full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/1807.ps1 | 1807.ps1 |
Describe "Get-EventLog cmdlet tests" -Tags @('CI', 'RequireAdminOnWindows') {
BeforeAll {
$defaultParamValues = $PSdefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = !$IsWindows -or $IsCoreCLR
}
AfterAll {
$global:PSDefaultParameterValues = $defaultParamValues
}
It "should return an array of eventlogs objects when called with -AsString parameter" -Pending:($True) {
{ $result=Get-EventLog -AsString -ErrorAction Stop } | Should -Not -Throw
$result | Should -Not -BeNullOrEmpty
,$result | Should -BeOfType "System.Array"
$result | Should -BeExactly "Application"
$result.Count | Should -BeGreaterThan 3
}
It "should return a list of eventlog objects when called with -List parameter" -Pending:($True) {
{ $result=Get-EventLog -List -ErrorAction Stop } | Should -Not -Throw
$result | Should -Not -BeNullOrEmpty
,$result | Should -BeOfType "System.Array"
{$logs=$result | Select-Object -ExpandProperty Log} | Should -Not -Throw
$logs | Should -BeExactly "System"
$logs.Count | Should -BeGreaterThan 3
}
It "should be able to Get-EventLog -LogName Application -Newest 100" -Pending:($True) {
{ $result=get-eventlog -LogName Application -Newest 100 -ErrorAction Stop } | Should -Not -Throw
$result | Should -Not -BeNullOrEmpty
$result.Length | Should -BeLessThan 100
$result[0] | Should -BeOfType "EventLogEntry"
}
It "should throw 'AmbiguousParameterSetException' when called with both -LogName and -List parameters" -Pending:($True) {
{ Get-EventLog -LogName System -List -ErrorAction Stop } | Should -Throw -ErrorId "AmbiguousParameterSet,Microsoft.PowerShell.Commands.GetEventLogCommand"
}
It "should be able to Get-EventLog -LogName * with multiple matches" -Pending:($True) {
{ $result=get-eventlog -LogName * -ErrorAction Stop } | Should -Not -Throw
$result | Should -Not -BeNullOrEmpty
$result | Should -BeExactly "Security"
$result.Count | Should -BeGreaterThan 3
}
It "should throw 'InvalidOperationException' when asked to get a log that does not exist" -Pending:($True) {
{ Get-EventLog -LogName MissingTestLog -ErrorAction Stop } | Should -Throw -ErrorId "System.InvalidOperationException,Microsoft.PowerShell.Commands.GetEventLogCommand"
}
}
|
combined_dataset/train/non-malicious/2330.ps1 | 2330.ps1 |
[CmdletBinding()]
[OutputType([Amazon.Route53.Model.ChangeInfo])]
param
(
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$ZoneName,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$AliasName,
[Parameter()]
[ValidateNotNullOrEmpty()]
[int]$TTL = 300,
[Parameter()]
[ValidateNotNullOrEmpty()]
[string]$AWSRegion = 'us-west-1'
)
begin
{
try
{
if ((Get-AWSCredentials -ListStoredCredentials) -notcontains 'default')
{
throw 'No default AWS credentials set. To set use the "Set-AWSCredentials -AccessKey <YourKey> -SecretKey <YourKey> -StoreAs default" command'
}
Initialize-AWSDefaults -ProfileName default -Region $AWSRegion
}
catch
{
$PSCmdlet.ThrowTerminatingError($_)
}
}
process {
try
{
$hostedZones = Get-R53HostedZones
if ($hostedZones.Name.TrimEnd('.') -notcontains $ZoneName)
{
throw "Could not find any hosted DNS zones matching the domain name [$($ZoneName)]"
}
$hostedZone = $hostedZones | where { $_.Name -eq "$ZoneName." }
$recordSet = New-Object -TypeName Amazon.Route53.Model.ResourceRecordSet
$recordSet.Name = "$Name.$ZoneName."
$recordSet.Type = 'CNAME'
$recordSet.TTL = $TTL
$recordSet.ResourceRecords.Add((New-Object Amazon.Route53.Model.ResourceRecord($AliasName)))
$action = New-Object -TypeName Amazon.Route53.Model.Change
$action.Action = 'CREATE'
$action.ResourceRecordSet = $recordSet
Edit-R53ResourceRecordSet -HostedZoneId $hostedZone.ID -ChangeBatch_Change $action
}
catch
{
$PSCmdlet.ThrowTerminatingError($_)
}
} |
combined_dataset/train/non-malicious/4163.ps1 | 4163.ps1 |
function Get-MSIInformation {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[System.IO.FileInfo]$MSI,
[ValidateSet('ProductCode', 'ProductVersion', 'ProductName', 'Manufacturer', 'ProductLanguage', 'FullVersion')]
[string]$Property
)
$WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer
$MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $null, $WindowsInstaller, @($MSI.FullName, 0))
$Query = "SELECT Value FROM Property WHERE Property = '$($Property)'"
$View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null)
$Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1)
$MSIDatabase.GetType().InvokeMember("Commit", "InvokeMethod", $null, $MSIDatabase, $null)
$View.GetType().InvokeMember("Close", "InvokeMethod", $null, $View, $null)
$MSIDatabase = $null
$View = $null
return $Value
}
function Get-RelativePath {
[CmdletBinding()]
[OutputType([string])]
param ()
$Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
Return $Path
}
function Install-MSI {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[string]$MSI,
[ValidateNotNullOrEmpty()]
[string]$Switches
)
[string]$DisplayName = Get-MSIInformation -MSI $MSI -Property 'ProductName'
$Executable = $Env:windir + "\system32\msiexec.exe"
$Parameters = "/i" + [char]32 + [char]34 + $MSI + [char]34 + [char]32 + $Switches
Write-Host "Install"$DisplayName.Trim()"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
Exit $ErrCode
}
}
function Stop-Processes {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[String]$ProcessName
)
$Processes = Get-Process $ProcessName -ErrorAction SilentlyContinue
If ($Processes -ne $null) {
Do {
foreach ($Process in $Processes) {
If ($Process.Product -ne $null) {
Write-Host "Killing"(($Process.Product).ToString()).Trim()"Process ID"(($Process.Id).ToString()).Trim()"....." -NoNewline
Stop-Process -Id $Process.Id -Force -ErrorAction SilentlyContinue
Start-Sleep -Milliseconds 250
$Process = Get-Process -Id $Process.Id -ErrorAction SilentlyContinue
If ($Process -eq $null) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
}
}
$Process = Get-Process $ProcessName -ErrorAction SilentlyContinue
} While ($Process -ne $null)
}
}
function Uninstall-MSIByName {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[String]$ApplicationName,
[ValidateNotNullOrEmpty()]
[String]$Switches
)
$Executable = $Env:windir + "\system32\msiexec.exe"
Do {
$Uninstall = Get-ChildItem REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue -Force
$Uninstall += Get-ChildItem REGISTRY::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue
$Key = $uninstall | foreach-object {
Get-ItemProperty REGISTRY::$_
} | where-object {
$_.DisplayName -like "*$ApplicationName*"
}
If ($Key -ne $null) {
Write-Host "Uninstall"$Key[0].DisplayName"....." -NoNewline
$Parameters = "/x " + $Key[0].PSChildName + [char]32 + $Switches
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
}
} While ($Key -ne $null)
}
$RelativePath = Get-RelativePath
Stop-Processes -ProcessName 'DesktopApp'
Stop-Processes -ProcessName 'winword'
Stop-Processes -ProcessName 'excel'
Stop-Processes -ProcessName 'outlook'
Stop-Processes -ProcessName 'powerpnt'
Uninstall-MSIByName -ApplicationName 'OutlookAddInInstaller' -Switches '/qb- /norestart'
Uninstall-MSIByName -ApplicationName 'PingDesktopApp' -Switches '/qb- /norestart'
|
combined_dataset/train/non-malicious/sample_33_60.ps1 | sample_33_60.ps1 | @{
# Script module or binary module file associated with this manifest
ModuleToProcess = 'nuget.psm1'
# Version number of this module.
ModuleVersion = '2.0.0.0'
# ID used to uniquely identify this module
GUID = '76e6f9c4-7045-44c0-a557-17fab0835c12'
# Author of this module
Author = 'NuGet Team'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2010 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'NuGet PowerShell module used for the Package Manager Console'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Name of the Windows PowerShell host required by this module
PowerShellHostName = 'Package Manager Host'
# Minimum version of the Windows PowerShell host required by this module
PowerShellHostVersion = '1.2'
# Minimum version of the .NET Framework required by this module
DotNetFrameworkVersion = '4.0'
# Minimum version of the common language runtime (CLR) required by this module
CLRVersion = ''
# Processor architecture (None, X86, Amd64, IA64) required by this module
ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module
ScriptsToProcess = @('profile.ps1')
# Type files (.ps1xml) to be loaded when importing this module
TypesToProcess = @('NuGet.Types.ps1xml')
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = @('NuGet.Format.ps1xml')
# Modules to import as nested modules of the module specified in ModuleToProcess
NestedModules = @('NuGet.PackageManagement.PowerShellCmdlets, Version=6.10.0.52, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a')
# Functions to export from this module
FunctionsToExport = @('Register-TabExpansion')
# Cmdlets to export from this module
CmdletsToExport = @(
'Install-Package',
'Uninstall-Package',
'Update-Package',
'Get-Package',
'Get-Project',
'Sync-Package',
'Find-Package'
'Add-BindingRedirect')
# Variables to export from this module
VariablesToExport = ''
# Aliases to export from this module
AliasesToExport = ''
# List of all modules packaged with this module
ModuleList = @()
# List of all files packaged with this module
FileList = @()
# Private data to pass to the module specified in ModuleToProcess
PrivateData = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDe601wW0pLMv1L
# j1PyS71RCKMq1P5Hl7/HDg1B1fz8CKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIOY+apiplZWEy2QUt/oERFU
# NhxAxHA1PfkGwoJ6J8UzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAC/isi6JkUgBAZht0/lo6cvLaKRvCuK6kX0GKmSTXrT/5Iw1TKbdD2Mn
# MSlv46VDKC5QC4HrBsy6dLv+/51NIeF2FpfIJCm2KW+hrlnjseGHn65bbbHXYkNE
# n//NfsMsVRMH1B70DLZx0YhBdlkk3i16A7JlHBuOVwiv/dlNDzUnp0Yi1tUukJiO
# YGYoByMxMe0D3xn2TLmO4TW3Mu0Yu/GExhIXnD8BNiRxSZvWS5Ais9kVxXZRIMty
# YulnoYoZ7tRB7BHDLumf6qjZqIaFwygp2bkBIbPdeoTsRuyerx7dxDZCeUOpblcS
# qNwmIhnIJPj6i68ooLG0YGSKY9R8y6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAVcXRdIWOUzniWpoPyj2MdcUtjaTbKdBtQOlHYwsycMgIGZdXk6k5n
# GBMyMDI0MDIyODA5NTUxMS4xOThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmI9BUwIhgPMjAyNDAyMjgwNzUxNDlaGA8yMDI0MDIyOTA3NTE0OVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6Yj0FQIBADAHAgEAAgIC+DAHAgEAAgISLjAKAgUA
# 6YpFlQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABOCmeAqoEKdNKI41vTX
# a0lN61HKU31+KX0c391U4lzzzyYaIE9L06uGE3FDLHxxdriqc0iv+c2O31ZAwZZW
# GucpybBmDv6k08iPeTXBvvLo+ZVHoZ8EkzEFP4sriHtpTmF+jTrqNh0sRVQmNWMd
# 530veimk0UpZ2Z8biBakF8VXMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgExscnyTF1X9N/w4u7MstEFvg9L9Fx4cuU1AFiOwFdbcwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIK9QKIMUFFSNGrXA2A4F6lT5ogwFOYv0X5EWcYvHoLzt
# MA0GCSqGSIb3DQEBCwUABIICAAMQCy5C88WwbYbjKIj1NtUCHJoyJbjheEZQQbpy
# 02kQRaibHZ5Nxxb50D+1eo+deF0xmSp1J2DNOOpeFLqJdE7W+BaSw0Sg1rhGYwth
# 2/7b7dbPuTUXhV27OWqFSyA3RqCgHpaeAPXXlqg/ES5WJJt4S1+Q9LFSucND3hF5
# BS0B+CtPrLAYkbBDe+Jui8kFPs1iZWmuHMG6CqccpAvEpHSplNEXur67J/13uQQ7
# 9zx/XMyB569Ifm/8hPEikEXNIayMe84mXHliVBcSeVKcchc7tHgSAt89JW408pvC
# 8Ny7bzQj1THBvj7TnO4wGqqC+uCraawtMy141P9bkbkSKt97ev96j9F1gAEvdcrz
# lAcC3WdF4KUh8SPd4hFde1tNYd9xdfad2o1O7shhnpH86Hm5J5b1FG6zYYhB5O/J
# h/Rlk7KAO4J52BLlFf5jUTVPRpNEtI1TI2BW7APMVc2NUUvykDFEhZES6yDP+/NZ
# jR36RNHrwEwmdZsVq5dtiRy2GlI0nucxXUwDKbdfEXspZM1hD7njQ5qKrKnbhWxv
# Kw5uWBH7k6VxQhE5qAW7LXkCj/kXD275ArKpeAtQyVJn/E1ErutZz1HtFRmV5DiH
# YmTR4MFFasgOMkd1M1gAij7XXnrkeSnSfFh8QBs9Ch6VsPS8UGOdT5TMTvj25zrl
# bDc8
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_28_45.ps1 | sample_28_45.ps1 | # Get the version of the Torizon IDE Extension from package.json
$env:TEST_EXTENSION_VERSION = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).version
$env:TEST_VSCODE_CLEANUP = $true
# Start the tests from a clean environment, unless explictly setting to false
# the env variable
if ($env:TEST_VSCODE_CLEANUP -Eq $true) {
# cleanup
Write-Output "Clearing dotvscode and ~/.apollox"
# remove dotvscode
if (Test-Path "dotvscode") {
Remove-Item -Recurse -Force "dotvscode"
}
# remove .apollox
if (Test-Path -Path "$env:HOME/.apollox") {
Remove-Item -Recurse -Force "$env:HOME/.apollox"
}
}
if (!(Test-Path "dotvscode")) {
# get test-resources
# If vscode-extension-tester hasn't been released for the latest VSCode:
# https://github.com/redhat-developer/vscode-extension-tester
# use the -c <vscode version> parameter, ex: npx extest get-vscode -c 1.86.2
npx extest get-vscode -s "dotvscode"
npx extest get-chromedriver -s "dotvscode"
}
# clean file stream
Write-Host "" > "dotvscode/currentTestTerminalOutput.log"
# remove out and recompiled it, this is useful for local tests
if (Test-Path .\out) {
Remove-Item -Recurse -Force .\out
}
# compile and pack
# apollox
npm --prefix ../apollox run pack
$APOLLOX_FILE = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).dependencies.apollox
$APOLLOX_FILE = $APOLLOX_FILE.replace('file:','')
Copy-Item $APOLLOX_FILE .
# apollox-vscode
npm run pack
# install
npx extest install-vsix -e "dotvscode/extensions" -f ./apollox-vscode-linux-x64-$env:TEST_EXTENSION_VERSION.vsix -s "dotvscode"
|
combined_dataset/train/non-malicious/sample_32_76.ps1 | sample_32_76.ps1 | #
# Module manifest for module 'Microsoft.SME.EventViewer'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.SME.EventViewer.psm1'
# Version number of this module.
ModuleVersion = '4.11.1'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'DBB7F730-24A4-4C9B-98D7-3CBBC9E8FA74'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Clear-WACEVEventLogChannel',
'Clear-WACEVEventLogChannelAfterExport',
'Export-WACEVEventLogChannel',
'Get-WACEVCimEventLogRecords',
'Get-WACEVClusterEvents',
'Get-WACEVEventLogDisplayName',
'Get-WACEVEventLogFilteredCount',
'Get-WACEVEventLogRecords',
'Get-WACEVEventLogSummary',
'Set-WACEVEventLogChannelStatus',
'Get-WACEVCimWin32LogicalDisk',
'Get-WACEVCimWin32NetworkAdapter',
'Get-WACEVCimWin32PhysicalMemory',
'Get-WACEVCimWin32Processor',
'Get-WACEVClusterInventory',
'Get-WACEVClusterNodes',
'Get-WACEVDecryptedDataFromNode',
'Get-WACEVEncryptionJWKOnNode',
'Get-WACEVServerInventory'
)
# Function attributes: {"localScripts":["Clear-WACEVEventLogChannel","Clear-WACEVEventLogChannelAfterExport","Export-WACEVEventLogChannel","Get-WACEVCimEventLogRecords","Get-WACEVClusterEvents","Get-WACEVEventLogDisplayName","Get-WACEVEventLogFilteredCount","Get-WACEVEventLogRecords","Get-WACEVEventLogSummary","Set-WACEVEventLogChannelStatus"],"externalScripts":["Get-WACEVCimWin32LogicalDisk","Get-WACEVCimWin32NetworkAdapter","Get-WACEVCimWin32PhysicalMemory","Get-WACEVCimWin32Processor","Get-WACEVClusterInventory","Get-WACEVClusterNodes","Get-WACEVDecryptedDataFromNode","Get-WACEVEncryptionJWKOnNode","Get-WACEVServerInventory"]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVx1lva/fsjPnt
# FOLcgJfYcpyCnmWhLLLTj1FpcWY5yaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINFYJ9dL2GTUeVdQjav9qW79
# 96hOlcH6+gtsQV5RROe8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAzHS8yQJd6OXtf8j68zDFoN6Ah3FidDr4NIOQrWjI+pqzh1qZhu9vuHNY
# AMSpieWcdeXO+2AyPsDLDXrR40EAYltkGPklzERhP1jDM5x1q5rl9BeKxLirRegU
# IjXkfw116oioTOx0JQ/NpAJ7e84kegvdijGSuSNTb+uhXSMFcWG9Nhi2uXeE3TZe
# XG6bjEVXK8CMpmv/d8TQXk+DShc8Lz6950eSbQ7dx7WjccNKN8Kc5ZDHU1vTW6Yo
# SjE40ffPg69wExO69891zurJVkmHMaSRyGrd+7YCkLRBNeB0CQBwnj7R5y2jxwl6
# 9RapVKXRFKsdxjqz36MR2/9gzNhAlKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCEK/aCCoWRLRQ8xgrAJBz4vn7dJs5X/xyMUFi6LSs3uQIGZc4jGFaC
# GBMyMDI0MDIyMDE4NTcwMS40NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfAqfB1ZO+YfrQABAAAB8DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NTFaFw0yNTAzMDUxODQ1NTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046N0YwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1Hi1Tozh3O0czE8xfRnrymlJNCaGWommPy0eINf+4
# EJr7rf8tSzlgE8Il4Zj48T5fTTOAh6nITRf2lK7+upcnZ/xg0AKoDYpBQOWrL9Ob
# FShylIHfr/DQ4PsRX8GRtInuJsMkwSg63bfB4Q2UikMEP/CtZHi8xW5XtAKp95cs
# 3mvUCMvIAA83Jr/UyADACJXVU4maYisczUz7J111eD1KrG9mQ+ITgnRR/X2xTDMC
# z+io8ZZFHGwEZg+c3vmPp87m4OqOKWyhcqMUupPveO/gQC9Rv4szLNGDaoePeK6I
# U0JqcGjXqxbcEoS/s1hCgPd7Ux6YWeWrUXaxbb+JosgOazUgUGs1aqpnLjz0YKfU
# qn8i5TbmR1dqElR4QA+OZfeVhpTonrM4sE/MlJ1JLpR2FwAIHUeMfotXNQiytYfR
# BUOJHFeJYEflZgVk0Xx/4kZBdzgFQPOWfVd2NozXlC2epGtUjaluA2osOvQHZzGO
# oKTvWUPX99MssGObO0xJHd0DygP/JAVp+bRGJqa2u7AqLm2+tAT26yI5veccDmNZ
# sg3vDh1HcpCJa9QpRW/MD3a+AF2ygV1sRnGVUVG3VODX3BhGT8TMU/GiUy3h7ClX
# OxmZ+weCuIOzCkTDbK5OlAS8qSPpgp+XGlOLEPaM31Mgf6YTppAaeP0ophx345oh
# twIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNCCsqdXRy/MmjZGVTAvx7YFWpslMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA4IvSbnr4jEPgo5W4xj3/+0dCGwsz863QG
# Z2mB9Z4SwtGGLMvwfsRUs3NIlPD/LsWAxdVYHklAzwLTwQ5M+PRdy92DGftyEOGM
# Hfut7Gq8L3RUcvrvr0AL/NNtfEpbAEkCFzseextY5s3hzj3rX2wvoBZm2ythwcLe
# ZmMgHQCmjZp/20fHWJgrjPYjse6RDJtUTlvUsjr+878/t+vrQEIqlmebCeEi+VQV
# xc7wF0LuMTw/gCWdcqHoqL52JotxKzY8jZSQ7ccNHhC4eHGFRpaKeiSQ0GXtlbGI
# bP4kW1O3JzlKjfwG62NCSvfmM1iPD90XYiFm7/8mgR16AmqefDsfjBCWwf3qheIM
# fgZzWqeEz8laFmM8DdkXjuOCQE/2L0TxhrjUtdMkATfXdZjYRlscBDyr8zGMlprF
# C7LcxqCXlhxhtd2CM+mpcTc8RB2D3Eor0UdoP36Q9r4XWCVV/2Kn0AXtvWxvIfyO
# Fm5aLl0eEzkhfv/XmUlBeOCElS7jdddWpBlQjJuHHUHjOVGXlrJT7X4hicF1o23x
# 5U+j7qPKBceryP2/1oxfmHc6uBXlXBKukV/QCZBVAiBMYJhnktakWHpo9uIeSnYT
# 6Qx7wf2RauYHIER8SLRmblMzPOs+JHQzrvh7xStx310LOp+0DaOXs8xjZvhpn+Wu
# Zij5RmZijDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjdGMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDC
# KAZKKv5lsdC2yoMGKYiQy79p/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X84uTAiGA8yMDI0MDIyMDE0NDIw
# MVoYDzIwMjQwMjIxMTQ0MjAxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpfzi5
# AgEAMAcCAQACAg+2MAcCAQACAhJRMAoCBQDpgIo5AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAJXHC8jMI5gtOb71pqJRDm7fV2S0k14ybnwYjxVYfr75okw9
# BApzdC/I3gzZVZHnNH5lAG7Z3kmUWzREh4fsCov8L99+kCr8VCQTKRlXD7NQIyQ8
# Ua1rSY+SWh4q2jn/sOpCq4WV/ysj6p5yCgRbZI//mkmGhtduhy3TVD+qMYj0YcwB
# QkWKqfaqKriJSqLTR7DGDdO68yHVG1mqLmffRdtPTVtoCOOGHS0tzbg0rKKxZ+wY
# bYGJDM9hMN5DbYI98+XRekTNOLEC64mFxgtw4UFCWiTCB2A75nYOcEk29Bu2bolt
# uQjdwDAWxASIJlmsKUjCpfPxFA//z+eX4EAUhaQxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfAqfB1ZO+YfrQABAAAB8DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDihT2TFIuqstluMbCv3hIOcRF2Ghy3TwlwoHKQf8fl6TCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIFwBmqOlcv3kU7mAB5sWR74QFAiS
# 6mb+CM6asnFAZUuLMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHwKnwdWTvmH60AAQAAAfAwIgQg46TLjFP2nVD2l7R1h9LKEf6jvmAv
# XyY/gaMoGWGZlqEwDQYJKoZIhvcNAQELBQAEggIAU4kSbp7OCybjEzVFrlQzX0LM
# Lpt1N/52d0/rK5F70sCCCRTDJf7PP6KRNvqbSokovKHwSSD4Lo79sxKXI+pxk4tg
# Xg89PaxmSdfAOfTCq2gFvEVjKk33j+VPSBrM8TMzYidflSmrrF4f8+Uv0s8YTZf8
# BQypn6trKJcw8xufQLybbJGnk/LU/iDl5ujHckLwkoiJxNLKEKEaGux6YxbMyFtX
# eDVpu/ZM0rbO6VcQV8K6brdzj3b0+/PR+msXwWcdIpOG4Q3a0rtwSGL4p9ISc8I4
# BwMc2TZLjbpD9nlWijhQypm5rc93vkz8+ik26/JIS59AIJAFLGoh9pPQznqrl1Ml
# WNcVA00pSSB/Y5qPcjZV6jcVBjgdNBKHed/Sb7/1Mtzntcj3l+WjjGh77135M0wH
# fImQzQO1bsHMmCho1xLXchepLVRgUU/eTc7yRj0cioJExpPzOzT8sFh8YSAWHazj
# Ab5r/xUJua2kUasMtOZoL2PT7dEzPOa+FxC/+YaQXzNObgbC3OejMIAx6NPyxQPJ
# 7j5Aa8HiVw4bv8XGOKT3A2X1Sw1LMujwkfxDC3ZYal1Y24SCmRYiSsqPAV07sYYM
# hLIvSvxyABp0lLpiZdGZs6phh1Zg/4895BcukUPfkQ2Gi1ypvBvCp48cg2t7R+Dz
# VF5dMvCQnz9MvEWbU8o=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4084.ps1 | 4084.ps1 | Clear-Host
$Global:MountPath
$Global:RelativePath
$Global:WimFile
$Global:UpdatesPath
Function GetRelativePath{
$Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\"
Write-Host $Global:RelativePath
}
Function GetWimFile{
$FileName = Get-ChildItem $Global:RelativePath | Where-Object {($_.Name -like "*.wim")}
$Global:WimFile = $Global:RelativePath+$FileName
Write-Host $Global:WimFile
}
Function MountWIM{
$Global:MountPath = $Global:RelativePath+"Mount\"
If ((Test-Path $Global:MountPath) -ne $true){
New-Item -ItemType directory -Path $Global:RelativePath"Mount"
}
Write-Host $Global:MountPath
$Arguments = "dism.exe /mount-wim /wimfile:"+$Global:WimFile+[char]32+"/index:1 /mountdir:"+$Global:MountPath
Write-Host $Arguments
Invoke-Expression -Command $Arguments
}
Function UnmountWIM{
$Arguments = "dism.exe /unmount-wim /mountdir:"+$Global:MountPath+[char]32+"/commit"
Write-Host $Arguments
Invoke-Expression -Command $Arguments
}
Function CleanupWIM{
$Arguments = "dism.exe /cleanup-wim"
Write-Host $Arguments
Invoke-Expression -Command $Arguments
}
Function GlobalMemoryCleanup{
Clear-Variable -Name MountPath -Scope Global -Force
Clear-Variable -Name WimFile -Scope Global -Force
Clear-Variable -Name UpdatesPath -Scope Global -Force
Clear-Variable -Name RelativePath -Scope Global -Force
Remove-Variable -Name MountPath -Scope Global -Force
Remove-Variable -Name WimFile -Scope Global -Force
Remove-Variable -Name UpdatesPath -Scope Global -Force
Remove-Variable -Name RelativePath -Scope Global -Force
}
GetRelativePath
GetWimFile
MountWIM
$Global:UpdatesPath = $Global:RelativePath+"*.msu"
$UpdatesArray = Get-Item $Global:UpdatesPath
ForEach ($Updates in $UpdatesArray) {
$Arguments = "dism.exe /image:"+$Global:MountPath+[char]32+"/Add-Package /PackagePath:"+$Updates
Write-Host $Arguments
Invoke-Expression -Command $Arguments
Start-Sleep -Seconds 10
}
UnmountWIM
CleanupWIM
Clear-Variable -Name Arguments -Scope Local -Force
Clear-Variable -Name Updates -Scope Local -Force
Clear-Variable -Name UpdatesArray -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
Remove-Variable -Name Updates -Scope Local -Force
Remove-Variable -Name UpdatesArray -Scope Local -Force
GlobalMemoryCleanup
|
combined_dataset/train/non-malicious/sample_1_71.ps1 | sample_1_71.ps1 | ConvertFrom-StringData @'
id_hypervnet=Hyper-V Networking Information
