDefaultParameterValues['*:ErrorAction'] = 'SilentlyContinue' $ErrorActionPreference = "Stop" if (-not (Get-Command Invoke-DscResource)) { throw "Invoke-DscResource not found on $env:ComputerName" } $null = Import-Module xWindowsUpdate -Force Write-Verbose -Message "Installing $($hotfix.property.id) from $($hotfix.property.path)" try { if (-not (Invoke-DscResource @hotfix -Method Test)) { Invoke-DscResource @hotfix -Method Set -ErrorAction Stop } } catch { $message = "$_" # Unsure how to figure out params, try another way if ($message -match "The return code 1 was not expected.") { try { Write-Verbose -Message "Retrying install with /quit parameter" $hotfix.Property.Arguments = "/quiet" Invoke-DscResource @hotfix -Method Set -ErrorAction Stop } catch { $message = "$_" } } switch ($message) { # some things can be ignored { $message -match "Serialized XML is nested too deeply" -or $message -match "Name does not match package details" } { $null = 1 } { $message -match "2359302" } { throw "Error 2359302: update is already installed on $env:ComputerName" } { $message -match "could not be started" } { throw "The install coult not initiate. The $($hotfix.Property.Path) on $env:ComputerName may be corrupt or only partially downloaded. Delete it and try again." } { $message -match "2042429437" } { throw "Error -2042429437. Configuration is likely not correct. The requested features may not be installed or features are already at a higher patch level." } { $message -match "2068709375" } { throw "Error -2068709375. The exit code suggests that something is corrupt. See if this tutorial helps: http://www.sqlcoffee.com/Tips0026.htm" } { $message -match "2067919934" } { throw "Error -2067919934 You likely need to reboot $env:ComputerName." } { $message -match "2147942402" } { throw "System can't find the file specified for some reason." } default { throw } } } } -ArgumentList $hotfix, $VerbosePreference, $PSBoundParameters.FileName -ErrorAction Stop if ($deleteremotefile) { Write-PSFMessage -Level Verbose -Message "Deleting $deleteremotefile" $null = Invoke-PSFCommand -ComputerName $computer -ArgumentList $deleteremotefile -ScriptBlock { Get-ChildItem -ErrorAction SilentlyContinue $args | Remove-Item -Force -ErrorAction SilentlyContinue -Confirm:$false } } Write-Verbose -Message "Finished installing, checking status" $exists = Get-KbInstalledUpdate -ComputerName $computer -Pattern $hotfix.property.id -IncludeHidden if ($exists.Summary -match "restart") { $status = "This update requires a restart" } else { $status = "Install successful" } if ($HotfixId) { $id = $HotfixId } else { $id = $guid } if ($id -eq "DAADB00F-DAAD-B00F-B00F-DAADB00FB00F") { $id = $null } [pscustomobject]@{ ComputerName = $computer Title = $Title ID = $id Status = $Status FileName = $updatefile.Name } | Select-DefaultView -Property ComputerName, Title, Status, FileName, Id } catch { if ("$PSItem" -match "Serialized XML is nested too deeply") { Write-PSFMessage -Level Verbose -Message "Serialized XML is nested too deeply. Forcing output." $exists = Get-KbInstalledUpdate -ComputerName $computer -HotfixId $hotfix.property.id if ($exists.Summary -match "restart") { $status = "This update requires a restart" } else { $status = "Install successful" } if ($HotfixId) { $id = $HotfixId } else { $id = $guid } if ($id -eq "DAADB00F-DAAD-B00F-B00F-DAADB00FB00F") { $id = $null } [pscustomobject]@{ ComputerName = $computer Title = $Title ID = $id Status = $Status FileName = $updatefile.Name } | Select-DefaultView -Property ComputerName, Title, Status, FileName, Id } else { Stop-PSFFunction -Message "Failure on $computer" -ErrorRecord $_ -EnableException:$EnableException } } } } } } end { if ($warnatbottom) { Write-PSFMessage -Level Output -Message "Downloaded files may still exist on your local drive and other servers as well, in the Downloads directory." Write-PSFMessage -Level Output -Message "If you ran this as SYSTEM, the downloads will be in windows\system32\config\systemprofile." } } } # SIG # Begin signature block # MIIjZQYJKoZIhvcNAQcCoIIjVjCCI1ICAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUKE0ZVk03QPrn8rkSCw06Eeer # qi+ggh2DMIIFGjCCBAKgAwIBAgIQAwW7hiGwoWNfv96uEgTnbTANBgkqhkiG9w0B # AQsFADByMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD # VQQLExB3d3cuZGlnaWNlcnQuY29tMTEwLwYDVQQDEyhEaWdpQ2VydCBTSEEyIEFz # c3VyZWQgSUQgQ29kZSBTaWduaW5nIENBMB4XDTIwMDUxMjAwMDAwMFoXDTIzMDYw # ODEyMDAwMFowVzELMAkGA1UEBhMCVVMxETAPBgNVBAgTCFZpcmdpbmlhMQ8wDQYD # VQQHEwZWaWVubmExETAPBgNVBAoTCGRiYXRvb2xzMREwDwYDVQQDEwhkYmF0b29s # czCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALy/Y3ur47++CAG2mOa1 # 6h8WjXjSTvcldDmw4PpAvOOCKNr6xyhg/FOYVIiaeq2N9kVaa5wBawOIxVWuj/rI # aOxeYklQDugPkGUx0Ap+6KrjnnxgE6ONzQGnc1tjlka6N0KazD2WodEBWKXo/Vmk # C/cP9PJVWroCMOwlj7GtEv2IxzxikPm2ICP5KxFK5PmrA+5bzcHJEeqRonlgMn9H # zZkqHr0AU1egnfEIlH4/v6lry1t1KBF/bnDhl9g/L0icS+ychFVkx4OOO4a+qvT8 # xqvvdQjv3PQ1hbzTI3/tXOWu9XxGeeIdZjaJv16FmWKCnloSp1Xb9cVU9XhIpomz # xH0CAwEAAaOCAcUwggHBMB8GA1UdIwQYMBaAFFrEuXsqCqOl6nEDwGD5LfZldQ5Y # MB0GA1UdDgQWBBTwwKD7tgOAQ077Cdfd33qxy+OeIjAOBgNVHQ8BAf8EBAMCB4Aw # EwYDVR0lBAwwCgYIKwYBBQUHAwMwdwYDVR0fBHAwbjA1oDOgMYYvaHR0cDovL2Ny # bDMuZGlnaWNlcnQuY29tL3NoYTItYXNzdXJlZC1jcy1nMS5jcmwwNaAzoDGGL2h0 # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9zaGEyLWFzc3VyZWQtY3MtZzEuY3JsMEwG # A1UdIARFMEMwNwYJYIZIAYb9bAMBMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3 # LmRpZ2ljZXJ0LmNvbS9DUFMwCAYGZ4EMAQQBMIGEBggrBgEFBQcBAQR4MHYwJAYI # KwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBOBggrBgEFBQcwAoZC # aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0U0hBMkFzc3VyZWRJ # RENvZGVTaWduaW5nQ0EuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQAD # ggEBAI/N+XCVDB/WNqQSrKY85zScHGJjsXgXByYvsitMuG5vo+ODhlh+ILv0CTPl # o2Wo75MnSSqCWR+c6xyN8pDPMPBxm2EtVmXzeKDMIudYyjxmT8PZ3hktj16wXCo8 # 2+65UOse+CHsfoMn/M9WbkQ4rSyWNPRRDodATC2i4flLyeuoIZnyMoz/4N4mWb6s # IAYZ/tNXzm6qwCfkmoMSf9tcTUCXIbVDliJcUZLlJ/SpLg2KzDu9GtnpBzg3AG3L # hwBiPMM8OLGitYjz4VU5RYox0vu1XyLf3f9fKTCxxwKy0EKntWdJk37i+DOMQlCq # Xm5B/KyNxb2utv+qLGlyw9MphEcwggUwMIIEGKADAgECAhAECRgbX9W7ZnVTQ7Vv # lVAIMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp # Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0Rp # Z2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMzEwMjIxMjAwMDBaFw0yODEw # MjIxMjAwMDBaMHIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMx # GTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNI # QTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUA # A4IBDwAwggEKAoIBAQD407Mcfw4Rr2d3B9MLMUkZz9D7RZmxOttE9X/lqJ3bMtdx # 6nadBS63j/qSQ8Cl+YnUNxnXtqrwnIal2CWsDnkoOn7p0WfTxvspJ8fTeyOU5JEj # lpB3gvmhhCNmElQzUHSxKCa7JGnCwlLyFGeKiUXULaGj6YgsIJWuHEqHCN8M9eJN # YBi+qsSyrnAxZjNxPqxwoqvOf+l8y5Kh5TsxHM/q8grkV7tKtel05iv+bMt+dDk2 # DZDv5LVOpKnqagqrhPOsZ061xPeM0SAlI+sIZD5SlsHyDxL0xY4PwaLoLFH3c7y9 # hbFig3NBggfkOItqcyDQD2RzPJ6fpjOp/RnfJZPRAgMBAAGjggHNMIIByTASBgNV # HRMBAf8ECDAGAQH/AgEAMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEF # BQcDAzB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDCBgQYDVR0fBHoweDA6oDig # NoY0aHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9v # dENBLmNybDA6oDigNoY0aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 # QXNzdXJlZElEUm9vdENBLmNybDBPBgNVHSAESDBGMDgGCmCGSAGG/WwAAgQwKjAo # BggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAKBghghkgB # hv1sAzAdBgNVHQ4EFgQUWsS5eyoKo6XqcQPAYPkt9mV1DlgwHwYDVR0jBBgwFoAU # Reuir/SSy4IxLVGLp6chnfNtyA8wDQYJKoZIhvcNAQELBQADggEBAD7sDVoks/Mi # 0RXILHwlKXaoHV0cLToaxO8wYdd+C2D9wz0PxK+L/e8q3yBVN7Dh9tGSdQ9RtG6l # jlriXiSBThCk7j9xjmMOE0ut119EefM2FAaK95xGTlz/kLEbBw6RFfu6r7VRwo0k # riTGxycqoSkoGjpxKAI8LpGjwCUR4pwUR6F6aGivm6dcIFzZcbEMj7uo+MUSaJ/P # QMtARKUT8OZkDCUIQjKyNookAv4vcn4c10lFluhZHen6dGRrsutmQ9qzsIzV6Q3d # 9gEgzpkxYz0IGhizgZtPxpMQBvwHgfqL2vmCSfdibqFT+hKUGIUukpHqaGxEMrJm # oecYpJpkUe8wggWxMIIEmaADAgECAhABJAr7HjgLihbxS3Gd9NPAMA0GCSqGSIb3 # DQEBDAUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX # BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3Vy # ZWQgSUQgUm9vdCBDQTAeFw0yMjA2MDkwMDAwMDBaFw0zMTExMDkyMzU5NTlaMGIx # CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 # dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBH # NDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL/mkHNo3rvkXUo8MCIw # aTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/zG6Q4FutWxpdtHauyefLK # EdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZanMylNEQRBAu34LzB4Tm # dDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7sWxq868nPzaw0QF+xembu # d8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL2pNe3I6PgNq2kZhAkHnD # eMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfbBHMqbpEBfCFM1LyuGwN1 # XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3JFxGj2T3wWmIdph2PVld # QnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3cAORFJYm2mkQZK37AlLTS # YW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqxYxhElRp2Yn72gLD76GSm # M9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0viastkF13nqsX40/ybzT # QRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aLT8LWRV+dIPyhHsXAj6Kx # fgommfXkaS+YHS312amyHeUbAgMBAAGjggFeMIIBWjAPBgNVHRMBAf8EBTADAQH/ # MB0GA1UdDgQWBBTs1+OC0nFdZEzfLmc/57qYrhwPTzAfBgNVHSMEGDAWgBRF66Kv # 9JLLgjEtUYunpyGd823IDzAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYB # BQUHAwgweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k # aWdpY2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0 # LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwRQYDVR0fBD4wPDA6oDig # NoY0aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9v # dENBLmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZI # hvcNAQEMBQADggEBAJoWAqUB74H7DbRYsnitqCMZ2XM32mCeUdfL+C9AuaMffEBO # Mz6QPOeJAXWF6GJ7HVbgcbreXsY3vHlcYgBN+El6UU0GMvPF0gAqJyDqiS4VOeAs # Pvh1fCyCQWE1DyPQ7TWV0oiVKUPL4KZYEHxTjp9FySA3FMDtGbp+dznSVJbHphHf # NDP2dVJCSxydjZbVlWxHEhQkXyZB+hpGvd6w5ZFHA6wYCMvL22aJfyucZb++N06+ # LfOdSsPMzEdeyJWVrdHLuyoGIPk/cuo260VyknopexQDPPtN1khxehARigh0zWwb # BFzSipUDdlFQU9Yu90pGw64QLHFMsIe2JzdEYEQwggauMIIElqADAgECAhAHNje3 # JFR82Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYD # VQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAf # BgNVBAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBa # Fw0zNzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy # dCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNI # QTI1NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVC # X6SI82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf # 69o9xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvb # REGJ3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5 # EmfvDqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbw # sDETqVcplicu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb # 7IHeIhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqW # c0Jon7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxm # SVJQ9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+ # s4/TXkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11G # deJgo1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCC # AVkwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxq # II+eyG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/ # BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggr # BgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVo # dHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0 # LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v # RGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjAL # BglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tgh # QuGwGC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qE # ICU0MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqr # hc1DX+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8o # VInw1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SN # oOeY+/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1Os # Ox0ISQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS # 1yZr5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr # 2H7yRp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1V # wDophrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL5 # 0CN/AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK # 5xMOHds3OBqhK/bt1nz8MIIGxjCCBK6gAwIBAgIQCnpKiJ7JmUKQBmM4TYaXnTAN # BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs # IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy # NTYgVGltZVN0YW1waW5nIENBMB4XDTIyMDMyOTAwMDAwMFoXDTMzMDMxNDIzNTk1 # OVowTDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSQwIgYD # VQQDExtEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMiAtIDIwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC5KpYjply8X9ZJ8BWCGPQz7sxcbOPgJS7SMeQ8QK77 # q8TjeF1+XDbq9SWNQ6OB6zhj+TyIad480jBRDTEHukZu6aNLSOiJQX8Nstb5hPGY # Pgu/CoQScWyhYiYB087DbP2sO37cKhypvTDGFtjavOuy8YPRn80JxblBakVCI0Fa # +GDTZSw+fl69lqfw/LH09CjPQnkfO8eTB2ho5UQ0Ul8PUN7UWSxEdMAyRxlb4pgu # j9DKP//GZ888k5VOhOl2GJiZERTFKwygM9tNJIXogpThLwPuf4UCyYbh1RgUtwRF # 8+A4vaK9enGY7BXn/S7s0psAiqwdjTuAaP7QWZgmzuDtrn8oLsKe4AtLyAjRMruD # +iM82f/SjLv3QyPf58NaBWJ+cCzlK7I9Y+rIroEga0OJyH5fsBrdGb2fdEEKr7mO # CdN0oS+wVHbBkE+U7IZh/9sRL5IDMM4wt4sPXUSzQx0jUM2R1y+d+/zNscGnxA7E # 70A+GToC1DGpaaBJ+XXhm+ho5GoMj+vksSF7hmdYfn8f6CvkFLIW1oGhytowkGvu # b3XAsDYmsgg7/72+f2wTGN/GbaR5Sa2Lf2GHBWj31HDjQpXonrubS7LitkE956+n # GijJrWGwoEEYGU7tR5thle0+C2Fa6j56mJJRzT/JROeAiylCcvd5st2E6ifu/n16 # awIDAQABo4IBizCCAYcwDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYD # VR0lAQH/BAwwCgYIKwYBBQUHAwgwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZI # AYb9bAcBMB8GA1UdIwQYMBaAFLoW2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQW # BBSNZLeJIf5WWESEYafqbxw2j92vDTBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8v # Y3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2 # VGltZVN0YW1waW5nQ0EuY3JsMIGQBggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hB # MjU2VGltZVN0YW1waW5nQ0EuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQANLSN0ptH1 # +OpLmT8B5PYM5K8WndmzjJeCKZxDbwEtqzi1cBG/hBmLP13lhk++kzreKjlaOU7Y # hFmlvBuYquhs79FIaRk4W8+JOR1wcNlO3yMibNXf9lnLocLqTHbKodyhK5a4m1Wp # Gmt90fUCCU+C1qVziMSYgN/uSZW3s8zFp+4O4e8eOIqf7xHJMUpYtt84fMv6XPfk # U79uCnx+196Y1SlliQ+inMBl9AEiZcfqXnSmWzWSUHz0F6aHZE8+RokWYyBry/J7 # 0DXjSnBIqbbnHWC9BCIVJXAGcqlEO2lHEdPu6cegPk8QuTA25POqaQmoi35komWU # EftuMvH1uzitzcCTEdUyeEpLNypM81zctoXAu3AwVXjWmP5UbX9xqUgaeN1Gdy4b # esAzivhKKIwSqHPPLfnTI/KeGeANlCig69saUaCVgo4oa6TOnXbeqXOqSGpZQ65f # 6vgPBkKd3wZolv4qoHRbY2beayy4eKpNcG3wLPEHFX41tOa1DKKZpdcVazUOhdbg # LMzgDCS4fFILHpl878jIxYxYaa+rPeHPzH0VrhS/inHfypex2EfqHIXgRU4SHBQp # WMxv03/LvsEOSm8gnK7ZczJZCOctkqEaEf4ymKZdK5fgi9OczG21Da5HYzhHF1tv # E9pqEG4fSbdEW7QICodaWQR2EaGndwITHDGCBUwwggVIAgEBMIGGMHIxCzAJBgNV # BAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdp # Y2VydC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2Rl # IFNpZ25pbmcgQ0ECEAMFu4YhsKFjX7/erhIE520wCQYFKw4DAhoFAKB4MBgGCisG # AQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFBXL # Dc9A5IEbc1IvG1fz5wLEazVcMA0GCSqGSIb3DQEBAQUABIIBACk2JmHJtlqvN9z3 # s/s58UwlxIipIu5IUDnwmzQLSvgxWtEj9b6H7WPxTGQdio8S/L8qsz/4lwIb1U2D # y8AbZMbniuk7ozIwEqH94fA5oLkSjnOUXxbQ3V5u+a+5jI/HXaxFMRoEhaGHd1XQ # WKtcfy+1biJKbW5tq5++m8u3TLYwUWSvMyqd6DnLFGo/xldUs9hTWL1hUn6C8vKU # B5cMPlfkG8T9qmcEF8NmTFlpsSBcvw9YibeFunYLYbk/sgiBgZKPU06Vpc2Y5Kwj # FGkadetS8+gc7JqppI7Fefs1BDTeHWxfixNgGv1UdxB5CbWuPYriIBtdEwEUrL2m # 7M1oUkOhggMgMIIDHAYJKoZIhvcNAQkGMYIDDTCCAwkCAQEwdzBjMQswCQYDVQQG # EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0 # IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAKekqI # nsmZQpAGYzhNhpedMA0GCWCGSAFlAwQCAQUAoGkwGAYJKoZIhvcNAQkDMQsGCSqG # SIb3DQEHATAcBgkqhkiG9w0BCQUxDxcNMjIwODAxMjAzMTUzWjAvBgkqhkiG9w0B # CQQxIgQgZHxwQSG2+eSoNHRU9lOIO0/9OCQ3hp0GwoNK6iFYIlcwDQYJKoZIhvcN # AQEBBQAEggIACPoY8fY+K+2MJOnrKv3NeqrP5I7OpiQCbVK3uxNq9kn/0xX59Bwo # wAOZz8QD3O1UYiT/JrjjPYz6Gp2geZu2u1XCc8iIiph9RzN6hTScBiUP2s61HmzI # 0VNaLY/xWZTM9Fd2tATACH2DnGktvX3pX5bNhYx7BaAFpOawvh54BDHV4ZWn/+Lk # jWGD6/oHjpyrqO9aMZ0zfsjbH7cuqxXp3apF6pQbY6QRpYT2lq20KB6ZqEpjpgIb # G3iqw+TfghDQi7iq3BSA0Xl9w+wDQaiO8tNJNO6ocq5mkj8N9tkh5eumWSO1vGrK # zMrnzEe+RXpxG4op80bRyyVFHUzUML4I5QDq6kCnmwerbzhwMpGAHasWZ4uIMZyy # vsryZwAHogMKNGu+yvo6ocfG6sZgJpY3xdqY8HWQhmOpqaxGw9lnboFWvNKKCCla # WwHkGm/fF50ogy6mlj8MIczP9b11iY7Jq+mdmG8iA/nFtuMY78PBaStxAPMsgr2s # cv7qgQyHZgQRWC9x4E0yL3sYdaVME0j+Kmk7f2uboD0S5fLZzqhTDPbkbItrvftw # ixD5KWkahr8gaqIZuySenrSK7+javBudkNNfFVwkYcqFqpCR38whAyvbcd7BDN9j # jE+pahblEtfw9rNL6UluJnZBnwIdXz7NnkvmgukAO1v2wMX3R68ugSI= # SIG # End signature block |