[CmdletBinding()]
param (
    [string]$OutFile,
    [string]$AltDownload,
    [string]$Proxy,
    [string]$AltHisEndpoint
)

$ErrorActionPreference = 'Stop'
$ProgressPreference = 'SilentlyContinue'
$refVersion = [version] '4.5'
$provider = 'Microsoft.HybridCompute'

# Error codes used by azcmagent are in range of [0, 125].
# Installation scripts will use [127, 255]. Check install_linux_azcmagent.sh for the codes used for Linux script.
$global:errorcode="AZCM0150"
$global:scriptPath = $myinvocation.mycommand.definition

<# Throw a structured exception#>
function Invoke-Failure
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory=$true)]
        $Message,
        [Parameter(Mandatory=$true)]
        $ErrorCode,
        [Parameter(Mandatory=$false)]
        $Details
    )

    $ex = new-object -TypeName System.Exception -ArgumentList @($Message)
    $ex.Data["Details"] = $details
    $ex.Data["ErrorCode"] = $errorcode
    throw $ex
}

function Get-HISEndpoint() {
    $hisEndpoint = "https://gbl.his.arc.azure.com"
    if ($env:CLOUD -eq "AzureUSGovernment") {
        $hisEndpoint = "https://gbl.his.arc.azure.us"
    } elseif ($env:CLOUD -eq "AzureChinaCloud") {
        $hisEndpoint = "https://gbl.his.arc.azure.cn"
    } elseif ($env:CLOUD -eq "AzureStackCloud") {
        if ($AltHisEndpoint) {
            $hisEndpoint = $AltHisEndpoint
        }
        else {
            Write-Warning "Invalid his endpoint, using default gbl.his.arc.azure.com"
            return $hisEndpoint
        }
    }

    return $hisEndpoint
}

function Test-AzureStackHCI() {
    [CmdletBinding()]
    param (
    )

    try {
        $product=Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName | select -ExpandProperty ProductName
    }
    catch {
        Write-Verbose -Message "Error $_ Unable to determine product SKU from registry" -Verbose
        # Will attempt to install anyway
        return $false
    }
    if ($product -eq 'Azure Stack HCI') {
        return $true
    }
    return $false
}

function Test-PowerShellVersion() {
    [CmdletBinding()]
    param (
    )

    Write-Verbose -Message "PowerShell version: $($PSVersionTable.PSVersion)" -Verbose
    return ($PSVersionTable.PSVersion -ge [Version]"3.0")
}

function Test-DotNetFramework() {
    [CmdletBinding()]
    param (
    )

    try {
        $installedVersion = [version] (Get-ItemProperty -LiteralPath 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' -Name Version | select -ExpandProperty Version)
    }
    catch {
        Write-Verbose -Message "Error $_ Unable to determine .NET Framework version" -Verbose
        # Will attempt to install anyway
        return $true
    }
    Write-Verbose -Message ".NET Framework version: $installedVersion" -Verbose
    if ($installedVersion -ge $refVersion) {
        return $true
    }
    return $false
}

function Test-IsAzure() {
    Write-Verbose -Message "Checking if this is an Azure virtual machine" -Verbose

    $DfWebProxy = [System.Net.WebRequest]::DefaultWebProxy

    try {
        # HCI sets [system.net.webrequest]::defaultwebproxy before calling our script. Even the older PowerShell picks this up.
        # As a workaround we temporarily override this defaultwebproxy so that the IMDS call does not get redirected to the proxy.
        [System.Net.WebRequest]::DefaultWebProxy = $null
        
        if ($PSVersionTable.PSVersion -ge [Version]"6.0") {
            $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -NoProxy -TimeoutSec 1 -ErrorAction SilentlyContinue
        } else {
            $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -TimeoutSec 1 -ErrorAction SilentlyContinue
        }
        if ($null -ne $response -and $response.StatusCode -eq 200) {
            $content = ConvertFrom-Json $($response.Content.ToString())
            if ($null -ne $content.resourceId) {
                Write-Verbose -Message "Azure check indicates that we are in Azure" -Verbose
                return $true
            }
        }
    }
    catch {
        Write-Verbose -Message "Error $_ checking if we are in Azure" -Verbose
        return $false
    }
    finally {
        [System.Net.WebRequest]::DefaultWebProxy = $DfWebProxy
    }
    return $false
}

function Get-MsiLogSummary() {
    [CmdletBinding()]
    param(
        [Parameter(Mandatory=$true)]
        [string]$LogPath
    )

    try
    {
        $LogPath = Resolve-Path $LogPath
        Write-Verbose -Message "Reading Logs from $LogPath" -Verbose