id_hypervnetobtaining=Obtaining advanced networking information
'@
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALHV3gakgtq6WM
# XHYCihyz4CbDpFldx0SjKNGUnCSDk6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKs5EqgVMi0B/Z81T4fcAFU7
# /FHsqLcOaFwCvEGAzrQ3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASRs1hLB0no6iTxTtLGQEyPR2fmrXrK6o01SA5xZat+nftAAqbHPN/woj
# BmD30Lk7PnmJ+vJ/VCvJCamUrsv5znyN028XNVUreTMHV717CYor8qHJBVQVxuuO
# eyqAd/ZeMoqL670FDVSx4rq0V+6zsFBid3SRuIJ0NWWfr4Vq4yfpFlL09NnXOdtL
# 0D/C49E50OaT5vzw8I7lQdzm5VR2ZT68rhG47cVDRCv9i32JwmRA+jJ74dMyLOAm
# d51wsowaoRHmn4FMr9iYjne1YUG5HEHVq5gF4KTEZ9HdtStkVPM900CZuFu1FGN+
# /FFsa5kkuVeQpHd0KPTzDoGLT6kNwqGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA8X9SjJG+htZG4m0h4kObcgPKu6H7I8pyV4uGgNFhrQwIGZusyQ1df
# GBMyMDI0MTAyODExNDA0MS44NzVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB/XP5aFrNDGHtAAEAAAH9MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNloXDTI1MTAyMjE4MzExNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJEMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAoWWs+D+Ou4JjYnRHRedu
# 0MTFYzNJEVPnILzc02R3qbnujvhZgkhp+p/lymYLzkQyG2zpxYceTjIF7HiQWbt6
# FW3ARkBrthJUz05ZnKpcF31lpUEb8gUXiD2xIpo8YM+SD0S+hTP1TCA/we38yZ3B
# EtmZtcVnaLRp/Avsqg+5KI0Kw6TDJpKwTLl0VW0/23sKikeWDSnHQeTprO0zIm/b
# tagSYm3V/8zXlfxy7s/EVFdSglHGsUq8EZupUO8XbHzz7tURyiD3kOxNnw5ox1eZ
# X/c/XmW4H6b4yNmZF0wTZuw37yA1PJKOySSrXrWEh+H6++Wb6+1ltMCPoMJHUtPP
# 3Cn0CNcNvrPyJtDacqjnITrLzrsHdOLqjsH229Zkvndk0IqxBDZgMoY+Ef7ffFRP
# 2pPkrF1F9IcBkYz8hL+QjX+u4y4Uqq4UtT7VRnsqvR/x/+QLE0pcSEh/XE1w1fcp
# 6Jmq8RnHEXikycMLN/a/KYxpSP3FfFbLZuf+qIryFL0gEDytapGn1ONjVkiKpVP2
# uqVIYj4ViCjy5pLUceMeqiKgYqhpmUHCE2WssLLhdQBHdpl28+k+ZY6m4dPFnEoG
# cJHuMcIZnw4cOwixojROr+Nq71cJj7Q4L0XwPvuTHQt0oH7RKMQgmsy7CVD7v55d
# OhdHXdYsyO69dAdK+nWlyYcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTpDMXA4ZW8
# +yL2+3vA6RmU7oEKpDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAY9hYX+T5AmCr
# YGaH96TdR5T52/PNOG7ySYeopv4flnDWQLhBlravAg+pjlNv5XSXZrKGv8e4s5dJ
# 5WdhfC9ywFQq4TmXnUevPXtlubZk+02BXK6/23hM0TSKs2KlhYiqzbRe8QbMfKXE
# DtvMoHSZT7r+wI2IgjYQwka+3P9VXgERwu46/czz8IR/Zq+vO5523Jld6ssVuzs9
# uwIrJhfcYBj50mXWRBcMhzajLjWDgcih0DuykPcBpoTLlOL8LpXooqnr+QLYE4Bp
# Uep3JySMYfPz2hfOL3g02WEfsOxp8ANbcdiqM31dm3vSheEkmjHA2zuM+Tgn4j5n
# +Any7IODYQkIrNVhLdML09eu1dIPhp24lFtnWTYNaFTOfMqFa3Ab8KDKicmp0Ath
# RNZVg0BPAL58+B0UcoBGKzS9jscwOTu1JmNlisOKkVUVkSJ5Fo/ctfDSPdCTVaIX
# XF7l40k1cM/X2O0JdAS97T78lYjtw/PybuzX5shxBh/RqTPvCyAhIxBVKfN/hfs4
# CIoFaqWJ0r/8SB1CGsyyIcPfEgMo8ceq1w5Zo0JfnyFi6Guo+z3LPFl/exQaRubE
# rsAUTfyBY5/5liyvjAgyDYnEB8vHO7c7Fg2tGd5hGgYs+AOoWx24+XcyxpUkAajD
# hky9Dl+8JZTjts6BcT9sYTmOodk/SgIwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyRDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAoj0WtVVQUNSKoqtrjinRAsBUdoOggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJwV8wIhgPMjAyNDEwMjgwNzUzMDNaGA8yMDI0MTAyOTA3NTMwM1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snBXwIBADAHAgEAAgIJ5zAHAgEAAgISQjAK
# AgUA6ssS3wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQA/CC/LZ2oFgj4y
# M+DFyNVKcBzdk7bpwAmueOznqReWHoXmwUIc/XnbhfCWF4kzzIktKGUnhyd/L3j7
# RHbVvGeGF+fZiYJZZNmG7ACSfV5XzRFpVnXhG1Eq8trnzQMegLEIZHFbBaiR6h9j
# /oOV3GL1tWefgGg4PLjA2CLf/qTJq8v1GGX/8Jg7c9fFMtqdncqg8a2hOSPYghty
# l1zQ+Acf393GEF9RdMESmpaRxOgTKfbI2UbSjoWhj0unmdz7ZrxHx5mL0kEArzE1
# Q+EWLfNOToT2f5td5d8T/A/LephISU0PquyBJaI3KX6lfDhbaf2LYZ2H/D5el6NP
# 4izM97TyMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH9c/loWs0MYe0AAQAAAf0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg+PhRNtziNQ4F
# guqbDSw4/MmRzalVa/870cmVBA0IF1kwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCCAKEgNyUowvIfx/eDfYSupHkeF1p6GFwjKBs8lRB4NRzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/XP5aFrNDGHtAAEAAAH9
# MCIEILkYvpuRiODssJyAPH65EnrV3KtBv8aYFkft91FYt/GwMA0GCSqGSIb3DQEB
# CwUABIICAAVjIf0WSfuYVEGRh6K6PR+0Wnea2u77KS2f4ZKdZPsAzpS36dDcwugJ
# Am2pdYpRkeq7MIY4XmfENf5pHjGI3RFxeYoVrDYCucwLMrjpCz2IC5g0sNUr6vzC
# EW89TdQxba3tYDvrG8iE1pSwKiUTjIqRZAQekYXuwXuDGvudvMLq98CCQmpxQYgA
# IyCI4selVcClmxmkdsWdB6X73nQKlBPqPiT7+wKQDevsQXA3jgmdxjh7afCgMNc8
# NEwaFQoG2OgzV4fFvOVL5r2iimqOQL9ZWTrbFWIpo+XtpTH+6Xl6sk7nMVDj92Fh
# wiXyUjDiwm7nmyUcRadokdonX2PU99f1ZMcellAI76OdVPErwUOAkHgu8xQuj8zq
# TiSgW3L09VA80l+E2r4vAdEExUfZFwQ7tj87wGzDDPwRzdlEHN0qZ43IIzAL34FV
# hOhtcoQWDxEnBjfNPVYOc2DrlNZebJCCxk/BjCSnJRwdCmBFjhYor+3DeEM+x7ks
# 2uxZzkoaUAtr4kXrSEQs7IpQJ1ABPFThog2QvR78JPMcvwfgrBqOu7xIO/xAR5Y8
# uShK7V2kBqFLP3joPNwR+7UJ5B9Rf5B2qZs26JZK0Yarwnrmmiq90qat//Un89Gg
# nyU+vE8O7VgiqSmkyLrXY4UMQ5iI87gIrNmw9tSW+kMuy1YK9ZRW
# SIG # End signature block
|
combined_dataset/train/non-malicious/465.ps1 | 465.ps1 |
$mappings = @{
"deserialized.microsoft.activedirectory.management.addomaincontroller" = @("HostName", "Name")
"microsoft.activedirectory.management.addomaincontroller" = @("HostName", "Name")
"microsoft.sqlserver.management.smo.server" = @("NetName", "DomainInstanceName")
"deserialized.microsoft.sqlserver.management.smo.server" = @("NetName", "DomainInstanceName")
"microsoft.sqlserver.management.smo.linkedserver" = @("Name")
"deserialized.microsoft.sqlserver.management.smo.linkedserver" = @("Name")
"microsoft.activedirectory.management.adcomputer" = @("DNSHostName", "Name")
"deserialized.microsoft.activedirectory.management.adcomputer" = @("DNSHostName", "Name")
"Microsoft.DnsClient.Commands.DnsRecord_A" = @("Name", "IPAddress")
"Deserialized.Microsoft.DnsClient.Commands.DnsRecord_A" = @("Name", "IPAddress")
"Microsoft.DnsClient.Commands.DnsRecord_AAAA" = @("Name", "IPAddress")
"Deserialized.Microsoft.DnsClient.Commands.DnsRecord_AAAA" = @("Name", "IPAddress")
}
foreach ($key in $mappings.Keys)
{
Register-PSFParameterClassMapping -ParameterClass 'Computer' -TypeName $key -Properties $mappings[$key]
} |
combined_dataset/train/non-malicious/sample_32_19.ps1 | sample_32_19.ps1 | ---
- name: Fault set Operations
hosts: localhost
connection: local
gather_facts: false
vars:
hostname: 'x.x.x.x'
username: 'admin'
password: 'Password'
validate_certs: false
host_port: 443
fault_set_name: "sample_fault_set_name_1"
protection_domain_name: "Ansible-PD1"
tasks:
- name: Create fault set
dellemc.powerflex.fault_set:
hostname: "{{ hostname }}"
username: "{{ username }}"
password: "{{ password }}"
validate_certs: "{{ validate_certs }}"
port: "{{ host_port }}"
fault_set_name: "{{ fault_set_name }}"
protection_domain_name: "{{ protection_domain_name }}"
- name: Get fault set details using name and protection domain
register: result
dellemc.powerflex.fault_set:
hostname: "{{ hostname }}"
username: "{{ username }}"
password: "{{ password }}"
validate_certs: "{{ validate_certs }}"
port: "{{ host_port }}"
fault_set_name: "{{ fault_set_name }}"
protection_domain_name: "{{ protection_domain_name }}"
- name: Get fault set details using ID
dellemc.powerflex.fault_set:
hostname: "{{ hostname }}"
username: "{{ username }}"
password: "{{ password }}"
validate_certs: "{{ validate_certs }}"
port: "{{ host_port }}"
fault_set_id: "{{ result.fault_set_details.id }}"
state: "present"
- name: Rename fault set details using ID
dellemc.powerflex.fault_set:
hostname: "{{ hostname }}"
username: "{{ username }}"
password: "{{ password }}"
validate_certs: "{{ validate_certs }}"
port: "{{ host_port }}"
fault_set_id: "{{ result.fault_set_details.id }}"
fault_set_new_name: "fault_set_new_name"
state: "present"
- name: Delete fault set
dellemc.powerflex.fault_set:
hostname: "{{ hostname }}"
username: "{{ username }}"
password: "{{ password }}"
validate_certs: "{{ validate_certs }}"
port: "{{ host_port }}"
fault_set_name: "fault_set_new_name"
protection_domain_name: "{{ protection_domain_name }}"
state: "absent"
|
combined_dataset/train/non-malicious/sample_28_23.ps1 | sample_28_23.ps1 | #
# Module manifest for module 'OCI.PSModules.Usage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Usage.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Usage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList',
'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList',
'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList',
'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser',
'Remove-OCIUsageRedeemableUser'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_46_5.ps1 | sample_46_5.ps1 | #
# Module manifest for module 'OCI.PSModules.Identity'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Identity.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '79636fb4-f5fc-4bf8-b817-bcca97c97ff4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Identity Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identity.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIIdentityTagDefaultLock', 'Add-OCIIdentityTagNamespaceLock',
'Add-OCIIdentityUserToGroup', 'Enable-OCIIdentityDomain',
'Enable-OCIIdentityMfaTotpDevice',
'Enable-OCIIdentityReplicationToRegion',
'Get-OCIIdentityAllowedDomainLicenseTypesList',
'Get-OCIIdentityApiKeysList', 'Get-OCIIdentityAuthenticationPolicy',
'Get-OCIIdentityAuthTokensList',
'Get-OCIIdentityAvailabilityDomainsList',
'Get-OCIIdentityBulkActionResourceTypesList',
'Get-OCIIdentityBulkEditTagsResourceTypesList',
'Get-OCIIdentityCompartment', 'Get-OCIIdentityCompartmentsList',
'Get-OCIIdentityCostTrackingTagsList',
'Get-OCIIdentityCustomerSecretKeysList',
'Get-OCIIdentityDbCredentialsList', 'Get-OCIIdentityDomain',
'Get-OCIIdentityDomainsList', 'Get-OCIIdentityDynamicGroup',
'Get-OCIIdentityDynamicGroupsList',
'Get-OCIIdentityFaultDomainsList', 'Get-OCIIdentityGroup',
'Get-OCIIdentityGroupsList', 'Get-OCIIdentityIamWorkRequest',
'Get-OCIIdentityIamWorkRequestErrorsList',
'Get-OCIIdentityIamWorkRequestLogsList',
'Get-OCIIdentityIamWorkRequestsList',
'Get-OCIIdentityIdpGroupMapping',
'Get-OCIIdentityIdpGroupMappingsList',
'Get-OCIIdentityMfaTotpDevice', 'Get-OCIIdentityMfaTotpDevicesList',
'Get-OCIIdentityNetworkSource', 'Get-OCIIdentityNetworkSourcesList',
'Get-OCIIdentityOAuthClientCredentialsList',
'Get-OCIIdentityPoliciesList', 'Get-OCIIdentityPolicy',
'Get-OCIIdentityProvider', 'Get-OCIIdentityProviderGroupsList',
'Get-OCIIdentityProvidersList', 'Get-OCIIdentityRegionsList',
'Get-OCIIdentityRegionSubscriptionsList',
'Get-OCIIdentitySmtpCredentialsList',
'Get-OCIIdentityStandardTagNamespacesList',
'Get-OCIIdentityStandardTagTemplate',
'Get-OCIIdentitySwiftPasswordsList', 'Get-OCIIdentityTag',
'Get-OCIIdentityTagDefault', 'Get-OCIIdentityTagDefaultsList',
'Get-OCIIdentityTaggingWorkRequest',
'Get-OCIIdentityTaggingWorkRequestErrorsList',
'Get-OCIIdentityTaggingWorkRequestLogsList',
'Get-OCIIdentityTaggingWorkRequestsList',
'Get-OCIIdentityTagNamespace', 'Get-OCIIdentityTagNamespacesList',
'Get-OCIIdentityTagsList', 'Get-OCIIdentityTenancy',
'Get-OCIIdentityUser', 'Get-OCIIdentityUserGroupMembership',
'Get-OCIIdentityUserGroupMembershipsList',
'Get-OCIIdentityUsersList',
'Get-OCIIdentityUserUIPasswordInformation',
'Get-OCIIdentityWorkRequest', 'Get-OCIIdentityWorkRequestsList',
'Import-OCIIdentityStandardTags',
'Invoke-OCIIdentityAssembleEffectiveTagSet',
'Invoke-OCIIdentityBulkDeleteResources',
'Invoke-OCIIdentityBulkDeleteTags',
'Invoke-OCIIdentityBulkEditTags',
'Invoke-OCIIdentityBulkMoveResources',
'Invoke-OCIIdentityCascadeDeleteTagNamespace',
'Invoke-OCIIdentityDeactivateDomain', 'Move-OCIIdentityCompartment',
'Move-OCIIdentityDomainCompartment',
'Move-OCIIdentityDomainLicenseType',
'Move-OCIIdentityTagNamespaceCompartment',
'New-OCIIdentityAuthToken', 'New-OCIIdentityCompartment',
'New-OCIIdentityCustomerSecretKey', 'New-OCIIdentityDbCredential',
'New-OCIIdentityDomain', 'New-OCIIdentityDynamicGroup',
'New-OCIIdentityGroup', 'New-OCIIdentityIdpGroupMapping',
'New-OCIIdentityMfaTotpDevice', 'New-OCIIdentityNetworkSource',
'New-OCIIdentityOAuthClientCredential',
'New-OCIIdentityOrResetUIPassword', 'New-OCIIdentityPolicy',
'New-OCIIdentityProvider', 'New-OCIIdentityRegionSubscription',
'New-OCIIdentitySmtpCredential', 'New-OCIIdentitySwiftPassword',
'New-OCIIdentityTag', 'New-OCIIdentityTagDefault',
'New-OCIIdentityTagNamespace', 'New-OCIIdentityTotpSeed',
'New-OCIIdentityUser', 'Remove-OCIIdentityApiKey',
'Remove-OCIIdentityAuthToken', 'Remove-OCIIdentityCompartment',
'Remove-OCIIdentityCustomerSecretKey',
'Remove-OCIIdentityDbCredential', 'Remove-OCIIdentityDomain',
'Remove-OCIIdentityDynamicGroup', 'Remove-OCIIdentityGroup',
'Remove-OCIIdentityIdpGroupMapping',
'Remove-OCIIdentityMfaTotpDevice',
'Remove-OCIIdentityNetworkSource',
'Remove-OCIIdentityOAuthClientCredential',
'Remove-OCIIdentityPolicy', 'Remove-OCIIdentityProvider',
'Remove-OCIIdentitySmtpCredential',
'Remove-OCIIdentitySwiftPassword', 'Remove-OCIIdentityTag',
'Remove-OCIIdentityTagDefault', 'Remove-OCIIdentityTagDefaultLock',
'Remove-OCIIdentityTagNamespace',
'Remove-OCIIdentityTagNamespaceLock', 'Remove-OCIIdentityUser',
'Remove-OCIIdentityUserFromGroup', 'Reset-OCIIdentityIdpScimClient',
'Restore-OCIIdentityCompartment',
'Update-OCIIdentityAuthenticationPolicy',
'Update-OCIIdentityAuthToken', 'Update-OCIIdentityCompartment',
'Update-OCIIdentityCustomerSecretKey', 'Update-OCIIdentityDomain',
'Update-OCIIdentityDynamicGroup', 'Update-OCIIdentityGroup',
'Update-OCIIdentityIdpGroupMapping',
'Update-OCIIdentityNetworkSource',
'Update-OCIIdentityOAuthClientCredential',
'Update-OCIIdentityPolicy', 'Update-OCIIdentityProvider',
'Update-OCIIdentitySmtpCredential',
'Update-OCIIdentitySwiftPassword', 'Update-OCIIdentityTag',
'Update-OCIIdentityTagDefault', 'Update-OCIIdentityTagNamespace',
'Update-OCIIdentityUser', 'Update-OCIIdentityUserCapabilities',
'Update-OCIIdentityUserState', 'Write-OCIIdentityApiKey'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identity'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_63_50.ps1 | sample_63_50.ps1 | Import-LocalizedData -BindingVariable lbsTxt -FileName AzStackHci.Bootstrap.Strings.psd1
<#
probably not needed
would contain any tests for bootstrap that dont exist or fit in other validators
#>
Export-ModuleMember -Function Test-*
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBT+xjsxVeB9ldE
# rc0htouxEwpE4jAPL11AEihOzFLWmaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIE8WTX75a+rhsw8WlWdZ1nfl
# H9bx0FUqZbSLgfyFoFViMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAoY8lBCqonLKh/Oq8yGaJ8cNRIFZmbKaetiML53WwEPpUMAaaT4F0O0ww
# AhMPtasRVxESE2tmSSbCZU3lMSuUxN83w70I0g94NHewwPrd8iXJFwpEjTf+ydjD
# MikQkSScTTLMWGT6C9WHhORpwQAydytZ8n8B2Y1+v+I0BQ6fOwSrjUYpEryTeb7q
# pAjwJBqBupenl9eu8q65eOxB2grvnoauk47rX+h8o+R+10AteiuxzdOPkrGRC9cL
# qpdJ2zd0vf2vvoy+MiFDpjdkX3QzzMdxawaJ2B47OiJKz0m+Rm29pKww2IZNYYzu
# kNTyZLY1S4ayoeXPRmGy7t+la2UgKqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB3LFZnmY32CkakFPncDXKlYjmp5nvkjAguGgjpWIF51AIGZjOp4aw6
# GBMyMDI0MDUxNjE4NDQyNS40NjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC
# RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ
# pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm
# scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF
# UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr
# c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T
# 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J
# IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz
# z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U
# NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O
# ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2
# UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx
# /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh
# Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t
# 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0
# GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6
# vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu
# dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY
# nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ
# 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z
# 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC
# V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH
# BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf
# v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv
# E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwnAgwIhgPMjAyNDA1MTYyMjUxNTJaGA8yMDI0MDUxNzIyNTE1MlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCcCAIBADAHAgEAAgIXqDAHAgEAAgIRgTAKAgUA
# 6fHtiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAF9eSLSLQKipJTTTaY4c
# 0F1vlCQAMyG6Qt0jL02K36614fHgV8B0ErR/iXHlNRZdFTI2782ssG/D6CijJ3AH
# TxafoggArkBMNiLuXdqJVmPvVqrKRMsghmv3sw5C1hUvao5DbIREZZptic1WQxq4
# juoCt2jLCFJr6m5/xQ7y4/L1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgZknNZWMmIh1oBF9KCuMfd/MR/QkpD5ZkkAgKkGCtiAswgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm
# KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9
# m5ocaIMiAAEAAAHjMCIEINSVRnUuYBeZqM4TwZYP+bWXmQhX8PsgoHifPm9NVR98
# MA0GCSqGSIb3DQEBCwUABIICAEOfHP4qnpyW1YzcHGMT4suhvn0IZVYHO38x4eE9
# 1L+k59ehmTj5/oX9E/jYh4V3uDxdJfrYyECJ9cB131AKoAieetIajLONgUJoGpB1
# 9ohR81HVlBF5dAsgK/zpvmsLYmGqwhH5PlY2cCr0ESDHN3PEy4cxWVzhcNmUZEZA
# 2PF8ayNg5bNYtnnbHVqqqqEOBq9w6whJZbkRl8mR77QrNTyev18JBK58+9NN7P7P
# ViiJvVnYpakzjegW/6KHdeMlXFx9iAEUuS6ZM4dMVAkcSgV+6QoeWk9aoFcIGybq
# KueR1wlL48amiJw8sQA0se1Eyi8HZr2+lWjKqC1fJuXvqIv1MXxXD44UHIB3dzwC
# thLwE2Y/4pPSAqgM1JDYJSaozrSgSl8ByYJHSds0Bui0M9KXnFOLfN+Dp+eIiu0L
# NwEXNTX/EMqLMW2f2iZfpL44w365DNtankm375FrG2doFeSOKp5W45p1YCMmNvyW
# 2HX2ZdDPZm05gSknTW/yV4rB9WZy5c0hI4jfRyYPC3WQTUJeK4ESPRprqfq1Hag8
# +c+tSi+VzUIcHL6TK+1K4UMsnx7lhIB4XoMTWmKGzM2j/KtMhTz1evkb+fgqgDbo
# QQhcsQn7RRK5/roLt7x37h+rGIgMu9pGYmnyoAb0fQpKG9B9UZtSFKQAwek//zsA
# /fw6
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_56_37.ps1 | sample_56_37.ps1 | #requires -Version 5.0
enum BcArtifactSource {
OnPrem
Sandbox
Insider
}
#Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psd1)
#Import-Module (Join-Path $PSScriptRoot ClientContext\ClientContext.psm1)
#. "$PSScriptRoot\ClientContext\ClientContextLibLoader.ps1" -BcLibVersion (Get-SelectedBcVersion)
Import-Module (Join-Path $PSScriptRoot EntraIdAuth\EntraIdAuth.psm1)
Import-Module (Join-Path $PSScriptRoot ALTestRunnerInternal.psm1)
Import-Module (Join-Path $PSScriptRoot ALTestRunner.psm1)
#Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psd1)
#Import-Module (Join-Path $PSScriptRoot ALExtBridge\ALExtBridge.psm1)
function Invoke-NPALTests {
[CmdletBinding()]
param (
[Parameter(Mandatory=$false)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$false)]
[ValidateSet('All','Codeunit','Test')]
[string]$Tests = 'All',
[Parameter(Mandatory=$false)]
[string]$FileName = '',
[Parameter(Mandatory=$false)]
[int]$SelectionStart = 0,
[Parameter(Mandatory=$false)]
[string]$ExtensionId,
[Parameter(Mandatory=$false)]
[string]$ExtensionName,
[Parameter(Mandatory = $false)]
[switch]$GetCodeCoverage,
[Parameter(Mandatory = $false)]
$DisabledTests,
[switch]$GetPerformanceProfile,
[string]$ResultsFilePath
)
$Params = @{}
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = Get-ServiceUrl
Test-ServiceIsRunningAndHealthy
# Let's check version and already loaded modules (if any) and eventually load/import ClientContext assemblies and types.
$Version = Get-SelectedBcVersion
if ($global:ClientContextLoadedModuleVersion -ne $Version) {
Push-Location
try {
Set-Location $PSScriptRoot
. (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version
. (Join-Path $PSScriptRoot 'ClientSessionLibLoader.ps1')
$global:ClientContextLoadedModuleVersion = $Version
}
catch {
Write-Error "Can't import ClientContext module for BC version $Version. Details: $_"
}
finally {
Pop-Location
}
}
switch ($environmentType) {
OnPrem {
$serviceUrlCredCacheKey = Get-ServiceUrlCredentialCacheKey
$serviceUrlCredCacheKey = $serviceUrlCredCacheKey.ToLower();
$creds = Get-NavUserPasswordCredentials -SmbAlExtPath $SmbAlExtPath -WebClientUrl $serviceUrlCredCacheKey
if (!$creds) {
throw "Can't find credential for the key $serviceUrlCredCacheKey!"
}
[securestring]$secStringPassword = ConvertTo-SecureString $creds.Password -AsPlainText -Force
[pscredential]$creds = New-Object System.Management.Automation.PSCredential ($creds.Username, $secStringPassword)
if (!$creds) {
throw "Can't find credentials in the AL development credential cache for $serviceUrlCredCacheKey!"
}
$Params.Add('Credential', $creds)
$Params.Add('AutorizationType', 'NavUserPassword')
}
Sandbox {
# Sandbox with AAD auth.
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
if (!$bcAuthContext) {
$bcAuthContext = New-BcAuthContext -includeDeviceLogin
}
$bcAuthContext = Renew-BcAuthContext $bcAuthContext
$Global:BCAuthContext = $bcAuthContext
#$accessToken = $bcAuthContext.accessToken
#$credential = New-Object pscredential -ArgumentList $bcAuthContext.upn, (ConvertTo-SecureString -String $accessToken -AsPlainText -Force)
$response = Invoke-RestMethod -Method Get -Uri "https://businesscentral.dynamics.com/$($bcAuthContext.tenantID)/$environmentName/deployment/url"
if($response.status -ne 'Ready') {
throw "environment not ready, status is $($response.status)"
}
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
if ($companyName) {
$serviceUrl += "&company=$([Uri]::EscapeDataString($companyName))"
}
$Params.Add('AutorizationType', 'AAD')
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
if ($FileName -ne '') {
if (Get-FileIsTestCodeunit -FileName $FileName) {
$Params.Add('TestCodeunitsRange', (Get-ObjectIdFromFile $FileName))
}
else {
throw "$FileName is not an AL test codeunit"
}
}
if ($SelectionStart -ne 0) {
$TestName = Get-TestNameFromSelectionStart -Path $FileName -SelectionStart $SelectionStart
if ($TestName -eq '') {
throw "Please place the cursor within the test method that you want to run and try again."
