[CmdletBinding()] param ( [string]$OutFile, [string]$AltDownload, [string]$Proxy, [string]$AltHisEndpoint ) $ErrorActionPreference = 'Stop' $ProgressPreference = 'SilentlyContinue' $refVersion = [version] '4.5' $provider = 'Microsoft.HybridCompute' # Error codes used by azcmagent are in range of [0, 125]. # Installation scripts will use [127, 255]. Check install_linux_azcmagent.sh for the codes used for Linux script. $global:errorcode="AZCM0150" $global:scriptPath = $myinvocation.mycommand.definition <# Throw a structured exception#> function Invoke-Failure { [CmdletBinding()] param( [Parameter(Mandatory=$true)] $Message, [Parameter(Mandatory=$true)] $ErrorCode, [Parameter(Mandatory=$false)] $Details ) $ex = new-object -TypeName System.Exception -ArgumentList @($Message) $ex.Data["Details"] = $details $ex.Data["ErrorCode"] = $errorcode throw $ex } function Get-HISEndpoint() { $hisEndpoint = "https://gbl.his.arc.azure.com" if ($env:CLOUD -eq "AzureUSGovernment") { $hisEndpoint = "https://gbl.his.arc.azure.us" } elseif ($env:CLOUD -eq "AzureChinaCloud") { $hisEndpoint = "https://gbl.his.arc.azure.cn" } elseif ($env:CLOUD -eq "AzureStackCloud") { if ($AltHisEndpoint) { $hisEndpoint = $AltHisEndpoint } else { Write-Warning "Invalid his endpoint, using default gbl.his.arc.azure.com" return $hisEndpoint } } return $hisEndpoint } function Test-AzureStackHCI() { [CmdletBinding()] param ( ) try { $product=Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName | select -ExpandProperty ProductName } catch { Write-Verbose -Message "Error $_ Unable to determine product SKU from registry" -Verbose # Will attempt to install anyway return $false } if ($product -eq 'Azure Stack HCI') { return $true } return $false } function Test-PowerShellVersion() { [CmdletBinding()] param ( ) Write-Verbose -Message "PowerShell version: $($PSVersionTable.PSVersion)" -Verbose return ($PSVersionTable.PSVersion -ge [Version]"3.0") } function Test-DotNetFramework() { [CmdletBinding()] param ( ) try { $installedVersion = [version] (Get-ItemProperty -LiteralPath 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' -Name Version | select -ExpandProperty Version) } catch { Write-Verbose -Message "Error $_ Unable to determine .NET Framework version" -Verbose # Will attempt to install anyway return $true } Write-Verbose -Message ".NET Framework version: $installedVersion" -Verbose if ($installedVersion -ge $refVersion) { return $true } return $false } function Test-IsAzure() { Write-Verbose -Message "Checking if this is an Azure virtual machine" -Verbose $DfWebProxy = [System.Net.WebRequest]::DefaultWebProxy try { # HCI sets [system.net.webrequest]::defaultwebproxy before calling our script. Even the older PowerShell picks this up. # As a workaround we temporarily override this defaultwebproxy so that the IMDS call does not get redirected to the proxy. [System.Net.WebRequest]::DefaultWebProxy = $null if ($PSVersionTable.PSVersion -ge [Version]"6.0") { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -NoProxy -TimeoutSec 1 -ErrorAction SilentlyContinue } else { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -TimeoutSec 1 -ErrorAction SilentlyContinue } if ($null -ne $response -and $response.StatusCode -eq 200) { $content = ConvertFrom-Json $($response.Content.ToString()) if ($null -ne $content.resourceId) { Write-Verbose -Message "Azure check indicates that we are in