        $patterns = @(
            "Installation success or error status",
            "Product: Azure Connected Machine Agent"
        );

        $regex = "(" + ($patterns -join ")|(" ) + ")"

        Write-Verbose -Message "Looking for Patterns: $regex" -Verbose

        $inCustomAction = $false
        $logCustomAction = $false
        $inLockDownDirectory = $false
        $caOutput = new-object -TypeName System.Collections.ArrayList
        Get-Content $LogPath | % {
            # log interesting lines
            if ( ($_ -match $regex)) {
                $_ # output to pipeline
            }

            # Wix custom actions start with "Calling custom Action". Gather the log from the CA till we see if it passed
            # At the end, log that output only if it failed with "returned actual error"
            if ($_ -match "Calling custom action") {
                $inCustomAction = $true
                $logCustomAction = $false
                $inLockDownDirectory = ($_ -match "LockDownDirectory")
            }
            if ($_ -match "MSI \(s\)") {
                $inCustomAction = $false 
            }
            if ($_ -match "returned actual error") {
                $logCustomAction = $true
            }
            if ($inCustomAction -and -not $inLockDownDirectory) {
                $null = $caOutput.Add($_)
            }
            if ($inCustomAction -and $inLockDownDirectory) {
                if ($_ -match "Unable to lock path" -or $_ -match "Failed to lock down directory" -or $_ -like "Unkown path*locking error") {
                    $null = $caOutput.Add($_)
                }
            }
            if (-not $inCustomAction) {
                if($logCustomAction) {
                    $caOutput # output saved lines to pipeline
                }
                $caOutput.Clear()
            }
        }
    } catch {
        # This code is optional so if something goes wrong we'll just swallow the error and have no details
        Write-Verbose -Message "Error while parsing MSI log: $_" -Verbose
    }
}

function Send-Failure
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [System.Exception] $Error,

        [Parameter(Mandatory = $true)]
        [string] $ErrorCode,

        [Parameter(Mandatory = $false)]
        [string] $AltHisEndpoint

    )

    $hisEndpoint = Get-HISEndpoint

    $message = "$Error"
    if ($Error.Data["Details"]) {
        $message = $Error.Data["Details"]
    }
    $message = $message.Substring(0, [Math]::Min($message.Length, 500))

    if ( $env:PROVIDER_NAMESPACE ) {
        $provider = $env:PROVIDER_NAMESPACE
    }
    $logBody = @{subscriptionId="$env:SUBSCRIPTION_ID";resourceGroup="$env:RESOURCE_GROUP";tenantId="$env:TENANT_ID";location="$env:LOCATION";correlationId="$env:CORRELATION_ID";authType="$env:AUTH_TYPE";operation="onboarding";namespace="$provider";osType="windows";messageType="$ErrorCode";message="$message";}
    
    try {
        Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -ErrorAction SilentlyContinue
    } catch {}
}

# Based on the MSI error code, we may have some hint to provide as to the issue
# See https://learn.microsoft.com/en-us/windows/win32/msi/error-codes
function Get-MsiErrorDetails() {
    [CmdletBinding()]
    param(
        $exitCode
    )

    $message = (net helpmsg $exitCode) -join ""
    $hint = ""
    $errorCode = "AZCM0149" # exitCode is the return value from msiexec. errorCode is the error code of the script
    switch($exitCode) {
        112 {
            $hint = "Insufficient disk space"
            $errorCode = "AZCM0158"
        }
        1603 {
            # ERROR_INSTALL_FAILURE
            $hint = "A fatal error occurred during installation"
            $errorCode = "AZCM0156"
        }
        1618 {
            # ERROR_INSTALL_ALREADY_RUNNING
            $hint = "Another installation is already in progress. Please wait for the other installation to complete and then try again."
            $errorCode = "AZCM0159"
        }
        1622 {
            # ERROR_INSTALL_LOG_FAILURE
            $hint = "Error opening log file"
            $errorCode = "AZCM0160"
        }
        1633 {
            # ERROR_INSTALL_PLATFORM_UNSUPPORTED 
            $hint = "Unsupported: Azure Connected Machine Agent is only compatible with X64 operating systems"
            $errorCode = "AZCM0153"
        }
    }
    return [PSCustomObject]@{
        Message = $message
        Hint = $hint
        ErrorCode = $errorCode
    }
}

function CheckRSOPLogonRights {
    # Checks RSOP to see if a group policy may prevent himds from running
   