}
else {
$Params.Add('TestProcedureRange', $TestName)
}
}
if (-not [string]::IsNullOrEmpty($ResultsFilePath)) {
$Params.Add('ResultsFilePath', $ResultsFilePath)
$Params.Add('SaveResultFile', $true);
} else {
$Params.Add('SaveResultFile', $false);
}
Run-AlTests -ServiceUrl $serviceUrl @Params
}
function Get-OnPremServiceUrlCredentialKey {
[CmdletBinding()]
param (
[CmdletBinding(Mandatory=$true)]
[string]$ServiceUrl
)
$url = ([System.Uri]$ServiceUrl).AbsoluteUri.Replace('/','_').Replace('__','//')
return $url
}
function Get-ServiceUrl {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
# TODO: Optimize => Read once and then parse each property.
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = "$serviceUrl/$serverInstance"
if (-not ([string]::IsNullOrEmpty($tenant))) {
$serviceUrl = "$serviceUrl/?tenant=$tenant"
}
return $serviceUrl
}
Sandbox {
# TODO: Base URL for SaaS maybe configurable?
$serviceUrl = 'https://businesscentral.dynamics.com/'
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url"
$response = Invoke-RestMethod -Method Get -Uri $serviceUrl
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Get-ServiceUrlCredentialCacheKey {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
# TODO: Optimize => Read once and then parse each property.
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = ([System.Uri]$serviceUrl).AbsoluteUri.TrimEnd('/')
$serviceUrl = "$serviceUrl`_$serverInstance"
<# The 'UserPasswordCache.dat' file contains entries without tenant id so let's remove the next code:
if ((-not ([string]::IsNullOrEmpty($tenant))) -and ($tenant -ne 'default')) {
$serviceUrl = "$serviceUrl?tenant=$tenant"
}
#>
return $serviceUrl
}
Sandbox {
# TODO: Base URL for SaaS maybe configurable?
throw "Not implemented yet!"
$serviceUrl = 'https://businesscentral.dynamics.com/'
$environmentName = Get-ValueFromLaunchJson -KeyName 'environmentName'
$tenant = Get-ValueFromLaunchJson -KeyName 'tenant'
$serviceUrl = "$($serviceUrl.TrimEnd('/'))/$tenant/$environmentName/deployment/url"
$response = Invoke-RestMethod -Method Get -Uri $serviceUrl
$useUrl = $response.data.Split('?')[0]
$tenant = ($response.data.Split('?')[1]).Split('=')[1]
$publicWebBaseUrl = $useUrl.TrimEnd('/')
$serviceUrl = "$publicWebBaseUrl/cs?tenant=$tenant"
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Get-ServiceHealthUrl {
[CmdletBinding()]
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
$server = Get-ValueFromLaunchJson -KeyName 'server'
$serverInstance = Get-ValueFromLaunchJson -KeyName 'serverInstance'
$port = Get-ValueFromLaunchJson -KeyName 'port'
$serviceUrl = "$($server.TrimEnd('/'))"
if (-not ([string]::IsNullOrEmpty($port))) {
$serviceUrl = "$serviceUrl`:$port"
}
$serviceUrl = "$serviceUrl/$serverInstance"
if (-not ([string]::IsNullOrEmpty($tenant))) {
$serviceUrl = "$serviceUrl/Health/System"
}
return $serviceUrl
}
Default {
throw "Environment type '$environmentType' is not supported!"
}
}
}
function Test-ServiceIsRunningAndHealthy {
param (
)
$environmentType = Get-ValueFromLaunchJson -KeyName 'environmentType'
switch ($environmentType) {
OnPrem {
$healthServiceUrl = Get-ServiceHealthUrl
$serviceUrl = Get-ServiceUrl
$healthCheckResult = $null
try {
$healthCheckResult = Invoke-WebRequest -Uri $healthServiceUrl -UseBasicParsing -TimeoutSec 10
} catch {
$healthCheckResult = $null
}
if ((!$healthCheckResult) -or ($healthCheckResult.StatusCode -ne 200)) {
throw "$serviceUrl is not available. Please start the container, or check NST, eventually retry."
}
}
Default {
# For SaaS Sandboxes we don't have any method without authentication so we have to be authenticated first.
# So let's consider the environment is up and user knows about the real state before development and testing.
}
}
}
function Get-VSCodeExtensionRootPath {
[CmdletBinding()]
param (
)
$currentPath = $PSScriptRoot
while ($currentPath) {
$manifestFile = Get-ChildItem -Path $currentPath -Filter 'package.json'
if ($manifestFile) {
return $currentPath
}
$currentPath = Split-Path $currentPath -ErrorAction SilentlyContinue
}
throw "Can't find VSCode extension root path."
}
function Get-VSCodeExtensionInternalFolderPath {
[CmdletBinding()]
param (
)
$rootPath = Get-VSCodeExtensionRootPath
$internalPath = Join-Path $rootPath '.altestrunner'
if (!(Test-Path $internalPath)) {
$null = New-Item $internalPath -ItemType Directory -Force
}
return $internalPath
}
function Get-VSCodeExtensionClientContextLibsRootPath {
[CmdletBinding()]
param (
)
$path = Get-VSCodeExtensionInternalFolderPath
$path = Join-Path $path 'CSLibs'
if (!(Test-Path $path)) {
$null = New-Item $path -ItemType Directory -Force
}
return $path
}
function Get-RipUnzipExeFilePath {
[CmdletBinding()]
param (
)
$vsCodeExtRootPath = Get-VSCodeExtensionRootPath
$ripUnzipPath = Join-Path $vsCodeExtRootPath '.bin' -AdditionalChildPath 'ripunzip', 'ripunzip.exe'
if (!(Test-Path $ripUnzipPath)) {
throw "'ripunzip.exe' path $ripUnzipPath doesn't exist!"
}
return $ripUnzipPath
}
function Invoke-RipUnzip {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string]$Uri,
[Parameter(Mandatory=$true)]
[string]$DestinationPath,
[string]$ExtractionFilter
)
$ripUnzipPath = Get-RipUnzipExeFilePath
$cmd = "$ripUnzipPath unzip-uri -d $DestinationPath $Uri $ExtractionFilter"
Invoke-Expression -Command $cmd
if (!($?)) {
throw "'ripunzip' execution error. It's possible msvcp140.dll ()"
}
}
function Get-ClientSessionLibrariesFromBcArtifacts {
[CmdletBinding()]
param (
[string]$BcArtifactSourceUrl,
[Parameter(Mandatory=$true)]
[string]$Version
)
$BcArtifactSourceUrl = $BcArtifactSourceUrl.TrimEnd("/")
$BcArtifactSourceUrl = "$BcArtifactSourceUrl/$Version/platform"
Set-SelectedBcVersion -BcVersion $Version
$destPath = Get-SelectedBcVersionLibPath
if (!(Test-Path $destPath)) {
$null = New-Item -Path $destPath -ItemType Directory -Force
}
Invoke-RipUnzip -Uri $BcArtifactSourceUrl -DestinationPath $destPath -ExtractionFilter "'?pplications\*\?est?unner\?nternal\*.dll'"
}
function Import-ClientContextModule {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]$Version
)
if ($global:ClientContextLoadedModuleVersion) {
if ($global:ClientContextLoadedModuleVersion -eq $Version) {
return
}
}
try {
. (Join-Path $PSScriptRoot -ChildPath 'ClientContext' -AdditionalChildPath 'ClientContextLibLoader.ps1') -BcLibVersion $Version
$global:ClientContextLoadedModuleVersion = $Version
}
catch {
Write-Error "Can't import ClientContext module for BC version $Version. Details: $_"
}
}
$code = @"
using Microsoft.AspNetCore.DataProtection;
using System.Text;
using System.IO;
namespace ALCredentialCacheLibrary
{
public static class ALCredentailCacheReader
{
public static string GetDataFromCredentialCache(string credentialFolderPath, string credentialCacheFileName)
{
var credentailFilePath = Path.Combine(credentialFolderPath, credentialCacheFileName);
if (!File.Exists(credentailFilePath))
throw new FileNotFoundException(string.Format("Credential file {0} doesn't exist!", credentailFilePath));
var bytes = File.ReadAllBytes(credentailFilePath);
var purpose = new string[] { "Microsoft.Dynamics.Nav.Deployment", credentialCacheFileName };
var dirInfo = new DirectoryInfo(credentialFolderPath);
var provider = DataProtectionProvider.Create(dirInfo);
var protector = provider.CreateProtector(purpose);
return Encoding.UTF8.GetString(protector.Unprotect(bytes));
}
}
}
"@
function Get-MsbAlExtBinariesPath {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$msDynamicsSmbAlExtPath
)
# TODO: What about macOS (OS X) or Linux?
return (Join-Path $msDynamicsSmbAlExtPath '\bin\win32\')
}
function Get-ExternalLibraries {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$msDynamicsSmbAlExtPath
)
$libs = @()
# TODO: What about macOS (OS X) or Linux?
$Global:MsDynamicsSmbAlExtPath = $msDynamicsSmbAlExtPath
$Global:MsDynamicsSmbAlExtLibPath = Get-MsbAlExtBinariesPath -msDynamicsSmbAlExtPath $msDynamicsSmbAlExtPath
$libPath = $Global:MsDynamicsSmbAlExtLibPath
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Abstractions.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.DataProtection.Extensions.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.Cryptography.Internal.dll"
$libs += Join-Path $libPath "Microsoft.AspNetCore.Connections.Abstractions.dll"
#$libs += Join-Path $libPath "mscorlib.dll"
$libs += Join-Path $libPath "System.dll"
$libs += Join-Path $libPath "System.Runtime.dll"
$libs += Join-Path $libPath "System.IO.FileSystem.dll"
return $libs
}
function Get-NavUserPasswordCredentials {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$true)]
[string]$WebClientUrl
)
$creds = Get-ALDevCacheFileContent -SmbAlExtPath $SmbAlExtPath -FileName UserPasswordCache.dat -ReturnPSObject
if (!$creds) {
throw "You should authenticate using standard AL dev approach. Then you can try again."
}
$record = $creds.$WebClientUrl
if (!$record) {
throw "You were not authenticated against $WebClientUrl yet or the cache has expired. Please, authenticate using the standard Microsoft AL development extension and try again."
}
return $record
}
function Get-ALDevCacheFileContent {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$SmbAlExtPath,
[Parameter(Mandatory=$true)]
[ValidateSet("UserPasswordCache.dat", "TokenKeyCache.dat", "TokenCache.dat", "TenantMapCache.dat", "ServerInfoCache.dat")]
[string]$FileName,
[switch]$ReturnPSObject
)
if (-not ('ALCredentialCacheLibrary.ALCredentailCacheReader' -as [type])) {
$assemblies = Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath
$assemblies | ForEach-Object {
[void][Reflection.Assembly]::LoadFrom($_)
}
$credentialReader = Add-Type -TypeDefinition $code -Language CSharp -ReferencedAssemblies (Get-ExternalLibraries -msDynamicsSmbAlExtPath $SmbAlExtPath) -WarningAction Ignore -IgnoreWarnings -PassThru
} else {
$credentialReader = [ALCredentialCacheLibrary.ALCredentailCacheReader]
}
$SmbAlExtBinPath = Join-Path $SmbAlExtPath '\bin\win32\'
$smbAlCacheFilePath = Join-Path $SmbAlExtBinPath $FileName
if (-not (Test-Path $smbAlCacheFilePath)) {
Write-Error "Requested credential cache file $FileName doesn't exist. Please, authenticate using the standard Microsoft AL development extension first and then try again."
}
try {
$fileContent = $credentialReader::GetDataFromCredentialCache($SmbAlExtBinPath,$FileName)
} catch {
Write-Error "Can not decrypt file $FileName. $($_.Exception)"
}
if (!$ReturnPSObject) {
return $fileContent
}
$fileContentObject = ConvertFrom-Json $fileContent
return $fileContentObject
}
function Get-NavUserPasswordCredentialsNotWorking {
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[string]$WebClientUrl
)
#$purpose = @("Microsoft.Dynamics.Nav.Deployment", "UserPasswordCache.dat")
$purpose = New-Object System.Collections.Generic.List[System.String]
$purpose.Add('Microsoft.Dynamics.Nav.Deployment')
$purpose.Add('UserPasswordCache.dat')
$protectedFile = Join-Path $Global:MsDynamicsSmbAlExtLibPath $purpose[1]
#$dirInfo = New-Object System.IO.DirectoryInfo -ArgumentList $Global:MsDynamicsSmbAlExtLibPath
$dirInfo = New-Object "System.IO.DirectoryInfo, Version=6.0.0.0" -ArgumentList $Global:MsDynamicsSmbAlExtLibPath
$provider = [Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create($dirInfo)
$protector = $provider.CreateProtector($purpose);
$bytes = [System.IO.File]::ReadAllBytes($protectedFile)
$unprotectedValues = $protector.Unprotect($bytes);
$unprotectedString = [System.Text.Encoding]::UTF8.GetString($unprotectedValues)
Write-Host "Creds: $unprotectedString"
#[Microsoft.AspNetCore.DataProtection.DataProtectionProvider]::Create(()
}
function Get-SelectedBcVersion {
[CmdletBinding()]
param(
)
$global:SelectedBcVersion = Get-ValueFromALTestRunnerConfig -KeyName 'selectedBcVersion'
if ([string]::IsNullOrEmpty($global:SelectedBcVersion)) {
throw "You have to select BC version and eventually download missing libraries."
}
return $global:SelectedBcVersion
}
function Set-SelectedBcVersion {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]$BcVersion
)
$global:SelectedBcVersion = Set-ALTestRunnerConfigValue -KeyName 'selectedBcVersion' -KeyValue $BcVersion
return $global:SelectedBcVersion
}
function Get-SelectedBcVersionLibPath {
[CmdletBinding()]
param(
)
$path = Get-VSCodeExtensionClientContextLibsRootPath
$destPath = Join-Path $path (Get-SelectedBcVersion)
return $destPath
}
##########################
# From BcContainerHelper #
##########################
function Parse-JWTtoken([string]$token) {
if ($token.Contains(".") -and $token.StartsWith("eyJ")) {
$tokenPayload = $token.Split(".")[1].Replace('-', '+').Replace('_', '/')
while ($tokenPayload.Length % 4) { $tokenPayload += "=" }
return [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($tokenPayload)) | ConvertFrom-Json
}
throw "Invalid token"
}
function Test-BcAuthContext {
Param(
$bcAuthContext
)
if (!(($bcAuthContext -is [Hashtable]) -and
($bcAuthContext.ContainsKey('ClientID')) -and
($bcAuthContext.ContainsKey('Credential')) -and
($bcAuthContext.ContainsKey('authority')) -and
($bcAuthContext.ContainsKey('RefreshToken')) -and
($bcAuthContext.ContainsKey('UtcExpiresOn')) -and
($bcAuthContext.ContainsKey('tenantID')) -and
($bcAuthContext.ContainsKey('AccessToken')) -and
($bcAuthContext.ContainsKey('includeDeviceLogin')) -and
($bcAuthContext.ContainsKey('deviceLoginTimeout')))) {
throw 'BcAuthContext should be a HashTable created by New-BcAuthContext.'
}
}
$Global:ExtensionSystemFolderPath = Get-ALTestRunnerConfigPath -ReturnFolderPath
#$global:SelectedBcVersion = Get-SelectedBcVersion
#$Global:ClientSessionLibsPath = Get-SelectedBcVersionLibPath
Export-ModuleMember -Function * |
combined_dataset/train/non-malicious/3017.ps1 | 3017.ps1 | Set-StrictMode -Version Latest
if ($PSVersionTable.PSVersion.Major -le 2) {
return
}
InModuleScope Pester {
function Clear-WhiteSpace ($Text) {
"$($Text -replace "(`t|`n|`r)"," " -replace "\s+"," " -replace "\s*<","<" -replace ">\s*", ">")".Trim()
}
Describe 'Code Coverage Analysis' {
$root = (Get-PSDrive TestDrive).Root
$rootSubFolder = Join-Path -Path $root -ChildPath TestSubFolder
$null = New-Item -Path $rootSubFolder -ItemType Directory -ErrorAction SilentlyContinue
$testScriptPath = Join-Path -Path $root -ChildPath TestScript.ps1
$testScript2Path = Join-Path -Path $root -ChildPath TestScript2.ps1
$testScript3Path = Join-Path -Path $rootSubFolder -ChildPath TestScript3.ps1
$null = New-Item -Path $testScriptPath -ItemType File -ErrorAction SilentlyContinue
Set-Content -Path $testScriptPath -Value @'
function FunctionOne
{
function NestedFunction
{
'I am the nested function.'
'I get fully executed.'
}
if ($true)
{
'I am functionOne'
NestedFunction
}
if ($false) { 'I cannot get called.' }
Invoke-Command { 'I get called.' }
}
function FunctionTwo
{
'I am function two. I never get called.'
}
FunctionOne
'@
if ($PSVersionTable.PSVersion.Major -ge 5) {
Add-Content -Path $testScriptPath -Value @'
class MyClass
{
MyClass()
{
'I am the constructor.'
}
MethodOne()
{
'I am method one.'
}
hidden static MethodTwo()
{
'I am method two. I never get called.'
}
}
$class = [MyClass]::new()
$class.MethodOne()
'@
}
else {
Add-Content -Path $testScriptPath -Value @'
function MyClass
{
'I am the constructor.'
}
function MethodOne
{
'I am method one.'
}
function MethodTwo
{
'I am method two. I never get called.'
}
MyClass
MethodOne
'@
}
$null = New-Item -Path $testScript2Path -ItemType File -ErrorAction SilentlyContinue
Set-Content -Path $testScript2Path -Value @'
'Some {0} file' `
-f `
'other'
'@
$null = New-Item -Path $testScript3Path -ItemType File -ErrorAction SilentlyContinue
Set-Content -Path $testScript3Path -Value @'
'Some {0} file' `
-f `
'other'
'@
Context 'Entire file' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage $testScriptPath, $testScriptPath, $testScript2Path, $testScript3Path -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 18
}
$null = & $testScriptPath
$null = & $testScript2Path
$null = & $testScript3Path
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 15
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 18
}
It 'Reports the proper number of analyzed files' {
$coverageReport.NumberOfFilesAnalyzed | Should -Be 3
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 3
}
It 'Reports the correct missed command' {
$coverageReport.MissedCommands[0].Command | Should -Be "'I cannot get called.'"
$coverageReport.MissedCommands[1].Command | Should -Be "'I am function two. I never get called.'"
$coverageReport.MissedCommands[2].Command | Should -Be "'I am method two. I never get called.'"
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 15
}
It 'Reports the correct hit command' {
$coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'"
}
It 'Reports the correct class names' {
$coverageReport.HitCommands[0].Class | Should -BeNullOrEmpty
if ($PSVersionTable.PSVersion.Major -ge 5) {
$coverageReport.HitCommands[9].Class | Should -Be 'MyClass'
$coverageReport.MissedCommands[2].Class | Should -Be 'MyClass'
}
else {
$coverageReport.HitCommands[9].Class | Should -BeNullOrEmpty
$coverageReport.MissedCommands[2].Class | Should -BeNullOrEmpty
}
}
It 'Reports the correct function names' {
$coverageReport.HitCommands[0].Function | Should -Be 'NestedFunction'
$coverageReport.HitCommands[2].Function | Should -Be 'FunctionOne'
$coverageReport.HitCommands[9].Function | Should -Be 'MyClass'
$coverageReport.MissedCommands[2].Function | Should -Be 'MethodTwo'
}
It 'JaCoCo report must be correct' {
[String]$jaCoCoReportXml = Get-JaCoCoReportXml -PesterState $testState -CoverageReport $coverageReport
$jaCoCoReportXml = $jaCoCoReportXml -replace 'Pester \([^\)]*', 'Pester (date'
$jaCoCoReportXml = $jaCoCoReportXml -replace 'start="[0-9]*"', 'start=""'
$jaCoCoReportXml = $jaCoCoReportXml -replace 'dump="[0-9]*"', 'dump=""'
$jaCoCoReportXml = $jaCoCoReportXml -replace "$([System.Environment]::NewLine)", ''
$jaCoCoReportXml = $jaCoCoReportXml -replace "$(Split-Path -Path $root -Leaf)", 'CommonRoot'
$jaCoCoReportXml = $jaCoCoReportXml.Replace($root.Replace('\', '/'), '')
(Clear-WhiteSpace $jaCoCoReportXml) | Should -Be (Clear-WhiteSpace '
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE report PUBLIC "-//JACOCO//DTD Report 1.1//EN" "report.dtd">
<report name="Pester (date)">
<sessioninfo id="this" start="" dump="" />
<package name="CommonRoot">
<class name="CommonRoot/TestScript" sourcefilename="TestScript.ps1">
<method name="NestedFunction" desc="()" line="5">
<counter type="INSTRUCTION" missed="0" covered="2" />
<counter type="LINE" missed="0" covered="2" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<method name="FunctionOne" desc="()" line="9">
<counter type="INSTRUCTION" missed="1" covered="6" />
<counter type="LINE" missed="0" covered="5" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<method name="FunctionTwo" desc="()" line="22">
<counter type="INSTRUCTION" missed="1" covered="0" />
<counter type="LINE" missed="1" covered="0" />
<counter type="METHOD" missed="1" covered="0" />
</method>
<method name="<script>" desc="()" line="25">
<counter type="INSTRUCTION" missed="0" covered="3" />
<counter type="LINE" missed="0" covered="3" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<method name="MyClass" desc="()" line="32">
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<method name="MethodOne" desc="()" line="37">
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<method name="MethodTwo" desc="()" line="42">
<counter type="INSTRUCTION" missed="1" covered="0" />
<counter type="LINE" missed="1" covered="0" />
<counter type="METHOD" missed="1" covered="0" />
</method>
<counter type="INSTRUCTION" missed="3" covered="13" />
<counter type="LINE" missed="2" covered="12" />
<counter type="METHOD" missed="2" covered="5" />
<counter type="CLASS" missed="0" covered="1" />
</class>
<class name="CommonRoot/TestScript2" sourcefilename="TestScript2.ps1">
<method name="<script>" desc="()" line="1">
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
<counter type="CLASS" missed="0" covered="1" />
</class>
<sourcefile name="TestScript.ps1">
<line nr="5" mi="0" ci="1" />
<line nr="6" mi="0" ci="1" />
<line nr="9" mi="0" ci="1" />
<line nr="11" mi="0" ci="1" />
<line nr="12" mi="0" ci="1" />
<line nr="15" mi="1" ci="1" />
<line nr="17" mi="0" ci="2" />
<line nr="22" mi="1" ci="0" />
<line nr="25" mi="0" ci="1" />
<line nr="32" mi="0" ci="1" />
<line nr="37" mi="0" ci="1" />
<line nr="42" mi="1" ci="0" />
<line nr="46" mi="0" ci="1" />
<line nr="47" mi="0" ci="1" />
<counter type="INSTRUCTION" missed="3" covered="13" />
<counter type="LINE" missed="2" covered="12" />
<counter type="METHOD" missed="2" covered="5" />
<counter type="CLASS" missed="0" covered="1" />
</sourcefile>
<sourcefile name="TestScript2.ps1">
<line nr="1" mi="0" ci="1" />
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
<counter type="CLASS" missed="0" covered="1" />
</sourcefile>
<counter type="INSTRUCTION" missed="3" covered="14" />
<counter type="LINE" missed="2" covered="13" />
<counter type="METHOD" missed="2" covered="6" />
<counter type="CLASS" missed="0" covered="2" />
</package>
<package name="CommonRoot/TestSubFolder">
<class name="CommonRoot/TestSubFolder/TestScript3" sourcefilename="TestScript3.ps1">
<method name="<script>" desc="()" line="1">
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
</method>
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
<counter type="CLASS" missed="0" covered="1" />
</class>
<sourcefile name="TestScript3.ps1">
<line nr="1" mi="0" ci="1" />
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
<counter type="CLASS" missed="0" covered="1" />
</sourcefile>
<counter type="INSTRUCTION" missed="0" covered="1" />
<counter type="LINE" missed="0" covered="1" />
<counter type="METHOD" missed="0" covered="1" />
<counter type="CLASS" missed="0" covered="1" />
</package>
<counter type="INSTRUCTION" missed="3" covered="15" />
<counter type="LINE" missed="2" covered="14" />
<counter type="METHOD" missed="2" covered="7" />
<counter type="CLASS" missed="0" covered="3" />
</report>
')
}
It 'Reports the right line numbers' {
$coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].Line | Should -Be 1
$coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].StartLine | Should -Be 1
$coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].EndLine | Should -Be 3
}
It 'Reports the right column numbers' {
$coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].StartColumn | Should -Be 13
$coverageReport.HitCommands[$coverageReport.NumberOfCommandsExecuted - 1].EndColumn | Should -Be 24
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Single function with missed commands' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Function = 'FunctionTwo'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 1
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 0
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 1
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 1
}
It 'Reports the correct missed command' {
$coverageReport.MissedCommands[0].Command | Should -Be "'I am function two. I never get called.'"
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 0
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Single function with no missed commands' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Function = 'FunctionOne'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 9
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 8
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 9
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 1
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 8
}
It 'Reports the correct hit command' {
$coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'"
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Range of lines' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; StartLine = 11; EndLine = 12 } -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 2
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 2
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 2
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 0
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 2
}
It 'Reports the correct hit command' {
$coverageReport.HitCommands[0].Command | Should -Be "'I am functionOne'"
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Function wildcard resolution' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = "$(Join-Path -Path $root -ChildPath *.ps1)"; Function = '*' } -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 13
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 10
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 13
}
It 'Reports the proper number of analyzed files' {
$coverageReport.NumberOfFilesAnalyzed | Should -Be 1
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 3
}
It 'Reports the correct missed command' {
$coverageReport.MissedCommands[0].Command | Should -Be "'I cannot get called.'"
$coverageReport.MissedCommands[1].Command | Should -Be "'I am function two. I never get called.'"
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 10
}
It 'Reports the correct hit command' {
$coverageReport.HitCommands[0].Command | Should -Be "'I am the nested function.'"