Azure" -Verbose return $true } } } catch { Write-Verbose -Message "Error $_ checking if we are in Azure" -Verbose return $false } finally { [System.Net.WebRequest]::DefaultWebProxy = $DfWebProxy } return $false } function Get-MsiLogSummary() { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$LogPath ) try { $LogPath = Resolve-Path $LogPath Write-Verbose -Message "Reading Logs from $LogPath" -Verbose $patterns = @( "Installation success or error status", "Product: Azure Connected Machine Agent" ); $regex = "(" + ($patterns -join ")|(" ) + ")" Write-Verbose -Message "Looking for Patterns: $regex" -Verbose $inCustomAction = $false $logCustomAction = $false $inLockDownDirectory = $false $caOutput = new-object -TypeName System.Collections.ArrayList Get-Content $LogPath | % { # log interesting lines if ( ($_ -match $regex)) { $_ # output to pipeline } # Wix custom actions start with "Calling custom Action". Gather the log from the CA till we see if it passed # At the end, log that output only if it failed with "returned actual error" if ($_ -match "Calling custom action") { $inCustomAction = $true $logCustomAction = $false $inLockDownDirectory = ($_ -match "LockDownDirectory") } if ($_ -match "MSI \(s\)") { $inCustomAction = $false } if ($_ -match "returned actual error") { $logCustomAction = $true } if ($inCustomAction -and -not $inLockDownDirectory) { $null = $caOutput.Add($_) } if ($inCustomAction -and $inLockDownDirectory) { if ($_ -match "Unable to lock path" -or $_ -match "Failed to lock down directory" -or $_ -like "Unkown path*locking error") { $null = $caOutput.Add($_) } } if (-not $inCustomAction) { if($logCustomAction) { $caOutput # output saved lines to pipeline } $caOutput.Clear() } } } catch { # This code is optional so if something goes wrong we'll just swallow the error and have no details Write-Verbose -Message "Error while parsing MSI log: $_" -Verbose } } function Send-Failure { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Exception] $Error, [Parameter(Mandatory = $true)] [string] $ErrorCode, [Parameter(Mandatory = $false)] [string] $AltHisEndpoint ) $hisEndpoint = Get-HISEndpoint $message = "$Error" if ($Error.Data["Details"]) { $message = $Error.Data["Details"] } $message = $message.Substring(0, [Math]::Min($message.Length, 500)) if ( $env:PROVIDER_NAMESPACE ) { $provider = $env:PROVIDER_NAMESPACE } $logBody = @{subscriptionId="$env:SUBSCRIPTION_ID";resourceGroup="$env:RESOURCE_GROUP";tenantId="$env:TENANT_ID";location="$env:LOCATION";correlationId="$env:CORRELATION_ID";authType="$env:AUTH_TYPE";operation="onboarding";namespace="$provider";osType="windows";messageType="$ErrorCode";message="$message";} try { Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -ErrorAction SilentlyContinue } catch {} } # Based on the MSI error code, we may have some hint to provide as to the issue # See https://learn.microsoft.com/en-us/windows/win32/msi/error-codes function Get-MsiErrorDetails() { [CmdletBinding()] param( $exitCode ) $message = (net helpmsg $exitCode) -join "" $hint = "" $errorCode = "AZCM0149" # exitCode is the return value from msiexec. errorCode is the error code of the script switch($exitCode) { 112 { $hint = "Insufficient disk space" $errorCode = "AZCM0158" } 1603 { # ERROR_INSTALL_FAILURE $hint = "A fatal error occurred during installation" $errorCode = "AZCM0156" } 1618 { # ERROR_INSTALL_ALREADY_RUNNING $hint = "Another installation is already in progress. Please wait for the other installation to complete and then try again." $errorCode = "AZCM0159" } 1622 { # ERROR_INSTALL_LOG_FAILURE $hint = "Error opening log file" $errorCode = "AZCM0160" } 1633 { # ERROR_INSTALL_PLATFORM_UNSUPPORTED $hint = "Unsupported: Azure Connected Machine Agent is only compatible with X64 operating systems" $errorCode = "AZCM0153" } } return [PSCustomObject]@{ Message = $message Hint = $hint ErrorCode = $errorCode } } function CheckRSOPLogonRights { # Checks RSOP to see if a group policy may prevent himds from running # Support PS 1-2 for initial requirements check even though PS4 is required for product if ($PSVersionTable.PSVersion.Major -ge 3) { $securitySettings = Get-CimInstance -Namespace "root/RSOP/Computer" -ClassName "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } else { $securitySettings = Get-WmiObject -Namespace "root/RSOP/Computer" -Class "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } if ($rsoperror -ne $null) { Write-Warning "Unable to retrieve RSOP data to check local security policy." return } # Find the RSOP results for SeLogonAsAService, might be empty $logonAsServicePolicy = $securitySettings | Where-Object { $_.UserRight -eq "SeServiceLogonRight" } $logonAsServicePrincipals = $logonAsServicePolicy | Select-Object -ExpandProperty AccountList # If the list is empty, contains NT SERVICE\ALL SERVICES (default), or contains NT SERVICE\himds then our service can run if ($logonAsServicePrincipals -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\ALL SERVICES" -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\himds" -and ` $logonAsServicePrincipals -notcontains "S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083") { Write-Warning "The local security policy on this system will prevent the agent from loading. Contact your Group Policy administrator to ensure 'NT SERVICE\ALL SERVICES' is included in any Group Policy Objects that configure the Logon as a Service User Rights Assignment. See https://aka.ms/ArcServerURA for more information." Write-Warning "GPO ID: $($logonAsServicePolicy.GPOID)" } } function Test-PhysicalMemory() { [CmdletBinding()] param () try { $memory = (Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum / 1MB } catch { $memory = "Unknown" } Write-Verbose -Message "Total Physical Memory: $memory MB" -Verbose } function Download-With-Retries() { [CmdletBinding()] param ( [Parameter(Mandatory=$true)][string]$downloadUri, [Parameter(Mandatory=$false)][int]$maxAttempts = 3 ) $attempts=1 do { try { if (([Uri]$downloadUri).Scheme -in @("https","http")) { Write-Verbose -Message "Downloading agent package from $downloadUri to $msiFile" -Verbose # It's a web site, download it if ($Proxy) { Invoke-WebRequest -UseBasicParsing -Proxy $Proxy -Uri $downloadUri -OutFile $msiFile } else { Invoke-WebRequest -UseBasicParsing -Uri $downloadUri -OutFile $msiFile } } else { # This could be a UNC path or a local file, just try and copy it Write-Verbose -Message "Copying agent package from $downloadUri to $msiFile" -Verbose Copy-Item $downloadUri $msiFile } return } catch { $attempts++ Write-Verbose -Message "Download failure: $_ ..Retrying..." -Verbose } } while ($attempts -le $maxAttempts) Invoke-Failure -ErrorCode "AZCM0148" -Message "Download of $downloadUri failed: $_" } function Is-Interactive { return [System.Environment]::UserInteractive } # Spawns a new pwsh process to run the script with elevated permissions. The original process will exit immediately after spawning the elevated process. function Restart-AsAdmin { # Check if we should use pwsh or powershell # For PowerShell 6 and later, use 'pwsh'. Otherwise use 'powershell'. $pwshCommand = "powershell" if ($PSVersionTable.PSVersion.Major -ge 6) { $pwshCommand = "pwsh" } try { Write-Host "This script requires administrator permissions to install the Azure Connected Machine Agent. Attempting to restart script with elevated permissions..." $additionalArgs = " -OutFile '$OutFile' -AltDownload '$AltDownload' -Proxy '$Proxy' -AltHisEndpoint '$AltHisEndpoint'" if ($VerbosePreference -eq "Continue") { $additionalArgs += " -Verbose" } # -NoExit is so that the elevated powershell window doesn't close immediately after the script finishes. This way users can still see the output. $arguments = "-NoExit -Command `"& '$scriptPath' $additionalArgs`"" Start-Process $pwshCommand -Verb runAs -ArgumentList $arguments exit 0 } catch { Invoke-Failure -Message "Failed to elevate permissions. Please run this script as Administrator." -ErrorCode "AZCM0155" } } try { #Check if PowerShell is running as administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { if (Is-Interactive) { Restart-AsAdmin } else { Invoke-Failure -Message "This script requires administrator permissions to install the Azure Connected Machine Agent. Please run this script as Administrator." -ErrorCode "AZCM0155" } } # Ensure TLS 1.2 is accepted. Older PowerShell builds (sometimes) complain about the enum "Tls12" so we use the underlying value [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072 # Ensure TLS 1.3 is accepted, if this .NET supports it (older versions don't) try { [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 12288 } catch {} Write-Verbose -Message "Installing Azure Connected Machine Agent" -Verbose $validPowerShell = Test-PowerShellVersion if (-Not $validPowerShell) { Invoke-Failure -Message "Azure Connected Machine Agent requires PowerShell version 3.0 or later" -ErrorCode "AZCM0154" } Test-PhysicalMemory $hci = Test-AzureStackHCI if ($hci) { Invoke-Failure -Message "This server is running Azure Stack HCI and should be connected to Azure Arc using the built-in registration experience: https://aka.ms/install-arc-on-hci-host" -ErrorCode "AZCM0152" } $validFramework = Test-DotNetFramework if (-Not $validFramework) { Invoke-Failure -Message "Azure Connected Machine Agent requires .NET Framework version $refVersion or later" -ErrorCode "AZCM0151" } $inAzure = Test-IsAzure if ($inAzure) { $override = [System.Environment]::GetEnvironmentVariable("MSFT_ARC_TEST", [System.EnvironmentVariableTarget]::Machine) if ('true' -eq $override) { Write-Warning '''Running on an Azure Virtual Machine with MSFT_ARC_TEST set. Azure Connected Machine Agent is designed for use outside Azure. This virtual machine should only be used for testing purposes. See https://aka.ms/azcmagent-testwarning for more details. ''' } else { Invoke-Failure -ErrorCode "AZCM0147" -Message '''Cannot install Azure Connected Machine agent on an Azure Virtual Machine. Azure Connected Machine Agent is designed for use outside Azure. To connect an Azure VM for TESTING PURPOSES ONLY, see https://aka.ms/azcmagent-testwarning for more details. ''' } } CheckRSOPLogonRights # Download the package $msiFile = Join-Path "$env:Temp" "AzureConnectedMachineAgent.msi" if ($AltDownload) { $downloadUri = $AltDownload } else { $hisEndpoint = Get-HISEndpoint $downloadUri = "$hisEndpoint/azcmagent/latest/AzureConnectedMachineAgent.msi" } Download-With-Retries -downloadUri $downloadUri # Install the package $logFile = Join-Path -Path "$env:Temp" -ChildPath "installationlog.txt" $argList = @("/i", "$msiFile" , "/l*v", "$logFile", "/qn", "REBOOT=ReallySuppress") Write-Verbose -Message "Installing agent package" -Verbose $exitCode = (Start-Process -FilePath msiexec.exe -ArgumentList $argList -Wait -Passthru).ExitCode if ($exitCode -ne 0) { # Treat ERROR_SUCCESS_REBOOT_INITIATED (1641) and ERROR_SUCCESS_REBOOT_REQUIRED (3010) as success if ($exitCode -eq 1641 -Or $exitCode -eq 3010) { Write-Warning -Message "Installation succeeded but a reboot is required to complete the installation." Write-Verbose -Message "Msiexec returned: $exitCode - treating it as success" -Verbose } else { $details = (Get-MsiErrorDetails $exitCode) $logInfo = ((Get-MsiLogSummary "$logFile") -join "`n") Invoke-Failure -Message "Installation failed: [$exitCode]: $($details.Message) $($details.Hint)`: See $logFile for additional details." -ErrorCode $details.ErrorCode -Details $logInfo } } # Check if we need to set proxy environment variable if ($PSBoundParameters.ContainsKey("Proxy")) { if ($Proxy) { Write-Verbose -Message "Setting proxy configuration: $Proxy" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config set proxy.url ${Proxy} } else { Write-Verbose -Message "Clearing proxy configuration" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config clear proxy.url } } } catch { $code = $_.Exception.Data.ErrorCode $details = $_.Exception.Data.Details if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error if ($OutFile) { [ordered]@{ status = "failed" error = [ordered]@{ message = $_.Exception.Message code = $code details = $details } } | ConvertTo-Json | Out-File $OutFile } Write-Error $_ -ErrorAction Continue if ($details) { Write-Output "Details: $details" } Send-Failure $_.Exception $code $AltHisEndpoint exit 1 } # Installation was successful if we got this far if ($OutFile) { [ordered]@{ status = "success" message = "Installation of azcmagent completed successfully" } | ConvertTo-Json | Out-File $OutFile } Write-Host "Installation of azcmagent completed successfully" exit 0 # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBygF/ftylRCvEb # I817QSR0WjgZnOOT6w5C12cNRJ/ff6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPyLLz6t2J31e39sZOG7txzd # W6vPDdH2+i1Gqsvzfp6RMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdsWpyHWNiuYHSNv9k+jRdvacnq1ZisYz+VCKvHsCzb62ecbDDzriH8PI # J6qK4veDKu6HDKoinG22nWMvR0XyDHfE9qWvYrK+rR5mIIlc7uTdn3dhcQ12aMW3 # uwI6yudLX2EF9GI0sq/0Hjpn0Fb7p+rQVqiUZ1ChRTqZcyLkDEE3kwMbAJH4FLJM # v/+ZIUi7sMfHeGdEz1uiZpiOvKE6omW2JmnFE6U0+l031kNEVopVhCh+rWNrrOKo # u67Kf6F9Y1PEtxu8LhdyK+G4pymjHNp5paDEyO5KaM7WsDeB7QDaU0suEOAnXxgQ # 1ODoQsgKwqqKhMHPQmt/yVx0A50m2aGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA0Mz/T9G4u52TQVjenUSiYFm2aer8d9G/JNBvr5Y6WRwIGZurEJqBr # GBIyMDI0MDkyOTE3MTU0NC4zMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # OEQ0MS00QkY3LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAePfvZuaHGiDIgABAAAB4zANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MjlaFw0yNTAxMTAxOTA3MjlaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJG # Ny1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvqQNaB5Gn5/FIFQPo3/K4Qml # eCDMF40bkoHwz0BshZ4SiQmA6CGUyDwmaqQ2wHhaXU0RdHtwvq+U8KxYYsyHKqax # xC7fr/yHZvHpNTgzx1VkR3pXhT6X2Cm175UX3WQ4jfl86onp5AMzBIFDlz0SU8VS # KNMDvNXtjk9FitLgUv2nj3hOJ0KkEQfk3oA7m7zA0D+Mo73hmR+OC7uwsXxJR2tz # UZE0STYX3UvenFH7fYWy5BNmLyGq2sWkQ5HFvJKCJAE/dwft8+V43U3KeExF/pPt # cLUvQ9HIrL0xnpMFau7Yd5aK+TEi57WctBv87+fSPZBV3jZl/QCtcH9WrniBDwki # 9QfRxu/JYzw+iaEWLqrYXuF7jeOGvHK+fVeLWnAc5WxsfbpjEMpNbGXbSF9At3PP # hFVOjxwVEx1ALGUqRKehw9ap9X/gfkA9I9eTSvwJz9wya9reDgS+6kXgSttI7RQ2 # cJG/tQPGVIaLCIaSafLneaq0Bns0t4+EW3B/GnoBMiiOXwleOvf5udBZQIMJ3k5q # nnh8Z4ZhTwrE6iGbPrTgGBPXh7exFYAGlb6hdhILIVDdJlDf8s1NVvL0Q2y4SHZQ # hApZTuW/tyGsGscIPDSMz5bA6NhRLtjEwCFpLI5qGlu50Au9FRelCEQsWg7q07H/ # rqHOqCNJM4Rjem7joEUCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSxrg1mvjUVt6Fn # xj56nabZiJipAzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAt76bLqnU08wRbW3v # RrxjaEbGPqyINK6UYCzhTGaR/PEwCJziPT4ZM9sfGTX3eZDQVE9r121tFtp7NXQY # uQSxRZMYXa0/pawN2Xn+UPjBRDvoCsU56dwKkrmy8TSw7QXKGskdnEwsI5yW93q8 # Ag86RkBiKEEf9FdzHNuKWI4Kv//fDtESewu46n/u+VckCwbOYl6wE//QRGrGMq50 # 9a4EbP+p1GUm06Xme/01mTIuKDgPmHL2nYRzXNqi2IuIecn2aWwkRxQOFiPw+dic # mOOwLG/7InNqjZpQeIhDMxsWr4zTxzy4ER/6zfthtlDtcAXHB7YRUkBTClaOa0nd # vfNJZMyYVa6cWvZouTq9V5LS7UzIR8S/7RsOT43eOawLBsuQz0VoOLurYe1SffPq # TsCcRNzbx0C8t/+KipStVhPAGttEfhdUUS9ohD6Lt6wNCJxZbV0IMD8nfE6gIQJX # rzrXWOuJqN91WDyjRan4UKDkIBS2yWA4W6JhQuBzGerOSY/aLnxkRrSubgtnKYcH # OwgxTTIya5WYCRjFt0QOLleqVki6k+mqYPr98uMPi5vRIQS206mDSenStr8w0J+/ # +1WEm3PnCCIQgpf6zhqRrAt9j7XrEMHrg2bQegaz8bLzbe6UibgbKtRyk1nGde8T # o5kyMj9XUCBICDxT+F4xa5lNZVQwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhE # NDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQA9iJe7w5FDiG8py4TsYrQI6DFaeqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6qPCfjAiGA8yMDI0MDkyOTIwMTE0MloYDzIwMjQwOTMwMjAxMTQyWjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDqo8J+AgEAMAcCAQACAhebMAcCAQACAhFsMAoCBQDq # pRP+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAKQkJ5OpRUMUTzL2wBlaY # lDlCt1MkbW1fOq6+dQ9sekM/QiIBOuJJH6xGS+E+yKmeWtIm4TtKPljtMK3SaSLN # RONJHorDmZPhZa8v6kXs9Kn6qOJSRJof2MNx4qGuMUrPURPxKdHTceB2frXvkRN9 # EKPT+e+yhedMxa9WT71GR/cxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgABAAAB4zANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCDwodGIRL1q2ugdis/QrUiQ1sPDSdyYWjMHdb38TNrB7DCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9wha4MlxBt2Crw12PTHIy5iYq # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372b # mhxogyIAAQAAAeMwIgQgCS2iSvMNrWnIcbp/dls4BdlE0dzhvWkmonLzzgV+KBIw # DQYJKoZIhvcNAQELBQAEggIAvYERVbCyclH4NPkuGZ71tW7+n86lvd3ouMHvZxSe # OAQE7srL/C4JvVefmxHDW0Bm0MnDkbZbO2qEOWwfUzVxYlu4Y/y3K9ccssOOkVMA # RPMeNKokZ6JNf6MxSqEjz1pcEkVmf2DfUK+412cYAycD2NfFE4q1hqR4t2ln5PBs # gZN4wAryd/w/XJn28sO/G3wi140fKIVopseCpcfM6x6MEkuv8mZZzY1k6AoPJVf+ # 7hBK873AklnjILPKBtvL/OhZSXCgLpsjrhOmerf3vPloWmDOyOY0EQspwGzbWwJ0 # GgXfNJSx4VsYyPQ1cnsJmo0XpxkNvkV+7Ek4LNfTgHw8+bNC/kezjom5Vr8rznY0 # AKEEZ6wGWqQvdt27adRoSm/H4E5FNgJygBLO76wl7OLbSupiPNvWJk4EgudhmgtK # 3ig+r2v7kaHBjdt2rVnGws8/gzPaqfoSvxzE774IWLpA5a8+FLdxdriULQogfzQE # xmBiHwt4IRQjHp5d9P8XURwPyNzMmvOI0G1NpnF+/LiWlRZkoAvrejz0xv9wzcxr # 6EnRnQ/t/+kUWTTr1za7aZTF50j/lldeaJ2raB6Oj6f0U6ylqc+XW5bTCG4RLTBR # rExPe6gW7nIjEd01b9t5CvNw3uWrFXaHiicJXjI8MsQ2oSirXDZM0Hwf8uzAYC1O # 2vM= # SIG # End signature block