    # Support PS 1-2 for initial requirements check even though PS4 is required for product
    if ($PSVersionTable.PSVersion.Major -ge 3) {
        $securitySettings = Get-CimInstance -Namespace "root/RSOP/Computer" -ClassName "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror"
    }
    else {
        $securitySettings = Get-WmiObject -Namespace "root/RSOP/Computer" -Class "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror"
    }

    if ($rsoperror -ne $null) {
        Write-Warning "Unable to retrieve RSOP data to check local security policy."
        return
    }

    # Find the RSOP results for SeLogonAsAService, might be empty
    $logonAsServicePolicy = $securitySettings | Where-Object { $_.UserRight -eq "SeServiceLogonRight" }
    $logonAsServicePrincipals = $logonAsServicePolicy | Select-Object -ExpandProperty AccountList

    # If the list is empty, contains NT SERVICE\ALL SERVICES (default), or contains NT SERVICE\himds then our service can run
    if ($logonAsServicePrincipals -and `
        $logonAsServicePrincipals -notcontains "NT SERVICE\ALL SERVICES" -and `
        $logonAsServicePrincipals -notcontains "NT SERVICE\himds" -and `
        $logonAsServicePrincipals -notcontains "S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083") {
       
        Write-Warning "The local security policy on this system will prevent the agent from loading. Contact your Group Policy administrator to ensure 'NT SERVICE\ALL SERVICES' is included in any Group Policy Objects that configure the Logon as a Service User Rights Assignment. See https://aka.ms/ArcServerURA for more information."
        Write-Warning "GPO ID: $($logonAsServicePolicy.GPOID)"
    }
}

function Test-PhysicalMemory() {
    [CmdletBinding()]
    param ()

    try
    {
        $memory = (Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum / 1MB
    }
    catch {
        $memory = "Unknown"
    }
    Write-Verbose -Message "Total Physical Memory: $memory MB" -Verbose
}

function Download-With-Retries() {
    [CmdletBinding()]
    param (
        [Parameter(Mandatory=$true)][string]$downloadUri,
        [Parameter(Mandatory=$false)][int]$maxAttempts = 3
    )

    $attempts=1
    do {
        try {
            if (([Uri]$downloadUri).Scheme -in @("https","http"))
            {
                Write-Verbose -Message "Downloading agent package from $downloadUri to $msiFile" -Verbose

                # It's a web site, download it
                if ($Proxy) {
                    Invoke-WebRequest -UseBasicParsing -Proxy $Proxy -Uri $downloadUri -OutFile $msiFile
                } else {
                    Invoke-WebRequest -UseBasicParsing -Uri $downloadUri -OutFile $msiFile
                }
            } else {
                # This could be a UNC path or a local file, just try and copy it
                Write-Verbose -Message "Copying agent package from $downloadUri to $msiFile" -Verbose
            
                Copy-Item $downloadUri $msiFile
            }
            return
        } catch {
            $attempts++
            Write-Verbose -Message "Download failure: $_ ..Retrying..." -Verbose
        }
    } while ($attempts -le $maxAttempts)

    Invoke-Failure -ErrorCode "AZCM0148" -Message "Download of $downloadUri failed: $_"
}

function Is-Interactive {
    return [System.Environment]::UserInteractive
}

# Spawns a new pwsh process to run the script with elevated permissions. The original process will exit immediately after spawning the elevated process.
function Restart-AsAdmin {
    # Check if we should use pwsh or powershell
    # For PowerShell 6 and later, use 'pwsh'. Otherwise use 'powershell'.
    $pwshCommand = "powershell"
    if ($PSVersionTable.PSVersion.Major -ge 6) {
        $pwshCommand = "pwsh"
    }

    try {
        Write-Host "This script requires administrator permissions to install the Azure Connected Machine Agent. Attempting to restart script with elevated permissions..."
        $additionalArgs =  " -OutFile '$OutFile' -AltDownload '$AltDownload' -Proxy '$Proxy' -AltHisEndpoint '$AltHisEndpoint'"
        if ($VerbosePreference -eq "Continue") {
            $additionalArgs += " -Verbose"
        }
        # -NoExit is so that the elevated powershell window doesn't close immediately after the script finishes. This way users can still see the output.
        $arguments = "-NoExit -Command `"& '$scriptPath' $additionalArgs`""
        Start-Process $pwshCommand -Verb runAs -ArgumentList $arguments
        exit 0
    } catch {
        Invoke-Failure -Message "Failed to elevate permissions. Please run this script as Administrator." -ErrorCode "AZCM0155"
    }
}

try {
    #Check if PowerShell is running as administrator
    if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) {
        if (Is-Interactive) {
            Restart-AsAdmin
        } else {
            Invoke-Failure -Message "This script requires administrator permissions to install the Azure Connected Machine Agent. Please run this script as Administrator." -ErrorCode "AZCM0155"
        }
    }