}
Exit-CoverageAnalysis -PesterState $testState
}
if ($PSVersionTable.PSVersion.Major -ge 5) {
Context 'Single class' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 3
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 2
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 3
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 1
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 2
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Class wildcard resolution' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = '*'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 3
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 2
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 3
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 1
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 2
}
Exit-CoverageAnalysis -PesterState $testState
}
Context 'Class and function filter' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'; Function = 'MethodTwo'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 1
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 0
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 1
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 1
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 0
}
Exit-CoverageAnalysis -PesterState $testState
}
}
else {
Context 'Single class when not supported' {
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage @{Path = $testScriptPath; Class = 'MyClass'} -PesterState $testState
It 'Has the proper number of breakpoints defined' {
$testState.CommandCoverage.Count | Should -Be 0
}
$null = & $testScriptPath
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of executed commands' {
$coverageReport.NumberOfCommandsExecuted | Should -Be 0
}
It 'Reports the proper number of analyzed commands' {
$coverageReport.NumberOfCommandsAnalyzed | Should -Be 0
}
It 'Reports the proper number of missed commands' {
$coverageReport.MissedCommands.Count | Should -Be 0
}
It 'Reports the proper number of hit commands' {
$coverageReport.HitCommands.Count | Should -Be 0
}
Exit-CoverageAnalysis -PesterState $testState
}
}
}
Describe 'Path resolution for test files' {
$root = (Get-PSDrive TestDrive).Root
$null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript.ps1) -ItemType File -ErrorAction SilentlyContinue
$null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript.tests.ps1) -ItemType File -ErrorAction SilentlyContinue
$null = New-Item -Path $(Join-Path -Path $root -ChildPath TestScript2.tests.ps1) -ItemType File -ErrorAction SilentlyContinue
Context 'Using Path-input (auto-detect)' {
It 'Excludes test files by default when using wildcard path' {
$coverageInfo = Get-CoverageInfoFromUserInput "$(Join-Path -Path $root -ChildPath *)"
$PesterTests = @($coverageInfo |
Select-Object -ExpandProperty Path |
Where-Object { $_ -match '\.tests.ps1$' })
$PesterTests | Should -BeNullOrEmpty
}
It 'Includes test files when specified in wildcard path' {
$coverageInfo = Get-CoverageInfoFromUserInput "$(Join-Path -Path $root -ChildPath *.tests.ps1)"
$PesterTests = @($coverageInfo |
Select-Object -ExpandProperty Path |
Where-Object { $_ -match '\.tests.ps1$' })
$PesterTests.Count | Should -Be 2
$PesterTests | Should -Contain $(Join-Path -Path $root -ChildPath TestScript.tests.ps1)
$PesterTests | Should -Contain $(Join-Path -Path $root -ChildPath TestScript2.tests.ps1)
}
It 'Includes test file when targeted directly using filepath' {
$path = Join-Path -Path $root -ChildPath TestScript.tests.ps1
$coverageInfo = Get-CoverageInfoFromUserInput $path
$PesterTests = $coverageInfo | Select-Object -ExpandProperty Path
$PesterTests | Should -Be $path
}
}
Context 'Using object-input' {
It 'Excludes test files when IncludeTests is not specified' {
$coverageInfo = Get-CoverageInfoFromUserInput @{ Path = "$(Join-Path -Path $root -ChildPath TestScript.tests.ps1)" }
$PesterTests = $coverageInfo | Select-Object -ExpandProperty Path
$PesterTests | Should -BeNullOrEmpty
}
It 'Excludes test files when IncludeTests is false' {
$coverageInfo = Get-CoverageInfoFromUserInput @{ Path = "$(Join-Path -Path $root -ChildPath TestScript.tests.ps1)"; IncludeTests = $false }
$PesterTests = $coverageInfo | Select-Object -ExpandProperty Path
$PesterTests | Should -BeNullOrEmpty
}
It 'Includes test files when IncludeTests is true' {
$path = Join-Path -Path $root -ChildPath TestScript.tests.ps1
$coverageInfo = Get-CoverageInfoFromUserInput @{ Path = $path; IncludeTests = $true }
$PesterTests = $coverageInfo | Select-Object -ExpandProperty Path
$PesterTests | Should -Be $path
}
}
}
Describe 'Stripping common parent paths' {
If ( (& $SafeCommands['Get-Variable'] -Name IsLinux -Scope Global -ErrorAction SilentlyContinue) -or
(& $SafeCommands['Get-Variable'] -Name IsMacOS -Scope Global -ErrorAction SilentlyContinue)) {
$paths = @(
Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder1/File.ps1'
Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder2/File2.ps1'
Normalize-Path '/usr/lib/Common\Folder\UniqueSubfolder3/File3.ps1'
$expectedCommonPath = Normalize-Path '/usr/lib/Common/Folder'
)
}
Else {
$paths = @(
Normalize-Path 'C:\Common\Folder\UniqueSubfolder1/File.ps1'
Normalize-Path 'C:\Common\Folder\UniqueSubfolder2/File2.ps1'
Normalize-Path 'C:\Common\Folder\UniqueSubfolder3/File3.ps1'
$expectedCommonPath = Normalize-Path 'C:\Common/Folder'
)
}
$commonPath = Get-CommonParentPath -Path $paths
It 'Identifies the correct parent path' {
$commonPath | Should -Be $expectedCommonPath
}
$expectedRelativePath = Normalize-Path 'UniqueSubfolder1/File.ps1'
$relativePath = Get-RelativePath -Path $paths[0] -RelativeTo $commonPath
It 'Strips the common path correctly' {
$relativePath | Should -Be $expectedRelativePath
}
}
if ((Get-Module -ListAvailable PSDesiredStateConfiguration) -and $PSVersionTable.PSVersion.Major -ge 4 -and ((GetPesterOS) -eq 'Windows')) {
Describe 'Analyzing coverage of a DSC configuration' {
$root = (Get-PSDrive TestDrive).Root
$null = New-Item -Path $root\TestScriptWithConfiguration.ps1 -ItemType File -ErrorAction SilentlyContinue
Set-Content -Path $root\TestScriptWithConfiguration.ps1 -Value @'
$line1 = $true
$line2 = $true
configuration MyTestConfig
{
Import-DscResource -ModuleName PSDesiredStateConfiguration
Node localhost
{
WindowsFeature XPSViewer
{
Name = 'XPS-Viewer'
Ensure = 'Present'
}
}
return
$doesNotExecute = $true
}
$line3 = $true
return
$doesnotexecute = $true
'@
$testState = New-PesterState -Path $root
Enter-CoverageAnalysis -CodeCoverage "$root\TestScriptWithConfiguration.ps1" -PesterState $testState
$runsInPowerShell4 = $PSVersionTable.PSVersion.Major -eq 4
It 'Has the proper number of breakpoints defined' {
if ($runsInPowerShell4) {
$expected = 7
}
else {
$expected = 8
}
$testState.CommandCoverage.Count | Should -Be $expected
}
$null = . "$root\TestScriptWithConfiguration.ps1"
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of missed commands before running the configuration' {
if ($runsInPowerShell4) {
$expected = 4
}
else {
$expected = 5
}
$coverageReport.MissedCommands.Count | Should -Be $expected
}
MyTestConfig -OutputPath $root
$coverageReport = Get-CoverageReport -PesterState $testState
It 'Reports the proper number of missed commands after running the configuration' {
if ($runsInPowerShell4) {
$expected = 2
}
else {
$expected = 3
}
$coverageReport.MissedCommands.Count | Should -Be $expected
}
Exit-CoverageAnalysis -PesterState $testState
}
}
}
|
combined_dataset/train/non-malicious/3440.ps1 | 3440.ps1 | [CmdletBinding()]
Param(
[Parameter(Mandatory=$False, Position=0)]
[String]$Folder,
[Parameter(Mandatory=$False)]
[bool]$Major,
[Parameter(Mandatory=$False)]
[bool]$Minor,
[Parameter(Mandatory=$False)]
[bool]$Patch
)
function ReplaceVersion([string]$key, [string]$line)
{
$matches = ([regex]::matches($line, "$key\s*=\s*['\""]([\d\.]+)['\""]"))
if($matches.Count -eq 1)
{
$packageVersion = $matches.Groups[1].Value
$version = $packageVersion.Split(".")
$cMajor = $Major
$cMinor = $Minor
$cPatch = $Patch
if ($version[0] -eq 0)
{
if ($cMajor -eq $true)
{
$version[1] = 1 + $version[1]
$version[2] = "0"
}
if ($cMinor -eq $true -or $cPatch -eq $true)
{
$version[2] = 1 + $version[2]
}
}
else
{
if ($cMajor -eq $true)
{
$version[0] = 1 + $version[0]
$version[1] = "0"
$version[2] = "0"
}
if ($cMinor -eq $true)
{
$version[1] = 1 + $version[1]
$version[2] = "0"
}
if ($cPatch -eq $true)
{
$version[2] = 1 + $version[2]
}
}
$version = [String]::Join(".", $version)
$line -Replace "$key(\s*)=(\s*)(['\""])$packageVersion(['\""])", ($key + '${1}=${2}${3}' + $version + '$4')
} else {
$line
}
}
function IncrementVersion([string]$FilePath)
{
Write-Output "Updating File: $FilePath"
(Get-Content $FilePath) |
ForEach-Object {
$temp = ReplaceVersion "ModuleVersion" $_
ReplaceVersion "RequiredVersion" $temp
} | Set-Content -Path $FilePath -Encoding UTF8
}
if (!$Folder)
{
$Folder = "$PSScriptRoot\..\src"
}
$modules = Get-ChildItem -Path $Folder -Filter *.psd1 -Recurse -Exclude *.dll-help.psd1
ForEach ($module in $modules)
{
IncrementVersion($module.FullName)
} |
combined_dataset/train/non-malicious/sample_2_62.ps1 | sample_2_62.ps1 | <#
.SYNOPSIS
DEV Components and Scenarios module for learning and demoing TSS Framework usage.
This is NOT related to any specific POD and not designed for learning and troubleshooting.
.DESCRIPTION
DEV Components and Scenarios module for learning and demoing TSS Framework usage.
This is NOT related to any specific POD and not designed for learning and troubleshooting.
.NOTES
Dev. Lead: milanmil
Authors : milanmil, waltere
Requires : PowerShell V4(Supported from Windows 8.1/Windows Server 2012 R2)
Version : see $global:TssVerDateDEV
.LINK
TSS https://internal.evergreen.microsoft.com/en-us/help/4619187
#>
<# latest changes
:: 2023.08.07.0 [mm] _ADS: move ADS_EESummit to DEV_EESummit
:: 2023.01.23.0 [we] _DEV: added function DevTest
:: 2022.12.07.0 [we] _DEV: add -Scenario DEV_General
:: 2022.01.05.0 [we] added FW function calls which were previously defined in _NET
:: 2021.11.10.0 [we] #_# replaced all 'Get-WmiObject' with 'Get-CimInstance' to be compatible with PowerShell v7
#>
$global:TssVerDateDEV= "2023.08.17.0"
#region --- ETW component trace Providers ---
# Normal trace -> data will be collected in a single file
$DEV_TEST1Providers = @(
'{CC85922F-DB41-11D2-9244-006008269001}' # LSA
'{6B510852-3583-4E2D-AFFE-A67F9F223438}' # Kerberos
)
# Normal trace with multi etl files
# Syntax is: GUID!filename!flags!level
# GUID is mandtory
# if filename is not provided TSS will create etl using Providers name, i.e. dev_test2
# if flags is not provided, TSS defaults to 0xffffffff
# if level is not provided, TSS defaults to 0xff
$DEV_TEST2Providers = @(
'{98BF1CD3-583E-4926-95EE-A61BF3F46470}!CertCli!0xffffff!0x05'
'{6A71D062-9AFE-4F35-AD08-52134F85DFB9}!CertificationAuthority!0xff!0x07'
'{B40AEF77-892A-46F9-9109-438E399BB894}!CertCli!0xfffffe!0x04'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xfffffffe'
'{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}!CertificationAuthority!0xC43EFF!0x06'
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff!0x0f'
)
# Single etl + multi flags
$DEV_TEST3Providers = @(
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff'
)
$DEV_TEST4Providers = @(
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff'
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff!0x0f'
'{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}!CertificationAuthority!0xC43EFF!0x06'
)
$DEV_EESummitDemoProviders = @(
'{CA030134-54CD-4130-9177-DAE76A3C5791}!netlogon' # NETLOGON/ NETLIB
'{E5BA83F6-07D0-46B1-8BC7-7E669A1D31DC}!netlogon' # Microsoft-Windows-Security-Netlogon
'{8EE3A3BF-9379-4DAC-B376-038F498B19A4}!w32time' # Microsoft.Windows.W32Time
)
#select basic or full tracing option for the same etl guids using different flags
if ($global:CustomParams){
Switch ($global:CustomParams[0]){
"full" {$DEV_TEST5Providers = @(
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xffffffff'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffffff'
)
}
"basic" {$DEV_TEST5Providers = @(
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xffffff'
)
}
Default {$DEV_TEST5Providers = @(
'{D0B639E0-E650-4D1D-8F39-1580ADE72784}!lsa!0xC43EFF'
'{169EC169-5B77-4A3E-9DB6-441799D5CACB}!lsa!0xfffff!0x12'
)
}
}
}
#endregion --- ETW component trace Providers ---
#region --- Scenario definitions ---
$DEV_General_ETWTracingSwitchesStatus = [Ordered]@{
#'NET_Dummy' = $true
'CommonTask NET' = $True ## <------ the commontask can take one of "Dev", "NET", "ADS", "UEX", "DnD" and "SHA", or "Full" or "Mini"
'NetshScenario InternetClient_dbg' = $true
'Procmon' = $true
#'WPR General' = $true
'PerfMon ALL' = $true
'PSR' = $true
'Video' = $true
'SDP NET' = $True
'xray' = $True
'CollectComponentLog' = $True
}
$DEV_ScenarioTraceList = [Ordered]@{
'DEV_Scn1' = 'DEV scenario trace 1'
'DEV_Scn2' = 'DEV scenario trace 2'
"DEV_EESummitDemo" = "DEV_EESummitDemo Trace, ADS_Kerb, PSR, Netsh"
}
# DEV_Scn1
$DEV_Scn1_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST1' = $true
#'DEV_TEST2' = $true # Multi etl file trace
#'DEV_TEST3' = $true # Single trace
#'DEV_TEST4' = $true
#'DEV_TEST5' = $true
#'Netsh' = $true
#'Netsh capturetype=both captureMultilayer=yes provider=Microsoft-Windows-PrimaryNetworkIcon provider={1701C7DC-045C-45C0-8CD6-4D42E3BBF387}' = $true
#'NetshMaxSize 4096' = $true
#'Procmon' = $true
#'ProcmonFilter ProcmonConfiguration.pmc' = $True
#'ProcmonPath C:\tools' = $True
#'WPR memory' = $true
#'WPR memory -onoffproblemdescription "test description"' = $true
#'skippdbgen' = $true
#'PerfMon smb' = $true
#'PerfIntervalSec 20' = $true
#'PerfMonlong general' = $true
#'PerfLongIntervalMin 40' = $true
#'NetshScenario InternetClient_dbg' = $true
#'NetshScenario InternetClient_dbg,dns_wpp' = $true
#'NetshScenario InternetClient_dbg,dns_wpp capturetype=both captureMultilayer=yes provider=Microsoft-Windows-PrimaryNetworkIcon provider={1701C7DC-045C-45C0-8CD6-4D42E3BBF387}' = $true
#'PSR' = $true
#'WFPdiag' = $true
#'RASdiag' = $true
#'PktMon' = $true
#'AddDescription' = $true
#'SDP rds' = $True
#'SDP setup,perf' = $True
#'SkipSDPList noNetadapters,skipBPA' = $True
#'xray' = $True
#'Video' = $True
#'SysMon' = $True
#'CommonTask Mini' = $True
#'CommonTask Full' = $True
#'CommonTask Dev' = $True
#'noBasicLog' = $True
#'noPSR' = $True
#'noVideo' = $True
#'Mini' = $True
#'NoSettingList noSDP,noXray,noBasiclog,noVideo,noPSR' = $True
#'Xperf Pool' = $True
#'XPerfMaxFile 4096' = $True
#'XperfTag TcpE+AleE+AfdE+AfdX' = $True
#'XperfPIDs 100' = $True
#'LiveKD Both' = $True
#'WireShark' = $True
#'TTD notepad.exe' = $True # Single process [<processname.exe>|<PID>]
#'TTD notepad.exe,cmd.exe' = $True # Multiple processes
#'TTD tokenbroker' = $True # Service name
#'TTD Microsoft.Windows.Photos' = $True # AppX
#"TTDPath $env:userprofile\Desktop\PartnerTTDRecorder_x86_x64\amd64\TTD" = $True # for downlevel OS TTD will find Partner tttracer in \Bin** folder
#'TTDMode Ring' = $True # choose [Full|Ring|onLaunch]
#'TTDMaxFile 2048' = $True
#'TTDOptions XXX' = $True
#'CollectComponentLog' = $True
#'Discard' = $True
#'ProcDump notepad.exe,mspaint.exe,tokenbroker' = $true
#'ProcDumpOption Both' = $true
#'ProcDumpInterval 3:10' = $True
#'GPResult Both' = $True
#'PoolMon Both' = $True
#'Handle Both' = $True
}
# DEV_Scn2
Switch (global:FwGetProductTypeFromReg){
"WinNT" {
$DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST1' = $true
'DEV_TEST2' = $true # Multi etl file trace
'DEV_TEST3' = $true
'DEV_TEST4' = $true # Single trace
'DEV_TEST5' = $False # Disabled trace
'UEX_Task' = $True # Outside of this module
}
}
"ServerNT" {
$DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST1' = $true
'DEV_TEST2' = $true
}
}
"LanmanNT" {
$DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST1' = $true
'DEV_TEST2' = $true
}
}
Default {
$DEV_Scn2_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST1' = $true
'DEV_TEST2' = $true
}
}
}
# Dev_Scn3 => Multi etl only
$DEV_Scn3_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_TEST2' = $true # Multi etl file trace
}
$DEV_EESummitDemo_ETWTracingSwitchesStatus = [Ordered]@{
'DEV_EESummitDemo' = $true
'ADS_Kerb' = $true
'Netsh' = $true
'PSR' = $true
'xray' = $true
'noBasicLog' = $true
'CollectComponentLog' = $True
}
#endregion --- Scenario definitions ---
#region Functions
#region Components Functions
#region -------------- DevTest -----------
# IMPORTANT: this trace should be used only for development and testing purposes
function DevTestPreStart{
EnterFunc $MyInvocation.MyCommand.Name
LogInfoFile "[$($MyInvocation.MyCommand.Name)] .. started"
global:FwCollect_BasicLog
#### Various EVENT LOG actions ***
# A simple way for exporting EventLogs in .evtx and .txt format is done by function FwAddEvtLog ($EvtLogsLAPS array is defined at bottom of this file)
# Ex: ($EvtLogsLAPS) | ForEach-Object { FwAddEvtLog $_ _Stop_}
#Event Log - Set Log - Enable
$EventLogSetLogListOn = New-Object 'System.Collections.Generic.List[Object]'
$EventLogSetLogListOn = @( #LogName, enabled, retention, quiet, MaxSize
@("Microsoft-Windows-CAPI2/Operational", "true", "false", "true", "102400000"),
@("Microsoft-Windows-Kerberos/Operational", "true", "", "", "")
)
ForEach ($EventLog in $EventLogSetLogListOn)
{
global:FwEventLogsSet $EventLog[0] $EventLog[1] $EventLog[2] $EventLog[3] $EventLog[4]
}
#Event Log - Export Log
$EventLogExportLogList = New-Object 'System.Collections.Generic.List[Object]'
$EventLogExportLogList = @( #LogName, filename, overwrite
@("Microsoft-Windows-CAPI2/Operational", "c:\dev\Capi2_Oper.evtx", "true"),
@("Microsoft-Windows-Kerberos/Operational", "c:\dev\Kerberos_Oper.evtx", "true")
)
ForEach ($EventLog in $EventLogExportLogList)
{
global:FwExportSingleEventLog $EventLog[0] $EventLog[1] $EventLog[2]
}
#Event Log - Set Log - Disable
$EventLogSetLogListOff = New-Object 'System.Collections.Generic.List[Object]'
$EventLogSetLogListOff = @( #LogName, enabled, retention, quiet, MaxSize
@("Microsoft-Windows-CAPI2/Operational", "false", "", "", ""),
@("Microsoft-Windows-Kerberos/Operational", "false", "", "", "")
)
ForEach ($EventLog in $EventLogSetLogListOff)
{
global:FwEventLogsSet $EventLog[0] $EventLog[1] $EventLog[2] $EventLog[3] $EventLog[4]
}
#Event Log - Clear Log
$EventLogClearLogList = New-Object 'System.Collections.Generic.List[Object]'
$EventLogClearLogList = @( #LogName, enabled, retention, quiet, MaxSize
@("Microsoft-Windows-CAPI2/Operational"),
@("Microsoft-Windows-Kerberos/Operational")
)
ForEach ($EventLog in $EventLogClearLogList)
{
global:FwEventLogClear $EventLog[0]
}
#### Various REGISTRY manipulaiton functions ***
# A simple way for exporting Regisgtry keys is done by function FwAddRegItem with a registry array defined at bottom of this file ($global:KeysWinLAPS)
# Ex.: FwAddRegItem @("WinLAPS") _Stop_
# RegAddValues
$RegAddValues = New-Object 'System.Collections.Generic.List[Object]'
$RegAddValues = @( #RegKey, RegValue, Type, Data
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test1", "REG_DWORD", "0x1"),
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test2", "REG_DWORD", "0x2")
)
ForEach ($regadd in $RegAddValues)
{
global:FwAddRegValue $regadd[0] $regadd[1] $regadd[2] $regadd[3]
}
# RegExport in TXT
LogInfo "[$global:TssPhase ADS Stage:] Exporting Reg.keys .. " "gray"
$RegExportKeyInTxt = New-Object 'System.Collections.Generic.List[Object]'
$RegExportKeyInTxt = @( #Key, ExportFile, Format (TXT or REG)
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "C:\Dev\regtestexportTXT1.txt", "TXT"),
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL", "C:\Dev\regtestexportTXT2.txt", "TXT")
)
ForEach ($regtxtexport in $RegExportKeyInTxt)
{
global:FwExportRegKey $regtxtexport[0] $regtxtexport[1] $regtxtexport[2]
}
# RegExport in REG
$RegExportKeyInReg = New-Object 'System.Collections.Generic.List[Object]'
$RegExportKeyInReg = @( #Key, ExportFile, Format (TXT or REG)
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "C:\Dev\regtestexportREG1.reg", "REG"),
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL", "C:\Dev\regtestexportREG2.reg", "REG")
)
ForEach ($regregexport in $RegExportKeyInReg)
{
global:FwExportRegKey $regregexport[0] $regregexport[1] $regregexport[2]
}
# RegDeleteValues
$RegDeleteValues = New-Object 'System.Collections.Generic.List[Object]'
$RegDeleteValues = @( #RegKey, RegValue
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test1"),
@("HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\My Key", "my test2")
)
ForEach ($regdel in $RegDeleteValues)
{
global:FwDeleteRegValue $regdel[0] $regdel[1]
}
#### FILE COPY Operations ***
# Create Dest. Folder
FwCreateFolder $global:LogFolder\Files_test2
$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
$SourceDestinationPaths = @( #source (* wildcard is supported) and destination
@("C:\Dev\my folder\test*", "$global:LogFolder\Files_test2"), #this will copy all files that match * criteria into dest folder
@("C:\Dev\my folder\test1.txt", "$global:LogFolder\Files_test2") #this will copy test1.txt to destination file name and add logprefix
)
global:FwCopyFiles $SourceDestinationPaths
EndFunc $MyInvocation.MyCommand.Name
}
function DevTestPostStop{
EnterFunc $MyInvocation.MyCommand.Name
LogInfoFile "[$($MyInvocation.MyCommand.Name)] .. started"
EndFunc $MyInvocation.MyCommand.Name
}
#endregion -------------- DevTest -----------
### Pre-Start / Post-Stop / Collect / Diag function for Components tracing
##### Pre-Start / Post-Stop function for trace
function DEV_TEST1PreStart{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
# Testing FwSetEventLog
#FwSetEventLog "Microsoft-Windows-CAPI2/Operational" -EvtxLogSize:100000 -ClearLog
#FwSetEventLog 'Microsoft-Windows-CAPI2/Catalog Database Debug' -EvtxLogSize:102400000
#$PowerShellEvtLogs = @("Microsoft-Windows-PowerShell/Admin", "Microsoft-Windows-PowerShell/Operational")
#FwSetEventLog $PowerShellEvtLogs
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST1PostStart{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST1PreStop{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
#LogWarn "** Will do Forced Crash now" cyan
#FwDoCrash
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST1PostStop{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
# Testing FwResetEventLog
#FwResetEventLog 'Microsoft-Windows-CAPI2/Operational'
#FWResetEventLog 'Microsoft-Windows-CAPI2/Catalog Database Debug'
#$PowerShellEvtLogs = @("Microsoft-Windows-PowerShell/Admin", "Microsoft-Windows-PowerShell/Operational")
#FwResetEventLog $PowerShellEvtLogs
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST2PreStart{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST2PostStop{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST3PreStart{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_TEST3PostStop{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
<#
$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
$SourceDestinationPaths = @(
@("$env:ProgramData\Microsoft\WlanSvc\*", "$global:LogFolder\files_ProgramData_WlanSvc"),
@("C:\Subst_E\test2\2_SDP_RFL", "$global:LogFolder"),
@("C:\Subst_E\test1\SDP_RFL", "$global:LogFolder\SDP_RFL"),
@("C:\Subst_E\test2\2_SDP_RFL\*", "$global:LogFolder\SDP_RFL2")
)
FwCopyFolders $SourceDestinationPaths -ShowMessage:$True
#>
#FwCreateFolder $global:LogFolder\Test2
$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
$SourceDestinationPaths = @(
@("C:\Subst_E\folder-missing\*", "$global:LogFolder\folder-missing\"),
@("C:\Subst_E\test1\file-missing.txt", "$global:LogFolder\file-missing\"),
@("C:\Subst_E\test1\SDP_RFL\*", "$global:LogFolder\test1-SDP-RFL"), #<== don't forget the comma when having multi-line arrays!
@("C:\Subst_E\test2\2_SDP_RFL\Win10*.txt", "$global:LogFolder\Test2\"),
@("C:\Subst_E\test3\SDP_RFL\WIN10-22H2_230630-181531__Log-transcript.txt", "$global:LogFolder\Test3\my-new.txt")
)
FwCopyFiles $SourceDestinationPaths -ShowMessage:$True
EndFunc $MyInvocation.MyCommand.Name
}
##### Data Collection
function CollectDEV_TEST1Log{
EnterFunc $MyInvocation.MyCommand.Name
$LogPrefix = "Dev_TEST1"
$LogFolderforDEV_TEST1 = "$Logfolder\Dev_TEST1"
FwCreateFolder $LogFolderforDEV_TEST1
<#
<#--- Log functions ---#>
#LogDebug "This is message from LogDebug."
#LogInfo "This is message from LogInfo."
#LogWarn "This is message from LogWarn."
#LogError "This is message from LogError."
#Try{
# Throw "Test exception"
#}Catch{
# LogException "This is message from LogException" $_
#}
#LogInfoFile "This is message from LogInfoFile."
#LogWarnFile "This is message from LogWarnFile."
#LogErrorFile "This is message from LogErrorFile."
<#--- Test ExportEventLog and FwExportEventLogWithTXTFormat ---#>
#FwExportEventLog 'System' $LogFolderforDEV_TEST1
#ExportEventLog "Microsoft-Windows-DNS-Client/Operational" $LogFolderforDEV_TEST1
#FwExportEventLogWithTXTFormat 'System' $LogFolderforDEV_TEST1
<#--- FwSetEventLog and FwResetEventLog ---#>
#$EventLogs = @(
# 'Microsoft-Windows-WMI-Activity/Trace'
# 'Microsoft-Windows-WMI-Activity/Debug'
#)
#FwSetEventLog $EventLogs
#Start-Sleep 20
#FwResetEventLog $EventLogs
<#--- FwAddEvtLog and FwGetEvtLogList ---#>
#($EvtLogsBluetooth) | ForEach-Object { FwAddEvtLog $_ _Stop_} # see #region groups of Eventlogs for FwAddEvtLog
#_# Note: FwGetEvtLogList should be called in _Start_Common_Tasks and _Start_Common_Tasks POD functions, otherwise it is called in FW FwCollect_BasicLog/FwCollect_MiniBasicLog functions
<#--- FwAddRegItem and FwGetRegList ---#>
#FwAddRegItem @("SNMP", "Tcp") _Stop_ # see #region Registry Key modules for FwAddRegItem
#_# Note: FwGetRegList should be called in _Start_Common_Tasks and _Start_Common_Tasks POD functions, otherwise it is called in FW FwCollect_BasicLog/FwCollect_MiniBasicLog functions
<#--- Test RunCommands --#>
#$outFile = "$LogFolderforDEV_TEST1\netinfo.txt"
#$Commands = @(
# "IPCONFIG /ALL | Out-File -Append $outFile"
# "netsh interface IP show config | Out-File -Append $outFile"
#)
#RunCommands "$LogPrefix" $Commands -ThrowException:$False -ShowMessage:$True
<#--- FwCopyFiles ---#>
# Case 1: Copy a single set of files
#$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
#$SourceDestinationPaths.add(@("C:\Temp\*", "$LogFolderforDEV_TEST1"))
#FwCopyFiles $SourceDestinationPaths
# Case 2: Copy a single file
#$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
#$SourceDestinationPaths.add(@("C:\temp\test-case2.txt", "$LogFolderforDEV_TEST1"))
#FwCopyFiles $SourceDestinationPaths
# Case 3: Copy multi sets of files
#$SourceDestinationPaths = New-Object 'System.Collections.Generic.List[Object]'
#$SourceDestinationPaths = @(
# @("C:\temp\*", "$LogFolderforDEV_TEST1"),
# @("C:\temp2\test-case3.txt", "$LogFolderforDEV_TEST1")
#)
#FwCopyFiles $SourceDestinationPaths
<#--- FwExportRegistry and FwExportRegToOneFile ---#>
#LogInfo '[$LogPrefix] testing FwExportRegistry().'
#$RecoveryKeys = @(
# ('HKLM:System\CurrentControlSet\Control\CrashControl', "$LogFolderforDEV_TEST1\Basic_Registry_CrashControl.txt"),
# ('HKLM:System\CurrentControlSet\Control\Session Manager\Memory Management', "$LogFolderforDEV_TEST1\Basic_Registry_MemoryManagement.txt"),
# ('HKLM:Software\Microsoft\Windows NT\CurrentVersion\AeDebug', "$LogFolderforDEV_TEST1\Basic_Registry_AeDebug.txt"),
# ('HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Option', "$LogFolderforDEV_TEST1\Basic_Registry_ImageFileExecutionOption.txt"),
# ('HKLM:System\CurrentControlSet\Control\Session Manager\Power', "$LogFolderforDEV_TEST1\Basic_Registry_Power.txt")
#)
#FwExportRegistry $LogPrefix $RecoveryKeys
#
#$StartupKeys = @(
# "HKCU:Software\Microsoft\Windows\CurrentVersion\Run",
# "HKCU:Software\Microsoft\Windows\CurrentVersion\Runonce",
# "HKCU:Software\Microsoft\Windows\CurrentVersion\RunonceEx"
#)
#FwExportRegToOneFile $LogPrefix $StartupKeys "$LogFolderforDEV_TEST1\Basic_Registry_RunOnce_reg.txt"
<#---FwCaptureUserDump ---#>
# Service
#FwCaptureUserDump -Name "Winmgmt" -DumpFolder $LogFolderforDEV_TEST1 -IsService:$True
# Process
#FwCaptureUserDump -Name "notepad" -DumpFolder $LogFolderforDEV_TEST1
# PID
#FwCaptureUserDump -ProcPID 4524 -DumpFolder $LogFolderforDEV_TEST1
<#---general collect functions - often used in _Start/Stop_common_tasks---#>
#FwClearCaches _Start_
#FwCopyWindirTracing IPhlpSvc
#FwDoCrash
#FwGetCertsInfo _Stop_ Basic
#FwGetEnv
#FwGetGPresultAS
#FwGetKlist
#FwGetMsInfo32
#FwGetNltestDomInfo
#FwGetPoolmon
#FwGetProxyInfo
#FwGetQwinsta
#FwGetRegHives
#FwRestartInOwnSvc WebClient
#FwGetSVC
#FwGetSVCactive
#FwGetSysInfo
#FwGetTaskList
#FwGetWhoAmI
#FwTest-TCPport -ComputerName "cesdiagtools.blob.core.windows.net" -Port 80 -Timeout 900
EndFunc $MyInvocation.MyCommand.Name
}
function CollectDEV_TEST2Log
{
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
##### Diag function
function RunDEV_TEST1Diag
{
EnterFunc $MyInvocation.MyCommand.Name
If($global:BoundParameters.containskey('InputlogPath')){
$diagpath = $global:BoundParameters['InputlogPath']
LogInfo "diagpath = $diagpath"
}
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
<#
function RunDEV_TEST2Diag
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
#>
#endregion Components Functions
#region Scenario Functions
### Pre-Start / Post-Stop / Collect / Diag function for scenario tracing
##### Common tasks
function DEV_Start_Common_Tasks{
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "$($MyInvocation.MyCommand.Name) is called."
#FwGetRegList _Start_
#FwGetEvtLogList _Start_
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_Stop_Common_Tasks{
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "$($MyInvocation.MyCommand.Name) is called."
#FwGetRegList _Stop_
#FwGetEvtLogList _Stop_
EndFunc $MyInvocation.MyCommand.Name
}
##### DEV_Scn1
function DEV_Scn1ScenarioPreStart
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_Scn1ScenarioPostStart
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_Scn1ScenarioPreStop
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_Scn1ScenarioPostStop
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function CollectDEV_Scn1ScenarioLog
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function RunDEV_Scn1ScenarioDiag
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
##### DEV_Scn2
function DEV_Scn2ScenarioPreStart
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_Scn2ScenarioPostStop
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
function CollectDEV_Scn2ScenarioLog
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
<#
function RunDEV_Scn2ScenarioDiag
{
EnterFunc $MyInvocation.MyCommand.Name
LogMessage $Loglevel.Info "$($MyInvocation.MyCommand.Name) is called."
EndFunc $MyInvocation.MyCommand.Name
}
#>
#region DEV_EESummitDemo
function DEV_EESummitDemoPreStart {
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "[$($MyInvocation.MyCommand.Name)] .. Enabling Netlogon service debug log"
FwAddRegValue "HKLM\System\CurrentControlSet\Services\Netlogon\Parameters" "DbFlag" "REG_DWORD" "$global:NetLogonFlag"
EndFunc $MyInvocation.MyCommand.Name
}
function DEV_EESummitDemoPostStop {
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "[$($MyInvocation.MyCommand.Name)] .. Disabling Netlogon service debug log"
FwAddRegValue "HKLM\System\CurrentControlSet\Services\Netlogon\Parameters" "DbFlag" "REG_DWORD" "0x0"
EndFunc $MyInvocation.MyCommand.Name
}
function CollectDEV_EESummitDemoLog {
EnterFunc $MyInvocation.MyCommand.Name
LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummitDemo logs started."
# init variables
$ComputerSystem = Get-WmiObject -Namespace "root\CIMv2" -Class Win32_ComputerSystem
if (!([string]::IsNullOrEmpty($ComputerSystem))) {
#$ComputerDomain = $ComputerSystem.Domain
$DomainRole = $ComputerSystem.DomainRole
} else {
#$ComputerDomain = "WORKGROUP"
$DomainRole = 0
}
$RootDSE = [ADSI]"LDAP://RootDSE"
$DefaultNamingContext = $RootDSE.defaultNamingContext
if ($Null -ne $DefaultNamingContext) {
$ConfigurationNamingContext = $RootDSE.configurationNamingContext
$DCAccessible = $True
} else {
$DCAccessible = $False
}
#setting commands to execute
if (($DomainRole -eq 1) -Or ($DomainRole -eq 3) -Or ($DomainRole -eq 4) -Or ($DomainRole -eq 5)) { # Member Workstation, Member Server, BDC, or PDC
if ($DCAccessible -eq $True) {
$Commands = @(
"nltest /dclist: | Out-File -Append $($PrefixTime)nltest_dclist.txt"
"nltest /dsgetsite | Out-File -Append $($PrefixTime)nltest_dsgetsite.txt"
"nltest /domain_trusts /all_trusts /v | Out-File -Append $($PrefixTime)nltest_domain_trusts_all_trusts_v.txt"
"nltest /trusted_domains | Out-File -Append $($PrefixTime)nltest_trusted_domains.txt"
"w32tm /query /status /verbose | Out-File -Append $($PrefixTime)w32tm_query_status.txt"
"w32tm /query /configuration | Out-File -Append $($PrefixTime)w32tm_query_config.txt"
"w32tm /query /peers /verbose | Out-File -Append $($PrefixTime)w32tm_query_peers.txt"
)
} else {
#do nothing
}
}
# executing commands:
RunCommands $LogPrefix $Commands -ThrowException:$False -ShowMessage:$False
# FW conveniance function for GPO relevant data
FwGetGPresultAS
# files to copy: source , destination
$SourceDestinationPaths = @(
@("$Env:SYSTEMROOT\debug\dcpromo.log", "$($PrefixTime)dcpromo.log"),
@("$Env:SYSTEMROOT\debug\dcpromoui.log", "$($PrefixTime)dcpromoui.log"),
@("$Env:SYSTEMROOT\debug\netlogon.log", "$($PrefixTime)netlogon.log"),
@("$Env:SYSTEMROOT\debug\netsetup.log", "$($PrefixTime)netsetup.log")
)
# copying files
FwCopyFiles $SourceDestinationPaths
# export registry
$global:KeysEESummitDemo = @(
"HKLM:System\CurrentControlSet\Services\W32Time"
"HKLM:Software\Policies\Microsoft\W32Time"
"HKLM:System\CurrentControlSet\Services\Netlogon\Parameters"
"HKLM:Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}"
)
FwAddRegItem @("EESummitDemo") _Stop_
#export event logs
$EvtEESummitDemo = @("Application", "System", "Directory Service")
($EvtEESummitDemo) | ForEach-Object { FwAddEvtLog $_ _Stop_}
LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummit logs ended."
EndFunc $MyInvocation.MyCommand.Name
}
function CollectDEV_EESummitDemoScenarioLog{
LogInfo "[$($MyInvocation.MyCommand.Name)] Collecting DEV_EESummitDemoScenario logs started."
CollectDEV_EESummitDemoLog
}
#endregion DEV_EESummitDemo
#endregion Scenario Functions
#endregion Functions
#region Registry Key modules for FwAddRegItem
<#
$global:KeysSNMP = @("HKLM:System\CurrentControlSet\Services\SNMP", "HKLM:System\CurrentControlSet\Services\SNMPTRAP")
$global:KeysWinLAPS = @(
"HKLM:Software\Microsoft\Policies\LAPS"
"HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\LAPS"
"HKLM:Software\Policies\Microsoft Services\AdmPwd"
"HKLM:Software\Microsoft\Windows\CurrentVersion\LAPS\Config"
"HKLM:Software\Microsoft\Windows\CurrentVersion\LAPS\State"
"HKLM:Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}"
)
#>
<# Example:
$global:KeysHyperV = @("HKLM:Software\Microsoft\Windows NT\CurrentVersion\Virtualization", "HKLM:System\CurrentControlSet\Services\vmsmp\Parameters")
#>
# B) section of NON-recursive lists
<#
$global:KeysDotNETFramework = @(
"HKLM:Software\Microsoft\.NETFramework\v2.0.50727"
"HKLM:Software\Wow6432Node\Microsoft\.NETFramework\v2.0.50727"
"HKLM:Software\Microsoft\.NETFramework\v4.0.30319"
"HKLM:Software\Wow6432Node\Microsoft\.NETFramework\v4.0.30319"
)
#>
#endregion Registry Key modules
#endregion Registry Key modules
#region groups of Eventlogs for FwAddEvtLog
<#
$EvtLogsBluetooth = @("Microsoft-Windows-Bluetooth-BthLEPrepairing/Operational", "Microsoft-Windows-Bluetooth-MTPEnum/Operational")
# $EvtLogsLAPS = @("Microsoft-Windows-LAPS-Operational", "Microsoft-Windows-LAPS/Operational")
<# Example:
$global:EvtLogsEFS = @("Microsoft-Windows-NTFS/Operational", "Microsoft-Windows-NTFS/WHC")
#>
#endregion groups of Eventlogs
# Deprecated parameter list. Property array of deprecated/obsoleted params.
# DeprecatedParam: Parameters to be renamed or obsoleted in the future
# Type : Can take either 'Rename' or 'Obsolete'
# NewParam : Provide new parameter name for replacement only when Type=Rename. In case of Type='Obsolete', put null for the value.
$DEV_DeprecatedParamList = @(
<#
@{DeprecatedParam='DEV_kernel';Type='Rename';NewParam='WIN_kernel'}
# @{DeprecatedParam='DEV_SAM';Type='Rename';NewParam='DEV_SAMsrv'} # <-- this currently fails
@{DeprecatedParam='DEV_EEsummitDemo';Type='Rename';NewParam='DEV_EEsummitDemo'}
#>
)
Export-ModuleMember -Function * -Cmdlet * -Variable * -Alias *
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMmVHHsIA2ii6u
# GDXO3Plyn8H5L3n1LVa9MPEzey4MZqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICRg6A5+sa4uyZ/QTkpu/eaW
# 6pSVMBBIW1wdF0BfhBGVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAAoB4zn4ESJ/Ax6+i/b0nTPllaUyIK0BwGM0Te4Qe6hczZcmSWerKNF/G
# 9r/ORylPZNoL2n8T4nsRQ5p7F6zrjwTJa+WwQImgXJPQS+M6J6DXsHtyyGpKFW+3
# D42je+Uxm0mbNK4BeWSY/DbP5SatGFCzUvTwNpToecvKs3bXV16zFxRpx4VX7rgY
# YNwSlZDt4ZklAfYBhmIHSpfIA1/OajMkYvUrSckVQTfSk+zNnneRtbCmtMi99tgD
# +ynhLGQ6nyDWHL53RpzEo14/rQXoUPs8MW4SNppEeTtzeHB3C0wsOGCEstqCL1fg
# yLOsZM1s6H6woNyyTNRzMfRgSkxFhqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCByr2PcyJlu9O/rlRSHR5hHhWlNn/7X6c/yB0lxMGNqigIGZwfUrV1O
# GBMyMDI0MTAxNzAwMjAxOS40NzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ro7mzAiGA8yMDI0MTAxNjEzMTgx
# OVoYDzIwMjQxMDE3MTMxODE5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqujub
# AgEAMAcCAQACAgduMAcCAQACAhMPMAoCBQDqu40bAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAD3sAuWFoa80QgFkwolRBquSkSlUo3DI1vTHocet9vldHIPN
# +GMEX1lNQHG3VAMQbVYjcUSiT2DvHZpfmNev0EZTKCVRxZim+qsNArBi6hYmScEy
# pFpwQcvsmJdy5yU1/l5JyCyv2QKhwikQyVKfMeUmQJ2FieX9T8MrGMPtWWY976RH
# 82thiYvhYOppOSyRw1Gnpthx9e+lheNXHC6rJUU5BUB11dxQYMPtx7xXfC87xrWH
# 9Q2q6bcXVARP8CA6BJe+jW9yG8ah5bmuPyK/ZfH+rjr74nsp3kCD/dSivBfjVfBK
# Ocq63V7+MqZmxwUZuEX9Qqm9w6DUvVtHHPKKk8YxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBsDkXW6sBy1vmtIOdebzyrerDTkq9NWO5TUsz8hvDCATCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8
# 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgRO9YYA4+pGApd+c5N6lpA2xfI4Ds
# gxbabE86Hld2ZnkwDQYJKoZIhvcNAQELBQAEggIA5k07cG4nv0RPo7rDFk7IlAXK
# P3YmIQf59p8VhE2U5pHLCi8x4/BaM8SSlrkODPHXLGLqMsCB8CxJgCqxuG2XOQBw
# s5B4M3u38NbnmuqirebDs8a2uQ0rmliieUKZGtz0vHfelWDYaPzr3SRa+cXhPnn9
# clWpbaKPZtG9fZiJtkZBuMcu6PtFh4+OMdkPKbjdDxqj3nQnit8LJXPRHBin+FKJ
# w7CphUq6GgbHN/IUAnbMafTpEdVn80PW/NEQp38+Hj9Uj3h05lhKrV2ZfbN+8VpR
# eXdDSWH+9cRbg7U1i3Hxd8clRr5BW6PPa1f2v+tgB3vMXp39A9lzGUrWcO1mkWnV
# X+k7RIy3YL9T4Q/GuTpm+JIEDMPw33jI5XRdvJ0h+EpskAO839N5ky6UvBuYFjDT
# 2irmeFz+Dc6xhXxXSyMZBjOTs1qWnk9oywy85c0IPgzbbu3rgEw1urr2TL7E7ut6
# vRX7OCjHGSBZIfOnWy+8NJZToe6qh4juAbEB/ByIkU1Y3EVNGL0zxHiIPp1vZqVF
# tM2RvD+t60iyP6/VbkWgDD6/nAptqHcZs5Sok0batiXrBwKiH5ptQge9zVxd8tOk
# 5q1UwrEfmH7sc+1LeaVGrlygz28Yg02GtybvxNUDP86+DtxswYQElGCfjshQXMe+
# h2rrsB5PnAbcG2YrUT8=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3335.ps1 | 3335.ps1 |
function Get-CommandStatus {
[PoshBot.BotCommand(
Aliases = ('getcommandstatus', 'commandstatus')
)]
[cmdletbinding()]
param(
[parameter(Mandatory)]
$Bot
)
$activeJobs = @($Bot.Executor._jobTracker.GetEnumerator() | Foreach-Object {
$userId = $_.Value.ParsedCommand.From
$userName = $Bot.RoleManager.ResolveUserIdToUserName($_.Value.ParsedCommand.From)
$cmdDuration = [system.math]::Round(((Get-Date).ToUniversalTime() - $_.Value.Started.ToUniversalTime()).TotalSeconds, 0)
[pscustomobject]@{
Id = $_.Value.Id
From = "$userName [$userId]"
CommandString = $_.Value.ParsedCommand.CommandString
Complete = $_.Value.Complete
Started = $_.Value.Started.ToUniversalTime().ToString('u')
RunningTime = "$cmdDuration seconds"
}
})
if ($activeJobs.Count -eq 0) {
New-PoshbotTextResponse -Text 'There are no active jobs'
} else {
$msg = ($activeJobs | Format-List -Property * | Out-String)
New-PoshBotTextResponse -Text $msg -AsCode
}
}
|
combined_dataset/train/non-malicious/LibraryChart_2.ps1 | LibraryChart_2.ps1 | # ---------------------------------------------------------------------------
### <Script>
### <Author>
### Chad Miller
### </Author>
### <Description>
### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework
### Pipe output of Powershell command to Out-Chart function and specify chart type
### Chart will display in form or save to image file
### Real-time charts are supported by passing in a script block
### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell
### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx
### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5
### *** Updated 9/20/09 with Ben's fixes http://xcud.com/post/192277838/mschart-in-psh ***
### </Description>
### <Usage>
### . ./LibraryChart.ps1
### -------------------------- EXAMPLE 1 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS'
###
### This command will produce a default column chart
###
### -------------------------- EXAMPLE 2 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png'
### This command will output the chart to a file
###
### -------------------------- EXAMPLE 3 --------------------------
### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie'
###
### This command will produce a pie chart
###
### -------------------------- EXAMPLE 4 --------------------------
### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line'
###
### This command will produce a real-time line chart
###
### </Usage>
### </Script>
# --------------------------------------------------------------------------
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization")
#######################
function New-Chart
{
param ([int]$width,[int]$height,[int]$left,[int]$top,[string]$chartTitle)
# create chart object
$global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart
$global:Chart.Width = $width
$global:Chart.Height = $height
$global:Chart.Left = $left
$global:Chart.Top = $top
# create a chartarea to draw on and add to chart
$chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea
$global:chart.ChartAreas.Add($chartArea)
[void]$global:Chart.Titles.Add([string]$chartTitle)
# change chart area colour
$global:Chart.BackColor = [System.Drawing.Color]::Transparent
} #New-Chart
#######################
function New-BarColumnChart
{
param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
$chart.ChartAreas[0].AxisX.Title = $xTitle
$chart.ChartAreas[0].AxisY.Title = $yTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType
if ($asc)
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") }
else
{ $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") }
$global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder"
$global:chart.Series["Data"].IsValueShownAsLabel = $true
$global:chart.Series["Data"]["LabelStyle"] = "Top"
} #New-BarColumnChart
#######################
function New-LineChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
# $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values))
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values)
#$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss"
#$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1
#$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line
#$global:chart.Series["Data"].IsValueShownAsLabel = $false
} #New-LineChart
#######################
function New-PieChart
{
param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top)
New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle
[void]$global:Chart.Series.Add("Data")
$global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values)
$global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie
$global:Chart.Series["Data"]["PieLabelStyle"] = "Outside"
$global:Chart.Series["Data"]["PieLineColor"] = "Black"
#$global:chart.Series["Data"].IsValueShownAsLabel = $true
#$global:chart.series["Data"].Label = "#PERCENT{P1}"
#$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend
#$global:Chart.Legends.Add($legend)
#$Legend.Name = "Default"
} #New-PieChart
#######################
function Remove-Points
{
param($name='Data',[int]$maxPoints=200)
while ( $global:chart.Series["$name"].Points.Count > $maxPoints )
{ $global:chart.Series["$name"].Points.RemoveAT(0) }
} #Add-Series
#######################
function Out-Form
{
param($interval,$scriptBlock,$xField,$yField)
# display the chart on a form
$global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor
[System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left
$Form = New-Object Windows.Forms.Form
$Form.Text = 'PowerCharts'
$Form.Width = 600
$Form.Height = 600
$Form.controls.add($global:Chart)
if ($scriptBlock -is [ScriptBlock])
{
if (!($xField -or $yField))
{ throw 'xField and yField required with scriptBlock parameter.' }
$timer = New-Object System.Windows.Forms.Timer
$timer.Interval = $interval
$timer.add_Tick({
$ht = &$scriptBlock | ConvertTo-HashTable $xField $yField
if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line')
{
Remove-Points
$ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) }
}
else
{ $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) }
$global:chart.ResetAutoValues()
$global:chart.Invalidate()
})
$timer.Enabled = $true
$timer.Start()
}
$Form.Add_Shown({$Form.Activate()})
$Form.ShowDialog()
} #Out-Form
#######################
function Out-ImageFile
{
param($fileName,$fileformat)
$global:Chart.SaveImage($fileName,$fileformat)
}
#######################
### ConvertTo-Hashtable function based on code by Jeffery Snover
### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx
#######################
function ConvertTo-Hashtable
{
param([string]$key, $value)
Begin
{
$hash = @{}
}
Process
{
$thisKey = $_.$Key
$hash.$thisKey = $_.$Value
}
End
{
Write-Output $hash
}
} #ConvertTo-Hashtable
#######################
function Out-Chart
{
param( $xField=$(throw 'Out-Chart:xField is required'),
$yField=$(throw 'Out-Chart:yField is required'),
$chartType='Column',$chartTitle,
[int]$width=500,
[int]$height=400,
[int]$left=40,
[int]$top=30,
$filename,
$fileformat='png',
[int]$interval=1000,
$scriptBlock,
[switch]$asc
)
Begin
{
$ht = @{}
}
Process
{
if ($_)
{
$thisKey = $_.$xField
$ht.$thisKey = $_.$yField
}
}
End
{
if ($scriptBlock)
{ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField }
switch ($chartType)
{
'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)}
'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top }
}
if ($filename)
{ Out-ImageFile $filename $fileformat }
elseif ($scriptBlock )
{ Out-Form $interval $scriptBlock $xField $yField }
else
{ Out-Form }
}
} #Out-Chart
|
combined_dataset/train/non-malicious/sample_39_85.ps1 | sample_39_85.ps1 | # SharePoint references that need to remove when uninstall
$ReferencesToRemoveWhenUninstall = @(
@("Microsoft.SharePoint.Client"),
@("Microsoft.SharePoint.Client.Runtime"),
@("System.IdentityModel.Tokens.Jwt"),
@("Microsoft.IdentityModel.Tokens")
)
# SharePoint references that need to be copy local
$CopyLocalReferences = @(
@("Microsoft.SharePoint.Client"),
@("Microsoft.SharePoint.Client.Runtime"),
@("System.IdentityModel.Tokens.Jwt"),
@("Microsoft.IdentityModel.Tokens")
)
# Imports needed for VB project
$VbImports = @(
"Microsoft.SharePoint.Client",
"System.IdentityModel.Tokens.Jwt",
"Microsoft.IdentityModel.Tokens"
)
Export-ModuleMember -Variable @( 'ReferencesToRemoveWhenUninstall', 'CopyLocalReferences', 'VbImports' )
# SIG # Begin signature block
# MIImKgYJKoZIhvcNAQcCoIImGzCCJhcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiDbsEAtEffV7
# wXMx09VskzAh7lQs0k6LITOrKjlt1qCCC3YwggT+MIID5qADAgECAhMzAAAFVskg
# Kx90Ml0tAAAAAAVWMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTExWhcNMjQxMDE2MTk1MTExWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCW2kg89zWnssiDG9AFq/sxqkPT43V4MZ6vwu7C4+sly46QJA4UNxSRnGDz9u8f
# 18OR1/Ar9guQDqRthrOOktLaol49HZfv8l1DEeB/uguWS0qFIJe+cK6b7grVfl0S
# Z7U8yOXu67n52z+QJN+iUxcIk0KWcu/sJZ8KfewKxnNDMDIHHhUHvIjQWhvKxOLC
# /TwL0i4wTykXuQwbwIZuuGi7TYA82Q2LkYOLlwOTPOb0eowhcUI7CaXlU30IgoG4
# frY+mtZMZnTx0ga/a36GVNdq6NeBKzlGbLB02/WIP+c5ADDCXsheWpkizJt9aPhz
# Yuont+Nx0OhIH04lJFvCqjljAgMBAAGjggF9MIIBeTAfBgNVHSUEGDAWBgorBgEE
# AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUJt8FhQFwX7g5A/0elDxkjww82dow
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwODY1KzUwMTY1NTAfBgNVHSMEGDAW
# gBTm/F97uyIAWORyTrX0IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v
# Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0Ff
# MjAxMC0wNy0wNi5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEw
# LTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBCnZlo
# MxjHBVHJEP6d+0t7EDJfNB0h7j9iOX6LQiPMdQAV1xqA6Jgb/VEPSEVs076CAJn3
# KP5Jpr4DOuo12BE2CoCusZDHn+7aP2yxngMGGQcJKz4UfOzDMS9Yr2sl3R6fMP18
# T4Ce5t7IYFK36PI/HfvHO8AzB3T0KhVIifqsSwZ8mEukw/wi4duJYulYxV2lY2kM
# Hwv/OKvKAsrTd338HlnuR+z9NZvStNUi1a8sTwcEMrEP8lgtoxaZe0Ypu/Ohn4Pq
# TefEVWKQJLU2KFyLDkoamDde0ydAzzHYEqdBQMW0gxWyvJ9fjgF/C2PKQVu/0SMB
# hcwo04eFzf/w7pZ/MIIGcDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0B
# AQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG
# A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAw
# HhcNMTAwNzA2MjA0MDE3WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
# aWduaW5nIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
# 6Q5kUHlntcTj/QkATJ6UrPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9
# RJwI6GWTzixVhL99COMuK6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjW
# axeUOpPOJj/s5v40mFfVHV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkc
# vR3EVWJXcvhnuSUgNN5dpqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YAS
# NUwSpr5SW/Wm2uCLC0h31oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZ
# M4BqiU2jamZjeJPVMM+VHwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAw
# HQYDVR0OBBYEFOb8X3u7IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoA
# UwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY
# MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6
# Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1
# dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0
# dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3J0MIGdBgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9Bggr
# BgEFBQcCARYxaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k
# ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABp
# AGMAeQBfAFMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
# GnTvV08pe8QWhXi4UNMi/AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1
# b6/lf3mVd+UC1PHr2M1OHhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMh
# KeWloWmMIpPMdJjnoUdD8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJ
# N2FtB91TGcun1mHCv+KDqw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCq
# tq27ckdjF/qm1qKmhuyoEESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW
# 77Gcf/wiS0mKbhXjpn92W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14y
# jPs3hdHcdYWch8ZaV4XCv90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaX
# evfpUk30dwVPhcbYC/GO7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19x
# HkCvmGXJIuhCISWKHC1g2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQ
# HTiVmx5mMxMnORd4hzbOTsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlac
# vyRdUQKdannSF9PawZSOB3slcUSrBmrm1MbfI5qWdcUxghoKMIIaBgIBATCBlTB+
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9N
# aWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEwAhMzAAAFVskgKx90Ml0tAAAA
# AAVWMA0GCWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA+
# YfAmPZkVWfdkUwsVYCmfuvPHlKhHBY+LR0rti4fi1DBCBgorBgEEAYI3AgEMMTQw
# MqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tMA0GCSqGSIb3DQEBAQUABIIBAFv1rU8jsxnQjzEyrqzKPst+zeMjO5IfSDuq
# Z+Kir1tSWxYOj1lfty2A3YP4Hm/39hO76teOx2EZdW9qgsTInqHinknPXK2QfPjY
# o0gFheUxmMpmVMdYUoY2QDFzEeLg6pMLFaJDRLGO2c0SToR9O860KCCsmJLqB2xa
# 97NYWnGllXMJ6E/oFCVGzNDsCgsSQeh4Yan8ATktyRSaKPG+tfx9USUCb/ni/0bJ
# rHHGMfhay2nB56NKiekdEp7WrGvGvAX+tq6RE5cvtc1IZI8ybH3JNRSTskKSE/fk
# cm2es6hpNOks5L6eubwx0Tm+UvfFhGv9fLkpoSZt25CgHwYNB6yhgheUMIIXkAYK
# KwYBBAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIXaQIBAzEPMA0GCWCG
# SAFlAwQCAQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQB
# hFkKAwEwMTANBglghkgBZQMEAgEFAAQg7oBJGD7u/tFHoIWuoQ5RC5eHx27SLOCe
# U1w1CE+3u2sCBmXODm4aJhgTMjAyNDAyMjcxMzQ5MTMuMzY3WjAEgAIB9KCB0aSB
# zjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UE
# CxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNloIIR6jCCByAwggUIoAMCAQICEzMAAAHzxQpDrgPMHTEA
# AQAAAfMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTAwHhcNMjMxMjA2MTg0NjAyWhcNMjUwMzA1MTg0NjAyWjCByzELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt
# ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA/p+m2uErgfYkjuVjIW54
# KmAG/s9yH8zaWSFkv7IH14ZS2Jhp7FLaxl9zlXIPvJKyXYsbjVDDu2QDqgmbF1Iz
# s/M3J9WlA+Q9q9j4c1Sox7Yr1hoBo+MecKlntUKL97zM/Fh7CrH2nSJVo3wTJ1Sl
# aJjsm0O/to3OGn849lyUEEphPY0EaAaIA8JqmWpHmJyMdBJjrrnD6+u+E+v2Gkz4
# iGJRn/l1druqEBwJDBuesWD0IpIrUI4zVhwA3wamwRGqqaWrLcaUTXOIndktcVUM
# XEBl45wIHnlW2z2wKBC4W8Ps91XrUcLhBSUc0+oW1hIL8/SzGD0m4qBy/MPmYlqN
# 8bsN0e3ybKnu6arJ48L54j+7HxNbrX4u5NDUGTKb4jrP/9t/R+ngOiDlbRfMOuoq
# RO9RGK3EjazhpU5ubqqvrMjtbnWTnijNMWO9vDXBgxap47hT2xBJuvnrWSn7VPY8
# Swks6lzlTs3agPDuV2txONY97OzJUxeEOwWK0Jm6caoU737iJWMCNgM3jtzor3Hs
# ycAY9hUIE4lR2nLzEA4EgOxOb8rWpNPjCwZtAHFuCD3q/AOIDhg/aEqa5sgLtSes
# BZAa39ko5/onjauhcdLVo/CKYN7kL3LoN+40mnReqta1BGqDyGo2QhlZPqOcJ+q7
# fnMHSd/URFON2lgsJ9Avl8cCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTDZBX2pRFR
# DIwNwKaFMfag6w0KJDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA38Qcj/zR/u/b
# 3N5YjuHO51zP1ChXAJucOtRcUcT8Ql0V5YjY2e7A6jT9A81EwVPbUuQ6pKkUoiFd
# eY+6vHunpYPP3A9279LFuBqPQDC+JYQOTAYN8MynYoXydBPxyKnB19dZsLW6U4gt
# rIAFIe/jmZ2/U8CRO6WxATyUFMcbgokuf69LNkFYqQZov/DBFtniIuJifrxyOQwm
# gBqKE+ANef+6DY/c8s0QAU1CAjTa0tfSn68hDeXYeZKjhuEIHGvcOi+wi/krrk2Y
# tEmfGauuYitoUPCDADlcXsAqQ+JWS+jQ7FTUsATVzlJbMTgDtxtMDU/nAboPxw+N
# wexNqHVX7Oh9hGAmcVEta4EXhndrqkMYENsKzLk2+cpDvqnfuJ4Wn//Ujd4HraJr
# UJ+SM4XwpK2k9Sp2RfEyN8ntWd6Z3q9Ap/6deR+8DcA5AQImftos/TVBHmC3zBpv
# bxKw1QQ0TIxrBPx6qmO0E0k7Q71O/s2cETxo4mGFBV0/lYJH3R4haSsONl7JtDHy
# +Wjmt9RcgjNe/6T0yCk0YirAxd+9EsCMGQI1c4g//UIRBQbvaaIxVCzmb87i+Ykh
# CSHKqKVQMHWzXa6GYthzfJ3w48yWvAjE5EHkn0LEKSq/NzoQZhNzBdrM/IKnt5aH
# NOQ1vCTb2d9vCabNyyQgC7dK0DyWJzswggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4RDAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIj
# CgEBMAcGBSsOAwIaAxUAbvoGLNi0YWuaRTu/YNy5H8CkZyiggYMwgYCkfjB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmIXgYw
# IhgPMjAyNDAyMjcxMzExMzRaGA8yMDI0MDIyODEzMTEzNFowdDA6BgorBgEEAYRZ
# CgQBMSwwKjAKAgUA6YheBgIBADAHAgEAAgIGKDAHAgEAAgITsjAKAgUA6YmvhgIB
# ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow
# CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAaKphou+rXqLatT6XHIUy5D34O
# 50YQArjqAXRJxZ5bk+kACDA21Ni0RT8TAeC9frmB651HcD0VAlk5jE+MjAP4g2y5
# 81YPoYANOGRtOwRSNXMA1d/YZ0hM7ucwA2cE0O62gMyZmvpuruHhlZOEeGEq56CI
# dd+tnhoVL01VLZNs5RMy579Zc8fo2ktdxiPjh6eFXj59QBFXc9JkFBpm+QbB4Bf1
# 4gCbt4dinakb1Fns0uKl7Mdhi/ZL7IvAhxHO1OR4QiBA47iJtLd6By4fxGJCfih/
# jg//b9Mw4iQJN8hNwsrzRk5DBJlNAI4kHj0NXsRKYpKdzP6ayDheIZU5ex6RMYIE
# DTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHz
# xQpDrgPMHTEAAQAAAfMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN
# BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgyD40BKcFceEzA9BVGzG4uqvx
# fu3lhg6DnPrSvXV807EwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAYvNk0
# i7bhuFZKfMAZiZP0/kQIfONbBv2gzsMYOjti6DCBmDCBgKR+MHwxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
# VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
# aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHzMCIEIFB9h0hM
# DTyi0mt23a6fugqNRYba9zH9ooqJwnxL+4iuMA0GCSqGSIb3DQEBCwUABIICACHq
# Gbk57/k1xCymO1EtOowey6qmeMRLOZzwIKxQXbwTS/tJxi3KYUB1JXS19cilWOig
# BFUCeX/xcylcAu1JaoFwS1MlY8tdelHx7D4+/n+7SdZRczQzXR5tzMHi1npgAlRx
# XEM2di+9xNo+ZdZzVFR7pfstAFB/WkooUhpSbu1y0InUkx8e8Oi4f3yNgZ2XAf/9
# zhqgcKl9i+lrmKAWgrBVRbtAcuTgQAMjSTucc4i1GQYrnuUCnV576Gtq0qNIihS2
# O4FjsEXnl0qu2l97bC2GXthHheOPWfnCO6QeZN0aSqr1p6XdEW3RL0Abf40r80HX
# p3n8cE3G0rtoUq7GhxtV1uTW9nUie9VVHs20LSgYhiC6RGAQ8Tqr2dqOVK2z6Klz
# xUYYBYryUoyJTdUAv42q5EOjwqZBEiNmyVB/vXNfWg48xIS0LsJXp86easZrCm5u
# eUV79gsuHG8yWP/Bw9WpuF7+4ghnDkarEcyQVZ8eKBsG4LBC/Om+mzTussmLY/J6
# jOnk+oYKDvYmo6abKaO84Uy9oronoIxh4TNDYoEIfQ2wOkKQGNLPeRXDc13AaYWR
# h49/vhHafERAmRdjIQazoG9rbF+pFIEDFBqGjdyT+JxU8b764RHnBCPtjC+GPyk+
# bmYtAWCraHzGz9knYANerfK8Wl8qgfcVFfKkbSdY
# SIG # End signature block
|
combined_dataset/train/non-malicious/Enable-RemoteCredSSP.ps1 | Enable-RemoteCredSSP.ps1 | ##############################################################################\n##\n## Enable-RemoteCredSSP\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nEnables CredSSP support on a remote computer. Requires that the machine\nhave PowerShell Remoting enabled, and that its operating system is Windows\nVista or later.\n\n.EXAMPLE\n\nEnable-RemoteCredSSP <Computer>\n\n#>\n\nparam(\n ## The computer on which to enable CredSSP\n $Computername,\n\n ## The credential to use when connecting\n $Credential = (Get-Credential)\n)\n\nSet-StrictMode -Version Latest\n\n## Call Get-Credential again, so that the user can type something like\n## Enable-RemoteCredSSP -Computer Computer -Cred DOMAIN\\user\n$credential = Get-Credential $credential\n$username = $credential.Username\n$password = $credential.GetNetworkCredential().Password\n\n## Define the script we will use to create the scheduled task\n$powerShellCommand =\n "powershell -noprofile -command Enable-WsManCredSSP -Role Server -Force"\n$script = @"\nschtasks /CREATE /TN 'Enable CredSSP' /SC WEEKLY /RL HIGHEST ``\n /RU $username /RP $password ``\n /TR "$powerShellCommand" /F\n\nschtasks /RUN /TN 'Enable CredSSP'\n"@\n\n## Create the task on the remote system to configure CredSSP\n$command = [ScriptBlock]::Create($script)\nInvoke-Command $computername $command -Cred $credential\n\n## Wait for the remoting changes to come into effect\nfor($count = 1; $count -le 10; $count++)\n{\n $output =\n Invoke-Command $computername { 1 } -Auth CredSSP -Cred $credential\n if($output -eq 1) { break; }\n\n "Attempt $count : Not ready yet."\n Sleep 5\n}\n\n## Clean up\n$command = [ScriptBlock]::Create($script)\nInvoke-Command $computername {\n schtasks /DELETE /TN 'Enable CredSSP' /F } -Cred $credential\n\n## Verify the output\nInvoke-Command $computername {\n Get-WmiObject Win32_ComputerSystem } -Auth CredSSP -Cred $credential
|
combined_dataset/train/non-malicious/BufferBox 3.5.ps1 | BufferBox 3.5.ps1 | ####################################################################################################
## This script is just a demonstration of some of the things you can do with the buffer
## in the default PowerShell host... it serves as a reminder of how much work remains on
## PoshConsole, and as an inspiration to anyone who is thinking about trying to create
## "interactive" PowerShell applications.
##
## Try Test-DisplayBox and then Test-BufferBox (note it has tab completion and everything).
####################################################################################################
$global:BoxChars = new-object PSObject -Property @{
'HorizontalDouble' = ([char]9552).ToString()
'VerticalDouble' = ([char]9553).ToString()
'TopLeftDouble' = ([char]9556).ToString()
'TopRightDouble' = ([char]9559).ToString()
'BottomLeftDouble' = ([char]9562).ToString()
'BottomRightDouble' = ([char]9565).ToString()
'HorizontalDoubleSingleDown' = ([char]9572).ToString()
'HorizontalDoubleSingleUp' = ([char]9575).ToString()
'Horizontal' = ([char]9472).ToString()
'Vertical' = ([char]9474).ToString()
'TopLeft' = ([char]9484).ToString()
'TopRight' = ([char]9488).ToString()
'BottomLeft' = ([char]9492).ToString()
'BottomRight' = ([char]9496).ToString()
'Cross' = ([char]9532).ToString()
'VerticalDoubleRightSingle' = ([char]9567).ToString()
'VerticalDoubleLeftSingle' = ([char]9570).ToString()
}
$global:RectType = "system.management.automation.host.rectangle"
function Show-ConsoleMenu {
param(
[Parameter(ValueFromPipeline=$true)]
[Array]$choices,
[string]$Caption,
[int]$indentLeft=8,
[Switch]$Passthru ,
[Switch]$UseBufferBox
)
begin {
$allchoices = New-Object System.Collections.ArrayList
}
process {
if($choices) {
$allchoices.AddRange($choices)
}
}
end {
# Make a hashtable with keys
$hashChoices = @{}
for($i=0; $i -lt $allchoices.Count; $i++) { $hashChoices."$i" = $allchoices[$i] }
# output the menu to the screen
$menu = $hashChoices | Format-Table -HideTableHeader @{E="Key";A="Right";W=$indentLeft}, @{E="Value";A="Left"} | Out-String
$menu = "`n" + (" " * ($indentLeft/2)) + $Caption + "`n" + $menu.TrimEnd() + "`n"
if($UseBufferBox) {
$menu -split "`n" | Out-Buffer
} else {
$menu
}
# get a choice from the user
do {
[string]$Key = $Host.UI.RawUI.ReadKey("IncludeKeyDown,NoEcho").Character
} while(!$hashChoices.ContainsKey($Key) -and !(13,27 -contains [int][char]$Key))
if($Passthru) { $hashChoices.$Key } else { $Key -as [int] }
}}
function Reset-Buffer {
param(
$Position = $Host.UI.RawUI.WindowPosition,
[int]$Height = $Host.UI.RawUI.WindowSize.Height,
[int]$Width = $Host.UI.RawUI.WindowSize.Width,
# Note: all edges are padded by 1 for the box edges, but we also pad each side by this ammount:
[int]$Padding = 1,
$ForegroundColor = $Host.UI.RawUI.ForegroundColor,
$BackgroundColor = $Host.UI.RawUI.BackgroundColor,
$BorderColor = "Yellow",
[switch]$NoBorder,
[switch]$ShowInput,
[string]$Title = ""
)
$global:BufferHeight = $Height
$global:BufferWidth = $Width
$global:BufferPadding = $Padding
$global:BufferForegroundColor = $ForegroundColor
$global:BufferBackgroundColor = $BackgroundColor
$global:BufferBorderColor = $BorderColor
if($NoBorder) {
$global:BufferBoxSides = 0
} else {
$global:BufferBoxSides = 2
}
if($ShowInput) {
$global:BufferHeight -= 2
}
$Host.UI.RawUI.SetBufferContents($Position,(New-BufferBox $BufferHeight $BufferWidth -Title:$Title -NoBorder:$NoBorder -ShowInput:$ShowInput -Background $BufferBackgroundColor -Border $BufferBorderColor))
$global:BufferPosition = $Position
$global:BufferPosition.X += $global:BufferPadding + ($global:BufferBoxSides/2)
# this gets set to the BOTTOM line, because I assume text will flow in from the bottom.
$global:BufferPosition.Y += $global:BufferHeight - 2
# and this goes below that ...
$global:BufferPromptPosition = $BufferPosition
$global:BufferPromptPosition.Y += 2
$global:BufferPromptPosition.X += 2 - $global:BufferPadding # Prompt = "> "
}
function New-BufferBox {
param(
[int]$Height = $global:BufferHeight,
[int]$Width = $global:BufferWidth,
$Title = "",
[switch]$NoBorder,
[switch]$ShowInput,
$BackgroundColor = $global:BufferBackgroundColor,
$BorderColor = $global:BufferBorderColor
)
$Width = $Width - $global:BufferBoxSides
$LineTop =( $global:BoxChars.HorizontalDouble * 2) + $Title `
+ $($global:BoxChars.HorizontalDouble * ($Width - ($Title.Length+2)))
$LineField = ' ' * $Width
$LineBottom = $global:BoxChars.HorizontalDouble * $Width
$LineSeparator = $global:BoxChars.Horizontal * $Width
$LinePrompt = '> ' + ' ' * ($Width-2) # Prompt = "> "
if(!$NoBorder) {
$LineField = $global:BoxChars.VerticalDouble + $LineField + $global:BoxChars.VerticalDouble
$LinePrompt = $global:BoxChars.VerticalDouble + $LinePrompt + $global:BoxChars.VerticalDouble
$LineBottom = $global:BoxChars.BottomLeftDouble + $LineBottom + $global:BoxChars.BottomRightDouble
$LineTop = $global:BoxChars.TopLeftDouble + $LineTop + $global:BoxChars.TopRightDouble
$LineSeparator = $global:BoxChars.VerticalDoubleRightSingle + $LineSeparator + $global:BoxChars.VerticalDoubleLeftSingle
}
if($ShowInput) {
$box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineSeparator;$LinePrompt;$LineBottom}
} else {
$box = &{$LineTop;1..($Height - 2) |% {$LineField};$LineBottom}
}
$boxBuffer = $Host.UI.RawUI.NewBufferCellArray($box,$BorderColor,$BackgroundColor)
return ,$boxBuffer
}
function Move-Buffer {
param(
$Position = $global:BufferPosition,
[int]$Left = $($global:BufferBoxSides/2),
[int]$Top = (2 - $global:BufferHeight),
[int]$Width = $global:BufferWidth - $global:BufferBoxSides,
[int]$Height = $global:BufferHeight,
[int]$Offset = -1
)
$Position.X += $Left
$Position.Y += $Top
$Rect = New-Object $RectType $Position.X, $Position.Y, ($Position.X + $width), ($Position.Y + $height -1)
$Position.Y += $OffSet
$Host.UI.RawUI.ScrollBufferContents($Rect, $Position, $Rect, (new-object System.Management.Automation.Host.BufferCell(' ',$global:BufferForegroundColor,$global:BufferBackgroundColor,'complete')))
}
function Out-Buffer {
param(
[Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
$Message,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$ForegroundColor = $global:BufferForegroundColor,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$BackgroundColor = $global:BufferBackgroundColor,
[switch]$NoScroll,
[Parameter(ValueFromPipelineByPropertyName=$true)]
$Position = $global:BufferPosition,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Left = 0,
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Top = $(3 - $global:BufferHeight), # Box Edge + New Lines
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Width = ($global:BufferWidth - $global:BufferBoxSides), # Box Edge
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Height = ($global:BufferHeight - $global:BufferBoxSides), # Box Edge
[Parameter(ValueFromPipelineByPropertyName=$true)]
[int]$Offset = $( 0 - ($Message.Split("`n").Count))
)
process {
$lineCount = $Message.Split("`n").Count
$Width = $Width - ($global:BufferPadding * 2)
if(!$NoScroll){ Move-Buffer $Position $Left $Top $Width $Height $Offset }
$MessageBuffer = New-Object "System.Management.Automation.Host.BufferCell[,]" $lineCount, $width
$index = 0
foreach( $line in $Message.Split("`n") ) {
$Buffer = $Host.UI.RawUI.NewBufferCellArray( @($line.Trim("`r").PadRight($Width)), $ForegroundColor, $BackgroundColor )
for($i = 0; $i -lt $width; $i++) {
$MessageBuffer[$index,$i] = $Buffer[0,$i]
}
$index++
}
$Y = $global:BufferPosition.Y
$global:BufferPosition.Y -= $lineCount - 1
$Host.UI.RawUI.SetBufferContents($global:BufferPosition,$MessageBuffer)
$global:BufferPosition.Y = $Y
}
}
function Set-BufferInputLine {
param([String]$Line = "")
$PromptText = $line.PadRight(($global:BufferWidth - $line.Length - 3)) # Prompt = "> "
$CursorPosition = $BufferPromptPosition
$CursorPosition.X += $line.Length
$Prompt = $Host.UI.RawUI.NewBufferCellArray( @($PromptText),$global:BufferForegroundColor, $global:BufferBackgroundColor)
$Host.UI.RawUI.SetBufferContents( $BufferPromptPosition, $prompt )
$Host.UI.RawUI.CursorPosition = $CursorPosition
}
function Test-DisplayBox {
$Position = $Host.UI.RawUI.WindowPosition
$Position.X += 10
$Position.Y += 3
Reset-Buffer $Position 20 66 3 -ForegroundColor 'Gray' -BackgroundColor 'Black' -BorderColor 'Green'
Out-Buffer 'Greetings!' 'Yellow' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer '- - - Thank you for running this simple demo script! - - -' 'Green' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'We are demonstrating how the scroll buffer works: you can
add more than one line at a time, but you don''t really
need to, since they add almost as fast one at a time.' 'white' 'black'
sleep -m 3000
Out-Buffer '' 'Gray' 'black'
Out-Buffer 'That is, as long as you don''t have any delay, you can just' 'white' 'black'
Out-Buffer 'write out as many lines as you like, one-at-a-time, like' 'white' 'black'
Out-Buffer 'this, and there is really no downside to doing that.' 'white' 'black'
sleep -m 3000
Out-Buffer '' 'Gray' 'black'
Out-Buffer 'Right? '.PadRight(58,"-") 'Red' 'black'
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'It''s clearly not as slick to just pop in multiple lines' 'white' 'black'
sleep -m 1200
Out-Buffer 'with absolutely no scroll delay, and it makes it a little ' 'white' 'black'
sleep -m 1200
Out-Buffer 'hard to tell what you have read already, but that''s ok.' 'white' 'black'
sleep -m 1200
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'If you delay between paragraphs.' 'Red' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
sleep -m 600
Out-Buffer 'But: don''t scroll off-screen faster than I can read!' 'Yellow' 'black'
sleep -m 600
Out-Buffer '' 'Gray' 'black'
}
## Test-BufferBox 3.1 - Now with Tab completion
####################################################################################################
## Imagine it's a chat window: you can type, but the whole time, the ongoing conversation in the
## chat room you have joined is going on in the background.
##
## NOTE: because this is a "chat" demo, we treat your input as text, and to execute script in-line
## you have to enclose it inside $() braces.
####################################################################################################
function Test-BufferBox {
param( $title = "PowerShell Interactive Buffer Demo" )
Reset-Buffer -ShowInput -Title $Title
###################################################################################################
##### We only need this for the purposes of the demo...
##### In a real script you would, presumably, be getting stuff from somewhere else to display
$noise = $MyInvocation.MyCommand.Definition -split "`n"
$index = 0;
$random = New-Object "Random"
[regex]$chunker = @'
[^ \\"']+|([\\"'])[^\\\\1]*?\\\\1[^ \\"']*|([\\"'])[^\\\\1]*$| $
'@
##### Printing a "How to Exit" message
Out-Buffer " " -Fore DarkGray -Back Cyan
Out-Buffer " This is just a demo. " -Fore Black -Back Cyan
Out-Buffer " We will stream in the source code of this script ... " -Fore Black -Back Cyan
Out-Buffer " And you can type at the bottom while it's running. " -Fore Black -Back Cyan
Out-Buffer " Imagine this as an n-way chat application like IRC, except that " -Fore Black -Back Cyan
Out-Buffer " FOR THIS PERFORMANCE ONLY: " -Fore Black -Back Cyan
Out-Buffer " The part of your chatting friends is played by my source code. " -Fore DarkGray -Back Cyan
Out-Buffer " " -Fore DarkGray -Back Cyan
Out-Buffer " Press ESC to exit, or enter 'exit' and hit Enter" -Fore Black -Back Cyan
Out-Buffer " " -Fore DarkGray -Back Cyan
##### Setting the prompt
Set-BufferInputLine
##### And initializing our two variables ...
$line=""
$exit = $false
switch(Show-ConsoleMenu "Continue the demo","Stop the demo","Exit PowerShell" "What would you like to do now?" -UseBuffer) {
0 { <# do nothing, will continue #> }
1 { $exit = $true <#this script exits cleanly below#> }
2 { exit <# stop abruptly #> }
}
while(!$exit){
while(!$exit -and $Host.UI.RawUI.KeyAvailable) {
$char = $Host.UI.RawUI.ReadKey("IncludeKeyUp,IncludeKeyDown,NoEcho");
# we don't want the key up events, but we do want to get rid of them
if($char.KeyDown) {
switch([int]$char.Character) {
13 { # Enter
if($line.Trim() -eq "exit") { $exit = $true; break; }
###################################################################################################
###################################################################################################
############# WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING #############
############# This executes the user input! #############
############# Don't use this on, say, content you got from a web page or chat room #############
iex "Out-Buffer `"$line`" -Fore Red"; #############
###################################################################################################
###################################################################################################
$line = "";
Set-BufferInputLine
break;
}
27 { # Esc
$exit = $true; break;
}
9 { # Tab
if($line.Length -gt 0) {
[Array]$words = $chunker.Matches($line)
if($words.Count -ge 1) {
Out-Buffer ($Words | Out-String) -Fore Black -Back White
$lastWord = $words[$($words.Count-1)].Value
$trim = $lastWord.TrimEnd("`r","`n")