    # Ensure TLS 1.2 is accepted. Older PowerShell builds (sometimes) complain about the enum "Tls12" so we use the underlying value
    [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072
    # Ensure TLS 1.3 is accepted, if this .NET supports it (older versions don't)
    try { [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 12288 } catch {}
    
    Write-Verbose -Message "Installing Azure Connected Machine Agent" -Verbose

    $validPowerShell = Test-PowerShellVersion
    if (-Not $validPowerShell) {
        Invoke-Failure -Message "Azure Connected Machine Agent requires PowerShell version 3.0 or later" -ErrorCode "AZCM0154"
    }
    
    Test-PhysicalMemory

    $hci = Test-AzureStackHCI
    if ($hci) {
        Invoke-Failure -Message "This server is running Azure Stack HCI and should be connected to Azure Arc using the built-in registration experience: https://aka.ms/install-arc-on-hci-host" -ErrorCode "AZCM0152"
    }

    $validFramework = Test-DotNetFramework
    if (-Not $validFramework) {
        Invoke-Failure -Message "Azure Connected Machine Agent requires .NET Framework version $refVersion or later" -ErrorCode "AZCM0151"
    }
    
    $inAzure = Test-IsAzure
    if ($inAzure) {
        $override = [System.Environment]::GetEnvironmentVariable("MSFT_ARC_TEST", [System.EnvironmentVariableTarget]::Machine)
        if ('true' -eq $override) {
            Write-Warning '''Running on an Azure Virtual Machine with MSFT_ARC_TEST set.
Azure Connected Machine Agent is designed for use outside Azure.
This virtual machine should only be used for testing purposes.
See https://aka.ms/azcmagent-testwarning for more details.
'''
        } else {
            Invoke-Failure -ErrorCode "AZCM0147" -Message '''Cannot install Azure Connected Machine agent on an Azure Virtual Machine.
Azure Connected Machine Agent is designed for use outside Azure.
To connect an Azure VM for TESTING PURPOSES ONLY, see https://aka.ms/azcmagent-testwarning for more details.
'''
        }
    }

    CheckRSOPLogonRights

    # Download the package
    $msiFile = Join-Path "$env:Temp" "AzureConnectedMachineAgent.msi"
        
    if ($AltDownload) {
        $downloadUri = $AltDownload
    }
    else {
        $hisEndpoint = Get-HISEndpoint
        $downloadUri = "$hisEndpoint/azcmagent/latest/AzureConnectedMachineAgent.msi" 
    }

    Download-With-Retries -downloadUri $downloadUri    
    # Install the package
    $logFile = Join-Path -Path "$env:Temp" -ChildPath "installationlog.txt"
    $argList = @("/i", "$msiFile" , "/l*v", "$logFile", "/qn", "REBOOT=ReallySuppress")
    Write-Verbose -Message "Installing agent package" -Verbose
    $exitCode = (Start-Process -FilePath msiexec.exe -ArgumentList $argList -Wait -Passthru).ExitCode
    if ($exitCode -ne 0) {
        # Treat ERROR_SUCCESS_REBOOT_INITIATED (1641) and ERROR_SUCCESS_REBOOT_REQUIRED (3010) as success
        if ($exitCode -eq 1641 -Or $exitCode -eq 3010) {
            Write-Warning -Message "Installation succeeded but a reboot is required to complete the installation."
            Write-Verbose -Message "Msiexec returned: $exitCode - treating it as success" -Verbose
        } else {
            $details = (Get-MsiErrorDetails $exitCode)
            $logInfo = ((Get-MsiLogSummary "$logFile") -join "`n")
            Invoke-Failure -Message "Installation failed: [$exitCode]: $($details.Message) $($details.Hint)`: See $logFile for additional details." -ErrorCode $details.ErrorCode -Details $logInfo
        }
    }