## This may return more than one ... in which case subsequent tabs should iterate through them
## But for demo purposes, this is more than enough work...
$replacement = TabExpansion -Line $line -LastWord ($lastWord.Trim() -replace '"')
Out-Buffer ($replacement | Out-String) -Fore Black -Back White
$line = $line.SubString(0, $line.Length - $lastWord.Length) + @($replacement)[0]
Set-BufferInputLine $line
}
}
break;
}
8 { # Backspace
if($line.Length -gt 0) {
$line = $line.SubString(0,$($line.Length-1))
}
# $pos = $Host.UI.RawUI.CursorPosition
Set-BufferInputLine $line
break;
}
0 {
# Not actually a key
# Out-Buffer $($Char | Out-String)
break;
}
default {
$line += $char.Character
Set-BufferInputLine $line
}
}
}
}
# Simulate doing useful things 25% of the time
if($random.NextDouble() -gt 0.75) {
$noise[($index)..($index++)] | Out-Buffer
if($index -ge $noise.Length){$index = 0}
}
sleep -milli 100
}
$CursorPosition = $BufferPromptPosition
$CursorPosition.Y += 2
$CursorPosition.X = 0
$Host.UI.RawUI.CursorPosition = $CursorPosition
}
|
combined_dataset/train/non-malicious/Dell Order Status_1.ps1 | Dell Order Status_1.ps1 | # Version: 0.1
# Author: Stefan Stranger
# Description: Retrieve Dell Order Status
# Start Page Order Status USA: https://support.dell.com/support/order/status.aspx?c=us&cs=19&l=en&s=dhs&~ck=pn
# Start Page Order Status EMEA(nl): http://support.euro.dell.com/support/index.aspx?c=nl&l=nl&s=gen&~ck=bt
# Example Dell Order Status URL: http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=[IR Number]&ea=[emailaddress]'
#param ([string]$url = $(read-host "Please enter Dell Order Status URL"))
$wc = New-Object System.Net.WebClient
$url = 'http://support.euro.dell.com/support/order/emea/OrderStatus.aspx?c=nl&l=nl&s=gen&ir=NL0131-8510-29070&ea=stefan.stranger@getronics.com'
$RawResult = $wc.DownloadString($url)
# $RawResult = gc orderstatus.txt
# Search for the Estimated Delivery Date in the url that starts with the word "lever" (Levering is the Dutch word for Delivery" and
# and ends with </B></TD></TR>
# You should probable need to change the string "Lever" in "Deliv" or something
$r = New-Object regex('Lever.*?(\\d+-\\d+-\\d{4})</B></TD></TR>','SingleLine' )
# String block with the Estimated Delivery Date
$m = $r.Matches($RawResult)
# Extract Delivery Date from string block
$date = ($m |% {$_.groups[1].value })
# Search for Current Order Status ("In preproduction" is Dutch for "In preproduction"
$r = New-Object regex('target="popup:640x480">(.*?)</a>' )
$m = $r.Matches($RawResult)
$status = ($m |% {$_.groups[1].value })
$Orderstatus = 1 | select @{name='Status';expression={$status[0]}},@{name='Estimated Delivery Date';expression={$date}}
$Orderstatus | ft -a
#[string]$output = $orderstatus
$startdate = "16-09-2007"
$startdate
$currentdate = (get-date).ToString('MM-dd-yyyy')
$currentdate
$date
|
combined_dataset/train/non-malicious/4074.ps1 | 4074.ps1 |
[CmdletBinding()]
param
(
[switch]$SystemInstall,
[ValidateNotNullOrEmpty()][string]$InstallLocation = 'C:\windows\system32',
[switch]$UserConfig,
[ValidateNotNullOrEmpty()][string]$PSConsoleTitle = 'CMTrace Installation'
)
function Close-Process {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$ProcessName
)
$Process = Get-Process $ProcessName -ErrorAction SilentlyContinue
If ($Process) {
Do {
$Count++
Write-Host "Closing"$Process.ProcessName"....." -NoNewline
$Process | Stop-Process -Force
Start-Sleep -Seconds 5
$Process = Get-Process $ProcessName -ErrorAction SilentlyContinue
If ($Process) {
Write-Host "Failed" -ForegroundColor Red
} else {
Write-Host "Success" -ForegroundColor Yellow
}
} while (($Process) -and ($Count -lt 5))
}
}
function Set-ConsoleTitle {
[CmdletBinding()]
param
(
[Parameter(Mandatory = $true)][String]$ConsoleTitle
)
$host.ui.RawUI.WindowTitle = $ConsoleTitle
}
function Get-RelativePath {
[CmdletBinding()][OutputType([string])]
param ()
$Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
Return $Path
}
function Install-CMTraceExecutable {
[CmdletBinding()]
param ()
Close-Process -ProcessName 'CMTrace'
$RelativePath = Get-RelativePath
$SourceFile = $RelativePath + 'CMTrace.exe'
Write-Host "Installing CMTrace.exe....." -NoNewline
Copy-Item -Path $SourceFile -Destination $InstallLocation -Force
If ((Test-Path $InstallLocation) -eq $true) {
Write-Host "Success" -ForegroundColor Yellow
$Success = $true
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
Return $Success
}
function Register-CMTraceToHKCR {
[CmdletBinding()][OutputType([boolean])]
param ()
New-PSDrive -Name HKCR -PSProvider Registry -Root HKEY_CLASSES_ROOT | Out-Null
$Success = $true
$MUICacheRegKey = 'HKCR:\Local Settings\Software\Microsoft\Windows\Shell\MuiCache'
$ApplicationCompany = $InstallLocation + '.ApplicationCompany'
$ApplicationCompanyValue = 'Microsoft Corporation'
$FriendlyName = $InstallLocation + '.FriendlyAppName'
$FriendlyNameValue = "CMTrace.exe"
$LogfileRegKey = "HKCR:\Logfile\Shell\Open\Command"
$TestKey = Get-ItemProperty $MUICacheRegKey -Name $ApplicationCompany -ErrorAction SilentlyContinue
Write-Host 'Register HKCR Application Company.....' -NoNewline
If ($TestKey.$ApplicationCompany -ne $ApplicationCompanyValue) {
New-ItemProperty -Path $MUICacheRegKey -Name $ApplicationCompany -Value $ApplicationCompanyValue -PropertyType String | Out-Null
$TestKey = Get-ItemProperty -Path $MUICacheRegKey -Name $ApplicationCompany -ErrorAction SilentlyContinue
If ($TestKey.$ApplicationCompany -eq $ApplicationCompanyValue) {
Write-Host 'Success' -ForegroundColor Yellow
} else {
Write-Host 'Failed' -ForegroundColor Red
$Success = $false
}
} else {
Write-Host 'Already Registered' -ForegroundColor Yellow
}
Write-Host 'Register HKCR Friendly Application Name.....' -NoNewline
$TestKey = Get-ItemProperty $MUICacheRegKey -Name $FriendlyName -ErrorAction SilentlyContinue
If ($TestKey.$FriendlyName -ne $FriendlyNameValue) {
New-ItemProperty -Path $MUICacheRegKey -Name $FriendlyName -Value $FriendlyNameValue -PropertyType String -ErrorAction SilentlyContinue | Out-Null
$TestKey = Get-ItemProperty -Path $MUICacheRegKey -Name $FriendlyName -ErrorAction SilentlyContinue
If ($TestKey.$FriendlyName -eq $FriendlyNameValue) {
Write-Host 'Success' -ForegroundColor Yellow
} else {
Write-Host 'Failed' -ForegroundColor Red
$Success = $false
}
} else {
Write-Host 'Already Registered' -ForegroundColor Yellow
}
If ((Test-Path $LogfileRegKey) -eq $true) {
Write-Host "Removing HKCR:\Logfile....." -NoNewline
Remove-Item -Path "HKCR:\Logfile" -Recurse -Force
If ((Test-Path "HKCR:\Logfile") -eq $false) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
}
Write-Host 'Register HKCR Logfile Classes Root.....' -NoNewline
New-Item -Path $LogfileRegKey -Force | Out-Null
New-ItemProperty -Path $LogfileRegKey -Name '(Default)' -Value $InstallLocation -Force | Out-Null
$TestKey = Get-ItemProperty -Path $LogfileRegKey -Name '(Default)' -ErrorAction SilentlyContinue
If ($TestKey.'(Default)' -eq $InstallLocation) {
Write-Host 'Success' -ForegroundColor Yellow
} else {
Write-Host 'Failed' -ForegroundColor Red
$Success = $false
}
Return $Success
}
function Register-CMTraceToHKCU {
[CmdletBinding()][OutputType([boolean])]
param ()
$Success = $true
$ClassesLogFileRegKey = "HKCU:\SOFTWARE\Classes\Log.file\Shell\Open\Command"
$ClassesLogFileRegKeyValue = [char]34 + $InstallLocation + [char]34 + [char]32 + [char]34 + "%1" + [char]34
If ((Test-Path "HKCU:\SOFTWARE\Classes\Log.file") -eq $true) {
Write-Host "Removing HKCU Log.File association....." -NoNewline
Remove-Item -Path "HKCU:\SOFTWARE\Classes\Log.file" -Recurse -Force
If ((Test-Path $ClassesLogFileRegKey) -eq $false) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
}
Write-Host "Register HKCU Log.File association....." -NoNewline
New-Item -Path $ClassesLogFileRegKey -Force | Out-Null
New-ItemProperty -Path $ClassesLogFileRegKey -Name '(Default)' -Value $ClassesLogFileRegKeyValue -Force | Out-Null
$TestKey = Get-ItemProperty -Path $ClassesLogFileRegKey -Name '(Default)' -ErrorAction SilentlyContinue
If ($TestKey.'(Default)' -eq $ClassesLogFileRegKeyValue) {
Write-Host 'Success' -ForegroundColor Yellow
} else {
Write-Host 'Failed' -ForegroundColor Red
$Success = $false
}
$FileExtsRegKey = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log"
If ((Test-Path $FileExtsRegKey) -eq $true) {
Write-Host "Removing HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log....." -NoNewline
Remove-Item -Path $FileExtsRegKey -Recurse -Force
If ((Test-Path $FileExtsRegKey) -eq $false) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
}
Write-Host "Registering .log key....." -NoNewline
New-Item -Path $FileExtsRegKey -Force | Out-Null
If ((Test-Path $FileExtsRegKey) -eq $true) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
$OpenWithList = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\OpenWithList"
Write-Host "Registering HKCU OpenWithList....." -NoNewline
New-Item -Path $OpenWithList -Force | Out-Null
New-ItemProperty -Path $OpenWithList -Name "a" -Value "CMTrace.exe" -PropertyType String -Force | Out-Null
New-ItemProperty -Path $OpenWithList -Name "b" -Value "NOTEPAD.EXE" -PropertyType String -Force | Out-Null
New-ItemProperty -Path $OpenWithList -Name "MRUList" -Value "ab" -PropertyType String -Force | Out-Null
$TestKeyA = Get-ItemProperty -Path $OpenWithList -Name 'a' -ErrorAction SilentlyContinue
$TestKeyB = Get-ItemProperty -Path $OpenWithList -Name 'b' -ErrorAction SilentlyContinue
$TestKeyMRUList = Get-ItemProperty -Path $OpenWithList -Name 'MRUList' -ErrorAction SilentlyContinue
If (($TestKeyA.a -eq "CMTrace.exe") -and ($TestKeyB.b -eq "NOTEPAD.EXE") -and ($TestKeyMRUList.MRUList -eq "ab")) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
$OpenWithProgids = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\OpenWithProgids"
Write-Host "Registering HKCU OpenWithProgids....." -NoNewline
New-Item -Path $OpenWithProgids -Force | Out-Null
New-ItemProperty -Path $OpenWithProgids -Name "txtfile" -PropertyType Binary -Force | Out-Null
New-ItemProperty -Path $OpenWithProgids -Name "Log.File" -PropertyType Binary -Force | Out-Null
$UserChoice = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.log\UserChoice"
Write-Host "Setting CMTrace as default viewer....." -NoNewline
New-Item -Path $UserChoice -Force | Out-Null
New-ItemProperty -Path $UserChoice -Name "Progid" -Value "Applications\CMTrace.exe" -PropertyType String -Force | Out-Null
$TestKey = Get-ItemProperty -Path $UserChoice -Name "Progid"
If ($TestKey.Progid -eq "Applications\CMTrace.exe") {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
$Success = $false
}
Return $Success
}
function Register-CMTraceToHKLM {
[CmdletBinding()][OutputType([boolean])]
param ()
$Success = $true
$LogFileRegKey = "HKLM:\SOFTWARE\Classes\Logfile\Shell\Open\Command"
If ((Test-Path $LogFileRegKey) -eq $true) {
Remove-Item -Path "HKLM:\SOFTWARE\Classes\Logfile" -Recurse -Force
}
Write-Host 'Register HKLM Logfile Classes Root.....' -NoNewline
New-Item -Path $LogFileRegKey -Force | Out-Null
New-ItemProperty -Path $LogFileRegKey -Name '(Default)' -Value $InstallLocation -Force | Out-Null
$TestKey = Get-ItemProperty -Path $LogFileRegKey -Name '(Default)' -ErrorAction SilentlyContinue
If ($TestKey.'(Default)' -eq $InstallLocation) {
Write-Host 'Success' -ForegroundColor Yellow
} else {
Write-Host 'Failed' -ForegroundColor Red
$Success = $false
}
Return $Success
}
function Set-CMTraceFileLocation {
[CmdletBinding()][OutputType([string])]
param ()
If ($InstallLocation -notlike '*CMTrace.exe*') {
If ($InstallLocation[$InstallLocation.count - 1] -eq '\') {
$NewLocation = $InstallLocation + 'CMTrace.exe'
} else {
$NewLocation = $InstallLocation + '\CMTrace.exe'
}
} else {
$NewLocation = $InstallLocation
}
Return $NewLocation
}
Set-ConsoleTitle -ConsoleTitle $PSConsoleTitle
Clear-Host
$Success = $true
$InstallLocation = Set-CMTraceFileLocation
If ($SystemInstall.IsPresent) {
$Status = Install-CMTraceExecutable
If ($Status = $false) {
$Success = $false
}
$Status = Register-CMTraceToHKCR
If ($Status = $false) {
$Success = $false
}
$Status = Register-CMTraceToHKLM
If ($Status = $false) {
$Success = $false
}
}
If ($UserConfig.IsPresent) {
$Status = Register-CMTraceToHKCU
If ($Status = $false) {
$Success = $false
}
}
If ($Success -eq $false) {
Exit 1
}
|
combined_dataset/train/non-malicious/ESXiMgmt module sample 4.ps1 | ESXiMgmt module sample 4.ps1 | #######################################################################################################################
# File: ESXiMgmt_search_for_guest_hostname_sample.ps1 #
# Author: Alexander Petrovskiy #
# Publisher: Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com #
# Copyright: © 2011 Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com. All rights reserved. #
# Prerequisites: The module was tested with Vmware ESXi 4.1 U1 on the server side and #
# Vmware PowerCLI 4.1 U1 #
# plink.exe 0.60.0.0 #
# Usage: To load this module run the following instruction: #
# Import-Module -Name ESXiMgmt -Force #
# Please provide feedback in the SoftwareTestingUsingPowerShell.WordPress.Com blog. #
#######################################################################################################################
param([string]$Server,
[string]$User,
[string]$Password,
[string]$DatastoreName,
[string]$Drive
)
# USAGE: .\\ESXiMgmt_search_for_guest_hostname_sample.ps1 192.168.1.1 root 123 datastore3 host1ds3
cls
Set-StrictMode -Version Latest
Import-Module ESXiMgmt -Force;
Connect-ESXi -Server $Server -Port 443 `
-Protocol HTTPS -User $User -Password $Password `
-DatastoreName $DatastoreName -Drive $Drive;
$vmname = Get-ESXiVMName -VMHostname 'B45E19A64B5E418'
Write-Host "Guest host $($vmname) corresponds to $($vmname)";
$hostnames = @(
'1-0028687D9BSP3',
'1-07B328CA254D4',
'1-081D88F5DF2D4',
'1-10BF79C694094',
'1-15DB4C70F57B4',
'1-1B154BAE5CD84',
'1-1D33859002954',
'1-3502988189C24',
'1-3A324DA9EBE54',
'1-9160383452304',
'1-96B95B980BDE4',
'1-B3F725FTYE56',
'1-E49B84B0A4AA4',
'1-FECEC772CBB74'
);
$vmnamesFromHostnames = Get-ESXiVMName -VMHostname $hostnames;
for ($private:i = 0; $private:i -lt $vmnamesFromHostnames.Length; $private:i++)
{
Write-Host "Guest host $($hostnames[$private:i]) corresponds to $($vmnamesFromHostnames[$private:i])";
}
|
combined_dataset/train/non-malicious/ConvertTo-CliXml_2.ps1 | ConvertTo-CliXml_2.ps1 | #requires -version 2.0
function ConvertTo-CliXml {
param(
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)]
[ValidateNotNullOrEmpty()]
[PSObject[]]$InputObject
)
begin {
$type = [type]::gettype("System.Management.Automation.Serializer")
$ctor = $type.getconstructor("instance,nonpublic", $null, @([System.Xml.XmlWriter]), $null)
$sw = new-object System.IO.StringWriter
$xw = new-object System.Xml.XmlTextWriter $sw
$serializer = $ctor.invoke($xw)
$method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null)
$done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance")
}
process {
try {
[void]$method.invoke($serializer, $InputObject)
} catch {
write-warning "Could not serialize $($InputObject.gettype()): $_"
}
}
end {
[void]$done.invoke($serializer, @())
$sw.ToString()
$xw.Close()
$sw.Dispose()
}
}
|
combined_dataset/train/non-malicious/2773.ps1 | 2773.ps1 |
function Compute-FileHash {
Param(
[Parameter(Mandatory = $true, Position=1)]
[string]$FilePath,
[ValidateSet("MD5","SHA1","SHA256","SHA384","SHA512","RIPEMD160")]
[string]$HashType = "MD5"
)
switch ( $HashType.ToUpper() )
{
"MD5" { $hash = [System.Security.Cryptography.MD5]::Create() }
"SHA1" { $hash = [System.Security.Cryptography.SHA1]::Create() }
"SHA256" { $hash = [System.Security.Cryptography.SHA256]::Create() }
"SHA384" { $hash = [System.Security.Cryptography.SHA384]::Create() }
"SHA512" { $hash = [System.Security.Cryptography.SHA512]::Create() }
"RIPEMD160" { $hash = [System.Security.Cryptography.RIPEMD160]::Create() }
default { "Invalid hash type selected." }
}
if (Test-Path $FilePath) {
$File = Get-ChildItem -Force $FilePath
$fileData = [System.IO.File]::ReadAllBytes($File.FullName)
$HashBytes = $hash.ComputeHash($fileData)
$PaddedHex = ""
foreach($Byte in $HashBytes) {
$ByteInHex = [String]::Format("{0:X}", $Byte)
$PaddedHex += $ByteInHex.PadLeft(2,"0")
}
$PaddedHex
$File.LastWriteTimeUtc
$File.Length
} else {
"${FilePath} is locked or could not be found."
"${FilePath} is locked or could not be not found."
Write-Error -Category InvalidArgument -Message ("{0} is locked or could not be found." -f $FilePath)
}
}
function GetShannonEntropy {
Param(
[Parameter(Mandatory=$True,Position=0)]
[string]$FilePath
)
$fileEntropy = 0.0
$FrequencyTable = @{}
$ByteArrayLength = 0
if(Test-Path $FilePath) {
$file = (ls $FilePath)
Try {
$fileBytes = [System.IO.File]::ReadAllBytes($file.FullName)
} Catch {
Write-Error -Message ("Caught {0}." -f $_)
}
foreach($fileByte in $fileBytes) {
$FrequencyTable[$fileByte]++
$ByteArrayLength++
}
$byteMax = 255
for($byte = 0; $byte -le $byteMax; $byte++) {
$byteProb = ([double]$FrequencyTable[[byte]$byte])/$ByteArrayLength
if ($byteProb -gt 0) {
$fileEntropy += -$byteProb * [Math]::Log($byteProb, 2.0)
}
}
$fileEntropy
} else {
"${FilePath} is locked or could not be found. Could not calculate entropy."
Write-Error -Category InvalidArgument -Message ("{0} is locked or could not be found." -f $FilePath)
}
}
if (Test-Path "$env:SystemRoot\Autorunsc.exe") {
$fileRegex = New-Object System.Text.RegularExpressions.Regex "(([a-zA-Z]:|\\\\\w[ \w\.]*)(\\\w[- \w\.\\\{\}]*|\\%[ \w\.]+%+)+|%[ \w\.]+%(\\\w[ \w\.]*|\\%[ \w\.]+%+)*)"
& $env:SystemRoot\Autorunsc.exe /accepteula -a * -c -h -s '*' -nobanner 2> $null | ConvertFrom-Csv | ForEach-Object {
$_ | Add-Member NoteProperty ScriptMD5 $null
$_ | Add-Member NoteProperty ScriptModTimeUTC $null
$_ | Add-Member NoteProperty ShannonEntropy $null
$_ | Add-Member NoteProperty ScriptLength $null
if ($_."Image Path") {
$_.ShannonEntropy = GetShannonEntropy $_."Image Path"
}
$fileMatches = $False
if (($_."Image Path").ToLower() -match "\.bat|\.ps1|\.vbs") {
$fileMatches = $fileRegex.Matches($_."Image Path")
} elseif (($_."Launch String").ToLower() -match "\.bat|\.ps1|\.vbs") {
$fileMatches = $fileRegex.Matches($_."Launch String")
}
if ($fileMatches) {
for($i = 0; $i -lt $fileMatches.count; $i++) {
$file = $fileMatches[$i].value
if ($file -match "\.bat|\.ps1|\.vbs") {
if ($file -match "%userdnsdomain%") {
$scriptPath = "\\" + [System.Environment]::ExpandEnvironmentVariables($file)
} elseif ($file -match "%") {
$scriptPath = [System.Environment]::ExpandEnvironmentVariables($file)
} else {
$scriptPath = $file
}
}
$scriptPath = $scriptPath.Trim()
$_.ScriptMD5,$_.ScriptModTimeUTC,$_.ScriptLength = Compute-FileHash $scriptPath
$scriptPath = $null
}
}
$_
}
} else {
Write-Error "Autorunsc.exe not found in $env:SystemRoot."
}
|
combined_dataset/train/non-malicious/sample_1_38.ps1 | sample_1_38.ps1 | <#
ISM PowerShell Service Module
This module contains a set of wrapper scripts that enable Administrator
To invoke iDRAC hard reset operation from host server.
#>
function IsAdministrator
{
<#
.SYNOPSIS
IsAdministrator.
.DESCRIPTION
Use IsAdministrator to get whether the user has an Administrator role.
.NOTES
Author: Faizal S N
#>
([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
}
Function Invoke-iDRACHardReset
{
<#
.SYNOPSIS
Invoke-iDRACHardReset.
.DESCRIPTION
Use Invoke-iDRACHardReset to reset iDRAC remotely without impacting the Host OS setup.
.PARAM force
If you want to reset the iDRAC through a script or without a confirmation message;
then the –force option can be used which does not ask for a confirmation and resets the iDRAC.
.PARAM logCmdUsage
This is reserved for internal use only.
.EXAMPLE
Invoke-iDRACHardReset –force
.NOTES
Author: Faizal S N
.LINK
http://en.community.dell.com/techcenter/extras/m/white_papers/20442753/download
#>
[CmdletBinding(
SupportsShouldProcess=$True,
ConfirmImpact="High"
)]
Param
(
[switch]$force,
[switch]$logCmdUsage
)
Begin
{
if (!(IsAdministrator))
{
Write-Warning "An unprivileged user '$env:username' tried to perform an iDRAC Hard Reset operation from the operating system (OS).`r`n";
Start-Sleep -s 5;
break;
}
}
Process
{
If( -not $force)
{
$key = Read-Host -Prompt "`r`nThis will reset the iDRAC. Do you want to proceed with this operation? (Y/N):"
while (($key -ne "Y") -and ($key -ne "y") -and ($key -ne "n") -and ($key -ne "N") )
{
$key =Read-Host -Prompt "`r`nPlease enter a valid option (Y/N):"
} #End while
if(($key -eq "N") -or ($key -eq "n"))
{
return;
}#End if no
} #End if no force
If( -not $logCmdUsage)
{
$returnValue = (Get-CimInstance -namespace root\cimv2\dcim -class DCIM_iSMService|Invoke-CimMethod -MethodName iDRACHardReset -Arguments @{cmdSource=1} |select-object ReturnValue).ReturnValue
}
Else
{
$returnValue = (Get-CimInstance -namespace root\cimv2\dcim -class DCIM_iSMService|Invoke-CimMethod -MethodName iDRACHardReset -Arguments @{cmdSource=2} |select-object ReturnValue).ReturnValue
}
$UserName=[System.Security.Principal.WindowsIdentity]::GetCurrent().Name
$TimeStamp = Get-Date -Format "ddd MMM dd HH:mm:ss yyyy"
if ($returnValue -eq 0)
{
$message = "The iDRAC Hard Reset operation is performed by system OS user " +
$UserName + " from the operating system (OS) on " +
$TimeStamp + ".";
}
ElseIf ($returnValue -eq 1)
{
$message = "Unable to complete the iDRAC Hard Reset operation because BIOS on the " +
"server does not support this feature.";
}
ElseIf ($returnValue -eq 2)
{
$message = "Unable to complete iDRAC Hard Reset operation because this feature " +
"is supported only on 13th Generation PowerEdge servers or later.";
}
ElseIf ($returnValue -eq 3)
{
$message = "An unprivileged user " + $UserName +
" tried to perform an iDRAC Hard Reset operation from the operating system (OS).";
}
ElseIf ($returnValue-eq 4)
{
$message = "Unable to perform the iDRAC Hard Reset operation either because of an unsupported " +
"CPLD firmware version or the iDRAC Hard reset feature is currently disabled on iDRAC.";
}
Write-host "`r`n$message`r`n";
} #End Process
End{}
} #In The End :)
Export-ModuleMember -function Invoke-iDRACHardReset
# SIG # Begin signature block
# MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFcS2PS7z64iHc
# ODD1rkrThh/CNlnTFcnMkK92k6TjpqCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m
# jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE
# ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s
# ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv
# ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx
# MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu
# MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq
# gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l
# OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr
# +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d
# vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1
# HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn
# DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig
# nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z
# HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK
# Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u
# DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC
# AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw
# FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG
# AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn
# MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp
# MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O
# BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp
# UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7
# BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+
# LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv
# 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF
# VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX
# bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG
# CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50
# cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y
# NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR
# BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf
# U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ
# bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U
# x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB
# GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE
# aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn
# YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH
# FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq
# QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h
# iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF
# 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB
# JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf
# BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw
# IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC
# hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E
# KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV
# HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn
# gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR
# Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5
# +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50
# NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB
# XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj
# /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO
# NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu
# Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg
# ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4
# mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l
# eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8
# 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG
# 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC
# MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u
# IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw
# MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV
# BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3
# DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg
# TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X
# 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF
# D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ
# TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2
# FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS
# lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt
# om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6
# U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV
# DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj
# hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs
# NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU
# 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z
# tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l
# bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu
# bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH
# AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu
# ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG
# mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4
# QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV
# gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi
# Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/
# eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh
# XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY
# 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA
# tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi
# GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR
# ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen
# mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ
# BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy
# dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G
# CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
# AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBH+1y0299f
# LEVg2MDLvtTqQ7Wy5+3A9/+NvpF6CXyNhDBABgorBgEEAYI3AgEMMTIwMKAWgBQA
# RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq
# hkiG9w0BAQEFAASCAYBGuz3a4m0l3MNvDXm+JMaEqcDvrksybHSHFTO/SGcpg/m5
# 8oVlp4gK0x0urKoDMkfz/eaxPJ6McfDRYd3PGDPgWNmZPfcgVGYGPk4qd+E9/NAE
# gR5Q19oDrMIygt5txp3Zstqz3kiAdpBzAb66OXreZbXrV8xGsEGdnQJ67RaHCuE1
# K59U+PPS0kkmSig/blux9WSBJKaUu2jqixQoCHcvvo+Pv7B+6xY/qB77KXHDMuxV
# sOGZJt/JTg483iyy+NGIpFme3jaWxb7Lt9CXmamJBTUgkAzqV/0pxPzxf74bUx7X
# IPBka2DVKfhfVlCL5/bB8y0+pR2p2uTVndm4+30IJTZjeXDpDXrU3nbS4EhPO3Ov
# I/bZx+TatU3HqL4qTiHoULGjFK0AKURt2DQo+pcNfFNpj/Omz2RMkpiOhoA30L5F
# x1NB39pFRrjATsb4gBpbj44enEiqNbcv+bC3Qo5sgGR4Dy3ZnTK//VBsZzn2EFhU
# /z3RUhoYXSzZFl5bIDahghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG
# 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE
# oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgVbWOve1QWJKA
# NvIzeCdcbSv8BoH5UZRIMCODGpxDnKcCEQCP9PuexLDSG6jzZuQiStcXGA8yMDI0
# MDkyMDA2NTQxNVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN
# BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs
# IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy
# NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1
# OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD
# VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc
# YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD
# 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd
# /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH
# 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk
# 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u
# ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT
# aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F
# aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+
# uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw
# o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB
# AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s
# BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2
# 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l
# U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho
# dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl
# cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU
# aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw
# jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt
# 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2
# V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp
# ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX
# TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3
# 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK
# qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7
# B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG
# hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc
# YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr
# LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o
# ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln
# aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE
# aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy
# MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt
# ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1
# BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z
# nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ
# Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6
# 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk
# psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn
# LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq
# x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd
# OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ
# TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR
# k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo
# AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G
# A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT
# BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD
# VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0
# VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9
# bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T
# zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS
# lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq
# T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl
# 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y
# r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05
# et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um
# AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe
# Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr
# 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC
# JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga
# oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN
# AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG
# A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl
# ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL
# MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3
# LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp
# M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR
# 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0
# O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53
# yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4
# x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd
# eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C
# doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh
# besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz
# 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB
# ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+
# CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w
# HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0
# ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw
# JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw
# AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE
# Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy
# dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE
# VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs
# oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI
# TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ
# qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v
# oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+
# cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy
# AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw
# OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT
# dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa
# BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky
# MDA2NTQxNVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG
# Txmcz0AwLwYJKoZIhvcNAQkEMSIEIJs5jJNTLYGJE1qq5bFTkAslwUyV1f57Jwab
# d8jjO6O3MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C
# itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICABYW6gDIZXLcV+TOP/YO
# wrvoXDuEhhyaOCYLqFV5G1FgQa6NyGKKRDXy+mtACpdblQG1dl7DBCEcy+vTiX9k
# +qUpOgRWVnnoWu17n7gVFq5sC45iv9jQ1fkgmv2+sH/IAt607HAvBXqr4//5KZGV
# kG9gh3dgs9wa1rssA4uWfgFxmXAFggUP8ROL7HOeHfOojPOx3gRtP7NLUn2j8Ktn
# vH7FL80THAP+zVpA3ILhWC+jKqqC8enX/RXiz7KW02ixJg/hXikjbmZ8X9ErlwbP
# pwx+RlCidnArVBV29D8uIrVBkxqWWuAzlWqikvdq9VLzXrk1YuZ0MfV35DEYDIqf
# y/KA5HkVBOCRaWq04jaQupb6BYKzY7D2KTzzy2FjvmBnhA1HAoluAFMT+HqmZI9c
# y9smXYs6Yza8gzkhiZAUgAv8QQQFn5nEiEBKlXmI456t6/DCfgc7KEq5Jf1IQC1j
# 2aXNi6DjCJojbdBSaiMj5mWW+KDzbXEpzMS90+QoqO1/eRsioKnX+8Rl1F3Lktms
# ObGvqNMa4BKk7wDWrTTuJrrm/XbtEb/HfsNcEo/TUE/nHVABWQwkseSy2X0cO/tO
# hr8CgXRxStwmPcSo7jk0KKJRGUge76HLeGohjiOXvQqmFELfT4WrxFcy0AdiQSBk
# TPXSICD6NLf7pAeXDD+asV8g
# SIG # End signature block
|
combined_dataset/train/non-malicious/3119.ps1 | 3119.ps1 |
function Get-InstalledSoftware
{
[CmdletBinding()]
param(
[Parameter(
Position=0,
HelpMessage='Search for product name (You can use wildcards like "*ProductName*')]
[String]$Search,
[Parameter(
Position=1,
HelpMessage='ComputerName or IPv4-Address of the remote computer')]
[String]$ComputerName = $env:COMPUTERNAME,
[Parameter(
Position=2,
HelpMessage='Credentials to authenticate agains a remote computer')]
[System.Management.Automation.PSCredential]
[System.Management.Automation.CredentialAttribute()]
$Credential
)
Begin{
$LocalAddress = @("127.0.0.1","localhost",".","$($env:COMPUTERNAME)")
[System.Management.Automation.ScriptBlock]$ScriptBlock = {
return Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" | Get-ItemProperty | Select-Object -Property DisplayName, Publisher, UninstallString, InstallLocation, InstallDate
}
}
Process{
if($LocalAddress -contains $ComputerName)
{
$Strings = Invoke-Command -ScriptBlock $ScriptBlock -ArgumentList $Search
}
else
{
if(Test-Connection -ComputerName $ComputerName -Count 2 -Quiet)
{
try {
if($PSBoundParameters.ContainsKey('Credential'))
{
$Strings = Invoke-Command -ScriptBlock $ScriptBlock -ComputerName $ComputerName -ArgumentList $Search -Credential $Credential -ErrorAction Stop
}
else
{
$Strings = Invoke-Command -ScriptBlock $ScriptBlock -ComputerName $ComputerName -ArgumentList $Search -ErrorAction Stop
}
}
catch {
throw
}
}
else
{
throw """$ComputerName"" is not reachable via ICMP!"