    # Check if we need to set proxy environment variable
    if ($PSBoundParameters.ContainsKey("Proxy")) {
        if ($Proxy) {
            Write-Verbose -Message "Setting proxy configuration: $Proxy" -Verbose
            & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config set proxy.url ${Proxy}
        } else {
            Write-Verbose -Message "Clearing proxy configuration" -Verbose
            & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config clear proxy.url
        }
    }
    
} catch {
    $code = $_.Exception.Data.ErrorCode
    $details = $_.Exception.Data.Details
    if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error 
    if ($OutFile) {
        [ordered]@{
            status  = "failed"
            error = [ordered]@{
                message = $_.Exception.Message
                code = $code
                details = $details
            }
        } | ConvertTo-Json | Out-File $OutFile
    }
    Write-Error $_ -ErrorAction Continue
    if ($details) {
        Write-Output "Details: $details"
    }
    Send-Failure $_.Exception $code $AltHisEndpoint
    exit 1
}

# Installation was successful if we got this far
if ($OutFile) {
    [ordered]@{
        status  = "success"
        message = "Installation of azcmagent completed successfully"
    } | ConvertTo-Json | Out-File $OutFile
}

Write-Host "Installation of azcmagent completed successfully"

exit 0
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBygF/ftylRCvEb
# I817QSR0WjgZnOOT6w5C12cNRJ/ff6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPyLLz6t2J31e39sZOG7txzd
# W6vPDdH2+i1Gqsvzfp6RMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdsWpyHWNiuYHSNv9k+jRdvacnq1ZisYz+VCKvHsCzb62ecbDDzriH8PI
# J6qK4veDKu6HDKoinG22nWMvR0XyDHfE9qWvYrK+rR5mIIlc7uTdn3dhcQ12aMW3
# uwI6yudLX2EF9GI0sq/0Hjpn0Fb7p+rQVqiUZ1ChRTqZcyLkDEE3kwMbAJH4FLJM
# v/+ZIUi7sMfHeGdEz1uiZpiOvKE6omW2JmnFE6U0+l031kNEVopVhCh+rWNrrOKo
# u67Kf6F9Y1PEtxu8LhdyK+G4pymjHNp5paDEyO5KaM7WsDeB7QDaU0suEOAnXxgQ
# 1ODoQsgKwqqKhMHPQmt/yVx0A50m2aGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA0Mz/T9G4u52TQVjenUSiYFm2aer8d9G/JNBvr5Y6WRwIGZurEJqBr
# GBIyMDI0MDkyOTE3MTU0NC4zMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# OEQ0MS00QkY3LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAePfvZuaHGiDIgABAAAB4zANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA3MjlaFw0yNTAxMTAxOTA3MjlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJG
# Ny1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvqQNaB5Gn5/FIFQPo3/K4Qml
# eCDMF40bkoHwz0BshZ4SiQmA6CGUyDwmaqQ2wHhaXU0RdHtwvq+U8KxYYsyHKqax
# xC7fr/yHZvHpNTgzx1VkR3pXhT6X2Cm175UX3WQ4jfl86onp5AMzBIFDlz0SU8VS
# KNMDvNXtjk9FitLgUv2nj3hOJ0KkEQfk3oA7m7zA0D+Mo73hmR+OC7uwsXxJR2tz
# UZE0STYX3UvenFH7fYWy5BNmLyGq2sWkQ5HFvJKCJAE/dwft8+V43U3KeExF/pPt
# cLUvQ9HIrL0xnpMFau7Yd5aK+TEi57WctBv87+fSPZBV3jZl/QCtcH9WrniBDwki
# 9QfRxu/JYzw+iaEWLqrYXuF7jeOGvHK+fVeLWnAc5WxsfbpjEMpNbGXbSF9At3PP
# hFVOjxwVEx1ALGUqRKehw9ap9X/gfkA9I9eTSvwJz9wya9reDgS+6kXgSttI7RQ2
# cJG/tQPGVIaLCIaSafLneaq0Bns0t4+EW3B/GnoBMiiOXwleOvf5udBZQIMJ3k5q
# nnh8Z4ZhTwrE6iGbPrTgGBPXh7exFYAGlb6hdhILIVDdJlDf8s1NVvL0Q2y4SHZQ
# hApZTuW/tyGsGscIPDSMz5bA6NhRLtjEwCFpLI5qGlu50Au9FRelCEQsWg7q07H/
# rqHOqCNJM4Rjem7joEUCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSxrg1mvjUVt6Fn
# xj56nabZiJipAzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAt76bLqnU08wRbW3v
# RrxjaEbGPqyINK6UYCzhTGaR/PEwCJziPT4ZM9sfGTX3eZDQVE9r121tFtp7NXQY
# uQSxRZMYXa0/pawN2Xn+UPjBRDvoCsU56dwKkrmy8TSw7QXKGskdnEwsI5yW93q8
# Ag86RkBiKEEf9FdzHNuKWI4Kv//fDtESewu46n/u+VckCwbOYl6wE//QRGrGMq50
# 9a4EbP+p1GUm06Xme/01mTIuKDgPmHL2nYRzXNqi2IuIecn2aWwkRxQOFiPw+dic
# mOOwLG/7InNqjZpQeIhDMxsWr4zTxzy4ER/6zfthtlDtcAXHB7YRUkBTClaOa0nd
# vfNJZMyYVa6cWvZouTq9V5LS7UzIR8S/7RsOT43eOawLBsuQz0VoOLurYe1SffPq
# TsCcRNzbx0C8t/+KipStVhPAGttEfhdUUS9ohD6Lt6wNCJxZbV0IMD8nfE6gIQJX
# rzrXWOuJqN91WDyjRan4UKDkIBS2yWA4W6JhQuBzGerOSY/aLnxkRrSubgtnKYcH
# OwgxTTIya5WYCRjFt0QOLleqVki6k+mqYPr98uMPi5vRIQS206mDSenStr8w0J+/
# +1WEm3PnCCIQgpf6zhqRrAt9j7XrEMHrg2bQegaz8bLzbe6UibgbKtRyk1nGde8T
# o5kyMj9XUCBICDxT+F4xa5lNZVQwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhE
# NDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQA9iJe7w5FDiG8py4TsYrQI6DFaeqCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6qPCfjAiGA8yMDI0MDkyOTIwMTE0MloYDzIwMjQwOTMwMjAxMTQyWjB0MDoGCisG
# AQQBhFkKBAExLDAqMAoCBQDqo8J+AgEAMAcCAQACAhebMAcCAQACAhFsMAoCBQDq
# pRP+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAKQkJ5OpRUMUTzL2wBlaY
# lDlCt1MkbW1fOq6+dQ9sekM/QiIBOuJJH6xGS+E+yKmeWtIm4TtKPljtMK3SaSLN
# RONJHorDmZPhZa8v6kXs9Kn6qOJSRJof2MNx4qGuMUrPURPxKdHTceB2frXvkRN9
# EKPT+e+yhedMxa9WT71GR/cxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCDwodGIRL1q2ugdis/QrUiQ1sPDSdyYWjMHdb38TNrB7DCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4MlxBt2Crw12PTHIy5iYq
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372b
# mhxogyIAAQAAAeMwIgQgCS2iSvMNrWnIcbp/dls4BdlE0dzhvWkmonLzzgV+KBIw
# DQYJKoZIhvcNAQELBQAEggIAvYERVbCyclH4NPkuGZ71tW7+n86lvd3ouMHvZxSe
# OAQE7srL/C4JvVefmxHDW0Bm0MnDkbZbO2qEOWwfUzVxYlu4Y/y3K9ccssOOkVMA
# RPMeNKokZ6JNf6MxSqEjz1pcEkVmf2DfUK+412cYAycD2NfFE4q1hqR4t2ln5PBs
# gZN4wAryd/w/XJn28sO/G3wi140fKIVopseCpcfM6x6MEkuv8mZZzY1k6AoPJVf+
# 7hBK873AklnjILPKBtvL/OhZSXCgLpsjrhOmerf3vPloWmDOyOY0EQspwGzbWwJ0
# GgXfNJSx4VsYyPQ1cnsJmo0XpxkNvkV+7Ek4LNfTgHw8+bNC/kezjom5Vr8rznY0
# AKEEZ6wGWqQvdt27adRoSm/H4E5FNgJygBLO76wl7OLbSupiPNvWJk4EgudhmgtK
# 3ig+r2v7kaHBjdt2rVnGws8/gzPaqfoSvxzE774IWLpA5a8+FLdxdriULQogfzQE
# xmBiHwt4IRQjHp5d9P8XURwPyNzMmvOI0G1NpnF+/LiWlRZkoAvrejz0xv9wzcxr
# 6EnRnQ/t/+kUWTTr1za7aZTF50j/lldeaJ2raB6Oj6f0U6ylqc+XW5bTCG4RLTBR
# rExPe6gW7nIjEd01b9t5CvNw3uWrFXaHiicJXjI8MsQ2oSirXDZM0Hwf8uzAYC1O
# 2vM=
# SIG # End signature block