}
}
foreach($String in $Strings)
{
if((-not([String]::IsNullOrEmpty($String.DisplayName))) -and (-not([String]::IsNullOrEmpty($String.UninstallString))))
{
if((-not($PSBoundParameters.ContainsKey('Search'))) -or (($PSBoundParameters.ContainsKey('Search') -and ($String.DisplayName -like $Search))))
{
[pscustomobject] @{
DisplayName = $String.DisplayName
Publisher = $String.Publisher
UninstallString = $String.UninstallString
InstallLocation = $String.InstallLocation
InstallDate = $String.InstallDate
}
}
}
}
}
End{
}
}
|
combined_dataset/train/non-malicious/Event Log SOX audit.ps1 | Event Log SOX audit.ps1 | $s = "Server01", "Server02", "Server03"
foreach($server in $s) {$server
#$computername = Get-Content env:computername
$filter_Security = '<QueryList> <Query Id="0" Path="Security">
<Select Path="Security">(*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and
(Task = 13824 or Task = 13825 or Task = 13826 or Task = 13827 or Task = 13828 or Task = 13829 or
Task = 13568 or Task = 13569 or Task = 13570 or Task = 13571 or Task = 13572) or
(Task = 12544 and (band(Keywords,4503599627370496)))]]) or (*[System[Provider[@Name="Microsoft-Windows-Eventlog"] and Task = 104]])
</Select></Query></QueryList>'
$filter_AcctManagement = '<QueryList> <Query Id="0" Path="Security">
<Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and
(Task = 13824 or Task = 13825 or Task = 13826 or Task = 13827 or Task = 13828 or Task = 13829)]]
</Select></Query></QueryList>'
$filter_AuditPolicyChanges = '<QueryList> <Query Id="0" Path="Security">
<Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and
(Task = 13568 or Task = 13569 or Task = 13570 or Task = 13571 or Task = 13572 or Task = 13573)]]
</Select></Query></QueryList>'
$filter_FailedLogins = '<QueryList> <Query Id="0" Path="Security">
<Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Security-Auditing"] and
(Task = 12544 and (band(Keywords,4503599627370496)))]]
</Select></Query></QueryList>'
$filter_AuditCleared = '<QueryList> <Query Id="0" Path="Security">
<Select Path="Security">*[System[Provider[@Name="Microsoft-Windows-Eventlog"] and Task = 104]]
</Select></Query></QueryList>'
$filter_RDP = '<QueryList> <Query Id="0" Path="Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational">
<Select Path="Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational">*[System[Provider[@Name="Microsoft-Windows-TerminalServices-RemoteConnectionManager"] and (EventID=1149)]]
</Select></Query></QueryList>'
Get-WinEvent -computername $server -FilterXml $filter_RDP | Export-Csv \\\\networkpath\\$server.RDP.csv
Get-WinEvent -computername $server -FilterXml $filter_Security | Select-Object -Property 'Message','ID','Task','RecordID','LogName','ProcessID','ThreadID','MachineName','TimeCreated','TaskDisplayName' | Export-Csv \\\\networkpath\\$server.Security.csv
|
combined_dataset/train/non-malicious/2263.ps1 | 2263.ps1 |
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed.")]
[ValidateNotNullOrEmpty()]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer,
[parameter(Mandatory=$true, HelpMessage="Specify a Configuration Manager version that should be installed. Valid format is e.g. 1602 or 1606.")]
[ValidateNotNullOrEmpty()]
[ValidateScript({$_.Length -eq 4})]
[string]$Version,
[parameter(Mandatory=$false, HelpMessage="Specify how many times the script will check if an UpdatePackage is available for installation.")]
[ValidateNotNullOrEmpty()]
[int]$AvailabilityCheckCount = 120,
[parameter(Mandatory=$false, HelpMessage="Specify how many times the script will check if the prerequisite checks has completed for an UpdatePackage.")]
[ValidateNotNullOrEmpty()]
[int]$PrerequisiteCheckCount = 120
)
Begin {
try {
Write-Verbose -Message "Determining Site Code for Site server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Verbose -Message "Site Code: $($SiteCode)"
}
}
}
catch [System.UnauthorizedAccessException] {
Write-Warning -Message "Access denied" ; break
}
catch [System.Exception] {
Write-Warning -Message "Unable to determine Site Code" ; break
}
}
Process {
$UpdateCheckCount = 0
$PrereqCheckCount = 0
$UpdatePackageAvailibility = $false
$CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0) AND (State != 196612)" -Verbose:$false
if (($CMUpdatePackage | Measure-Object).Count -eq 1) {
do {
$UpdateCheckCount++
Write-Verbose -Message "Configuration Manager Servicing: Attempting to locate Update Package in SMS_CM_UpdatePackages matching 'Configuration Manager $($Version)'"
$CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false
if ($CMUpdatePackage -eq $null) {
Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage was not found matching 'Configuration Manager $($Version)', sleeping for 30 seconds"
}
else {
Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage found, validating if $($CMUpdatePackage.Name.TrimEnd()) is ready for installation"
switch ($CMUpdatePackage.State) {
327682 {
Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage state is Downloading, sleeping for 30 seconds"
if ($UpdateCheckCount -eq $AvailabilityCheckCount) {
Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): Downloading state detected for longer than $($AvailabilityCheckCount * 30 / 60) minutes, restarting SMS_EXECUTIVE service"
if ($PSCmdlet.ShouldProcess("SMS_EXECUTIVE", "Restart")) {
Restart-Service -Name "SMS_EXECUTIVE" -Force -Verbose:$false
}
$UpdateCheckCount = 0
}
}
262146 {
Write-Verbose -Message "Configuration Manager Servicing ($($UpdateCheckCount) / $($AvailabilityCheckCount)): UpdatePackage state is Available, attempting to initiate installation of $($CMUpdatePackage.Name.TrimEnd())"
$UpdatePackageAvailibility = $true
}
}
}
if ($UpdatePackageAvailibility -eq $false) {
Start-Sleep -Seconds 30
}
}
while ($CMUpdatePackage.State -ne 262146)
Write-Verbose -Message "Configuration Manager Servicing: Starting prerequisite checks for $($CMUpdatePackage.Name.TrimEnd())"
$CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false
if ($CMUpdatePackage -ne $null) {
if ($PSCmdlet.ShouldProcess($CMUpdatePackage.Name.TrimEnd(), "Install")) {
$CMUpdatePackage.UpdatePrereqAndStateFlags(0,2) | Out-Null
}
}
do {
$PrereqCheckCount++
if ($PrereqCheckCount -eq $PrerequisiteCheckCount) {
Write-Verbose -Message "Configuration Manager Servicing ($($PrereqCheckCount) / $($PrerequisiteCheckCount)): Prerequisite checks has been in running state for $($PrerequisiteCheckCount * 30 / 60) min, restarting SMS_EXECUTIVE service"
if ($PSCmdlet.ShouldProcess("SMS_EXECUTIVE", "Restart")) {
Restart-Service -Name "SMS_EXECUTIVE" -Force -Verbose:$false
}
$PrereqCheckCount = 0
}
else {
Write-Verbose -Message "Configuration Manager Servicing ($($PrereqCheckCount) / $($PrerequisiteCheckCount)): Waiting for prerequisite checks to complete for $($CMUpdatePackage.Name.TrimEnd()), sleeping for 30 seconds"
$CMUpdatePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_CM_UpdatePackages -ComputerName $SiteServer -Filter "(Name like 'Configuration Manager $($Version)%') AND (UpdateType = 0)" -Verbose:$false
Start-Sleep -Seconds 30
}
}
while ($CMUpdatePackage.State -ne 196609)
Write-Verbose -Message "Configuration Manager Servicing: Installation was successfully initated for $($CMUpdatePackage.Name.TrimEnd()), for more details, review the CMUpdate.log"
}
elseif (($CMUpdatePackage | Measure-Object).Count -gt 1) {
Write-Warning -Message "Query for Update Packages returned more than 1 instance, please define your search with a specific version"
}
else {
Write-Warning -Message "Query for Update Packages did not return any instances"
}
} |
combined_dataset/train/non-malicious/sample_40_34.ps1 | sample_40_34.ps1 | ###########################################################
#
# 'ServiceHelper' module
#
###########################################################
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
$global:GCServiceName = "GCService"
$script:GCServiceBinaryName = "gc_service.exe"
$script:GCServiceDisplayName = "Guest Configuration Service"
$script:GCServiceDescription = "This service monitors desired state of the machine."
$global:GCArcServiceName = "GCArcService"
$script:GCArcServiceBinaryName = "gc_arc_service.exe"
$script:GCArcServiceDisplayName = "Guest Configuration Arc Service"
$script:GCArcServiceDescription = "This service monitors desired state of the machine."
$global:ExtServiceName = "ExtensionService"
$script:ExtServiceBinaryName = "gc_extension_service.exe"
$script:ExtDisplayName = "Guest Configuration Extension service"
$script:ExtDescription = "The service installs the requested extensions"
$script:GCInstallPath = "$PSScriptRoot\..\..\.."
$script:GCBinariesFolderName = "GC"
$script:MigratedDataFolderName = "MigratedData"
$script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName
<#
.SYNOPSIS
Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location.
.Example
Install-ServiceInternal
#>
Function Install-ServiceInternal {
[CmdletBinding()]
Param(
[Parameter()]
[string]
$ServiceType = "GC"
)
Write-Verbose -Message "In Install-ServiceInternal"
if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName)))
{
Write-Error "GC service already exists, can not install new service"
}
elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName)))
{
Write-Error "Extension service already exists, can not install new service"
}
elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName)))
{
Write-Error "GC Arc service already exists, can not install new service"
}
else
{
# Default values for GC Azure Service
$serviceName = $global:GCServiceName
$serviceBinaryName = $script:GCServiceBinaryName
$displayName = $script:GCServiceDisplayName
$description = $script:GCServiceDescription
if ($ServiceType -eq "Extension")
{
$serviceName = $global:ExtServiceName
$serviceBinaryName = $script:ExtServiceBinaryName
$displayName = $script:ExtDisplayName
$description = $script:ExtDescription
}
elseif ($ServiceType -eq "GCArc")
{
$serviceName = $global:GCArcServiceName
$serviceBinaryName = $script:GCArcServiceBinaryName
$displayName = $script:GCArcServiceDisplayName
$description = $script:GCArcServiceDescription
}
$serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName
$absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath)
Write-Verbose -Message "GC Service binary path : $absolutePath."
$serviceApplication = Get-Command -Name $absolutePath -TotalCount 1
if ($serviceApplication.CommandType -ne "Application")
{
Write-Error "Service binary type is not as expected"
}
$servicePathWithQuotes = '"{0}"' -f $absolutePath
$serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs"
New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic
$command = "sc.exe config $ServiceName start= delayed-auto"
$Output = Invoke-Expression -Command $Command -ErrorAction Stop
if ($LASTEXITCODE -ne 0)
{
Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output"
}
else
{
Write-Verbose "Successfully changed $ServiceName service to delayed start"
}
# For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead.
$osVersion=[Environment]::OSVersion.Version
if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601))
{
# configure recovery of the service during failure.
$configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru
Start-Sleep -Seconds 10
}
else
{
# configure recovery of the service during failure.
$configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait
}
if ($null -eq $configureProcess)
{
Write-Error "Failed to start sc.exe process to configure $serviceName service."
}
# on 2008R2 ExitCode is not set.
if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode))
{
Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)"
}
Write-Verbose -Message "Successfully Installed new $serviceName."
}
Write-Verbose -Message "Validating $serviceName Properties."
# Validate service Properties as returend by Get-Service.
$serviceObject = Get-Service -Name $serviceName
if ($serviceObject.Status -eq 'Stopped')
{
Write-Verbose -Message "$serviceName is in Stopped State."
}
else
{
Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)"
}
if ($serviceObject.CanPauseAndContinue -eq $false)
{
Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State."
}
else
{
Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)"
}
if ($serviceObject.CanShutdown -eq $false)
{
Write-Verbose -Message "$serviceName has correct CanShutdown State."
}
else
{
Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)"
}
if ($serviceObject.CanStop -eq $false)
{
Write-Verbose -Message "$serviceName has correct CanStop State."
}
else
{
Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)"
}
if ($serviceObject.ServiceType -eq "Win32OwnProcess")
{
Write-Verbose -Message "$serviceName will run as Win32OwnProcess."
}
else
{
Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)"
}
# For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType
if ($serviceObject.PSObject.Properties['StartType'])
{
if ($serviceObject.StartType -eq "Automatic")
{
Write-Verbose -Message "$serviceName will be started Automatically."
}
else
{
Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)"
}
}
else
{
# Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on
# the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't
# find it then it is configured incorrectly.
$ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1]
if ($ServiceStartType -imatch '(DELAYED)')
{
Write-Verbose -Message "$serviceName will be started Automatically."
}
else
{
Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType"
}
}
# Also validate some service properties from the registry database of scm.
$serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName
if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand)
{
Write-Verbose -Message "$serviceName Binary is Installed Correctly."
}
else
{
Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)"
}
if ($serviceRegistryData.ObjectName -eq "LocalSystem")
{
Write-Verbose -Message "$serviceName will run under LocalSystem Account."
}
else
{
Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)"
}
if ($ServiceType -eq "GC")
{
if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName)
{
Write-Verbose -Message "$serviceName has correct Display Name."
}
else
{
Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)"
}
if ($serviceRegistryData.Description -eq $script:GCServiceDescription)
{
Write-Verbose -Message "$serviceName has correct Description Data."
}
else
{
Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)"
}
}
elseif ($ServiceType -eq "GCArc")
{
if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName)
{
Write-Verbose -Message "$serviceName has correct Display Name."
}
else
{
Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)"
}
if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription)
{
Write-Verbose -Message "$serviceName has correct Description Data."
}
else
{
Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)"
}
}
elseif ($ServiceType -eq "Extension")
{
if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName)
{
Write-Verbose -Message "$serviceName has correct Display Name."
}
else
{
Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)"
}
if ($serviceRegistryData.Description -eq $script:ExtDescription)
{
Write-Verbose -Message "$serviceName has correct Description Data."
}
else
{
Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)"
}
}
}
<#
.Synopsis
Get Guest Config data path.
#>
function Get-GuestConfigDataPath
{
[CmdletBinding()]
param ()
return Join-Path $env:ProgramData 'GuestConfig'
}
<#
.Synopsis
Set Acl permissions on given path
#>
function Set-AclPermissions
{
[CmdletBinding()]
Param
(
[Parameter()]
[string]
$ServiceType,
[Parameter()]
[string]
$Path
)
try
{
Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..."
if ($ServiceType -eq 'GC')
{
Write-Verbose -Message "Using Get-Acl"
$acl = Get-Acl $Path
}
else
{
# Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error
# So we are calling this only for Hybrid scenarios.
Write-Verbose -Message "Using Get-Item GetAccessControl"
$acl = (Get-Item $Path).GetAccessControl('Access')
}
# Removing inherited access rules
Write-Verbose -Message "Clearing existing ACL permissions"
$acl.SetAccessRuleProtection($True, $False)
# Adding new access rules for the target directory
Write-Verbose -Message "Setting ACL permissions for the built-in Administrator"
$BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID
$rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow')
$acl.AddAccessRule($rule)
Set-Acl $Path $acl
Write-Verbose -Message "Setting ACL permissions for the Local System"
$BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID
$rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow')
$acl.AddAccessRule($rule)
Set-Acl $Path $acl
Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell"
}
catch
{
Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..."
# For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead.
$osVersion=[Environment]::OSVersion.Version
if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601))
{
$processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru
$processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru
Start-Sleep -Seconds 5
}
else
{
$processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait
$processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait
}
if ($null -eq $processGrantAdminUserAccess)
{
Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path."
}
if ($null -eq $processGrantLocalSystemUserAccess)
{
Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path."
}
# on 2008R2 ExitCode is not set.
if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode))
{
Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)"
}
if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode))
{
Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)"
}
}
}
<#
.SYNOPSIS
Start the GC Service. Report Failure if service is not able to start.
.Example
Start-ServiceInternal
#>
Function Start-ServiceInternal {
[CmdletBinding()]
Param(
[Parameter()]
[string]
$ServiceType = "GC"
)
Write-Verbose -Message "In Start-ServiceInternal"
if ($ServiceType -eq "GC")
{
$serviceName = $global:GCServiceName
}
elseif ($ServiceType -eq "GCArc")
{
$serviceName = $global:GCArcServiceName
}
elseif ($ServiceType -eq "Extension")
{
$serviceName = $global:ExtServiceName
}
# Start GC Timer Service, may be retry on failure.
Start-Service $serviceName
$serviceObject = Get-Service -Name $serviceName
if ($serviceObject.Status -eq 'Running')
{
Write-Verbose -Message "$serviceName is running."
}
else
{
Write-Error "$serviceName can not be started."
}
}
<#
.SYNOPSIS
Stop the GC service and then uninstall it.
.Example
Uninstall-ServiceInternal
#>
Function Uninstall-ServiceInternal {
[CmdletBinding()]
Param(
[Parameter()]
[string]
$ServiceType = "GC"
)
Write-Verbose -Message "In Uninstall-ServiceInternal"
if ($ServiceType -eq "GC")
{
$serviceName = $global:GCServiceName
}
elseif ($ServiceType -eq "GCArc")
{
$serviceName = $global:GCArcServiceName
}
elseif ($ServiceType -eq "Extension")
{
$serviceName = $global:ExtServiceName
}
# Unregister GC Service
$timeOut = [timespan]::FromMinutes(5)
$stopRetry = [DateTime]::Now.Add($timeOut)
$secondsBetweenRetry = 3
Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError
if (Get-Service $serviceName -ErrorAction SilentlyContinue)
{
if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue)
{
while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry))
{
Write-Verbose "Wait for service to stop" -Verbose
Start-Sleep -Seconds $secondsBetweenRetry
}
}
$serviceObject = Get-Service -Name $serviceName
if ($serviceObject.Status -eq 'Stopped')
{
Write-Verbose -Message "$serviceName is stopped."
sc.exe delete $serviceName
}
else
{
Write-Error "$serviceName can not be Uninstalled because we are not able to stop it."
}
}
else
{
Write-Verbose "Service already stopped" -Verbose
}
# some basic validation to check service is Uninstalled.
$serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue
if ($serviceRegistryExists -ne $null) {
# sometimes the registry clean up does not happen right away. Hence do retry for the check.
while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry))
{
Start-Sleep -Seconds $secondsBetweenRetry
$serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue
}
# if service registry entry still exist.
if ($serviceRegistryExists -ne $null)
{
Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database."
}
}
$getService = Get-Service $serviceName -ErrorAction SilentlyContinue
if ($getService -ne $null)
{
Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status."
}
}
Function CheckServiceExists
{
[CmdletBinding()]
Param(
[Parameter()]
[string]
$ServiceName = $global:GCServiceName
)
if (Get-Service $serviceName -ErrorAction SilentlyContinue)
{
return $true
}
return $false
}
function Invoke-ScriptWithRetry {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, Position = 0)]
[ScriptBlock] $Script = {},
[Parameter()]
[int] $RetryCount = 3
)
$results = $null
$exceptionObject = $null
$keepRetrying = $true
Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())"
for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) {
try {
$exceptionObject = $null
$results = Invoke-Command -ScriptBlock $Script
$keepRetrying = $false
}
catch
{
Write-Verbose "Retry Count $i"
Write-Warning "$_"
$exceptionObject = $_
}
try {
# Processor utilization
$processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue
if($processorObj -ne $null) {
$cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average
Write-Verbose "CPU Usage : '$($cpuUsage)%'"
}
# Memory utilization
$computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue
if($computerMemory -ne $null) {
$memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize)
Write-Verbose "Memory Usage : '$($memory)%'"
}
}
catch
{
Write-Warning "Failed to compute Memory/CPU usage. Error : $_"
}
}
Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())"
if($exceptionObject -ne $null) {
throw $exceptionObject
}
return $results
}
# SIG # Begin signature block
# MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc
# Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMssvOiwDaWmswar3r1SHuBO
# B1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAurqLR9T6TfXUUnbq0D8DlgzSkRKjA5KISDa2f0PwZG+KSm0utU/3cM0s
# PZSIBF3ZaxG5wMQwXGiw+IDYGdcuUWpQuemVCZGkB9E6fkiVg1T58GuT2PASswuz
# YQ/VDgV9MJdQ/m825LHBDPlFeQjM1vZfFOlphiyJljCFooSKFdhiqAm2VXGU/xDS
# 7CSU7W9/BKJxw65rwTy6DKXnZWu4pv3nfjJhfmYspRiV9wwoOI5X4pZRGCEThHH1
# UmTMPx7N1mpCHY7RyZFnaKIFWER1PM41UiS5YvSwgzG1Axa67dvjw73TlR10T7AN
# oxkK6BMxpzeFla9lKidN2Lnr22LGYqGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC
# FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDZ40uAzAE4DAso5cMHK4iVkMJ+i5WF6TROLzjWaY9kXAIGZh+1nZVb
# GBMyMDI0MDQxNzE0NDMyNS42MzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnKNBowIhgPMjAyNDA0MTcxOTQyMThaGA8yMDI0MDQxODE5NDIxOFowdjA8Bgor
# BgEEAYRZCgQBMS4wLDAKAgUA6co0GgIBADAJAgEAAgELAgH/MAcCAQACAhFkMAoC
# BQDpy4WaAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAF1WisB0cR9AyQv/J
# Y9A0crhFLTFtPTWGC+QzXEYDXcHXsTejw/zcgHDaKqvk9rBXVrWTVR11ZMe5+u90
# Eo8jZiObO96B456eYQOh7taEH7dsR9RryPR8+HtIRuQzZUYBYtxQVDe0rmE41bDT
# X4geLj0amKQ02niEfK0F5Bgil+ExggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCBAuJ7Bo3rFIuswnP/iBDyzTpNPhF8IzwDFefV1MBcGIjCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz
# fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe
# nkielp8oRD0AAQAAAd4wIgQg59tlvKOhdJjBhInmVU5mphc6xzdlbZCC+bEf3kLZ
# JvUwDQYJKoZIhvcNAQELBQAEggIAj2o14Rb8K84RB+bNOWtLBH5xJ8EMr878c8tL
# ZuBJkMV52IVp0/m7NHyGbanRJKjwByW2RimmAP+5M/RiF5Wd9VtsOwb+61sylwZg
# +94zt/3y9Lcfht2y3gmTjnR+qpSHip5UDajQchdbcO1iCBuXeSzNIZ5xPB+WIM/D
# yyfpwtJL4Jeqvdb93P3YKT1fTimayCQQ/L9I0IzPbd+i3qJWZyid3AF4lXw+JK8D
# icWPAa0qGUqklRYdv1drdrZtpD+TlaRB8xGYgDUpZF00dzQ6oXBeHltI0m1hl7E0
# GKZaIiRPZoblvc3fzxN+Q2Az+TihdKERarDtnEsN/T4+PP3kVWCFpor6eceo5Fr5
# GL6YCIeccZbkWnybW4SiQjg2JbdVVZhqagc60i4fsasY+Cn7zbm/Q7glzB0b6Bri
# a+kyE2Lz8Ev+dLuqvPwkJiAhVXAb9PqcfPk/gN5iVUZcI0fOCcnj33Va3cQyHPbT
# WT9P3vXftR/zkboG+IHZ2wc8xYYdxO6n5ywiOB94KqAeN491zQy0ys7hdB6ZkruA
# WPDuTNIzsvhtxIwhhY7VnrbRcp4o5tT82eMCA7cgbUuxXdBe8AKdDqQKtdYUi1nf
# EuYRzcBbVKV0bGWhLHuVl9/URmcQzZzQXYtgc+xOHziyBTNRw4a4qI0+lktWzrH8
# VmmRvNM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_23_26.ps1 | sample_23_26.ps1 | parameters:
- name: channel
type: string
default: 1.77
- name: targets
default: []
type: object
# Todo: use 1ES pipeline once extension is installed in ADO
steps:
- task: RustInstaller@1
inputs:
rustVersion: ms-${{ parameters.channel }}
cratesIoFeedOverride: $(CARGO_REGISTRY)
additionalTargets: ${{ join(' ', parameters.targets) }}
toolchainFeed: https://pkgs.dev.azure.com/monacotools/Monaco/_packaging/vscode/nuget/v3/index.json
default: true
addToPath: true
displayName: Install MSFT Rust
condition: and(succeeded(), ne(variables['CARGO_REGISTRY'], 'none'))
- powershell: |
. build/azure-pipelines/win32/exec.ps1
Invoke-WebRequest -Uri "https://win.rustup.rs" -Outfile $(Build.ArtifactStagingDirectory)/rustup-init.exe
exec { $(Build.ArtifactStagingDirectory)/rustup-init.exe -y --profile minimal --default-toolchain $env:RUSTUP_TOOLCHAIN --default-host x86_64-pc-windows-msvc }
echo "##vso[task.prependpath]$env:USERPROFILE\.cargo\bin"
env:
RUSTUP_TOOLCHAIN: ${{ parameters.channel }}
displayName: Install OSS Rust
condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none'))
- powershell: |
. build/azure-pipelines/win32/exec.ps1
exec { rustup default $RUSTUP_TOOLCHAIN }
exec { rustup update $RUSTUP_TOOLCHAIN }
env:
RUSTUP_TOOLCHAIN: ${{ parameters.channel }}
displayName: "Set Rust version"
condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none'))
- ${{ each target in parameters.targets }}:
- script: rustup target add ${{ target }}
displayName: "Adding Rust target '${{ target }}'"
condition: and(succeeded(), eq(variables['CARGO_REGISTRY'], 'none'))
- powershell: |
. build/azure-pipelines/win32/exec.ps1
exec { rustc --version }
exec { cargo --version }
displayName: "Check Rust versions"
|
combined_dataset/train/non-malicious/NFSMountUsingReference.ps1 | NFSMountUsingReference.ps1 |
################################################################################################################
# VMWare Standard Scripts - PowerCLI
#
# Purpose: Mount NFS datastore on new host server using reference host datstore
# Author: David Chung
# Docs: NA
# Date: 2/4/2012
#
#
# Instruction: Enter VI server name, Reference Host server name
# Modify $hostincluster value either $true or $false
# $false value will only update single ESX host server with NFS mount
#
################################################################################################################
$HostinCluster = $false
$viserver = Read-Host "Enter VI server"
$refhost = Read-Host "Enter Reference host server"
Connect-VIServer $viserver
$REFHOST = Get-VMHost $refhost
If ($HostinCluster) {
$cluster = Read-Host "Enter Cluster that has new host servers"
$NEWHosts = Get-Cluster $cluster | Get-VMHost | sort name
foreach($nfs in (Get-VMhost $REFHOST | Get-Datastore | Where {$_.type -eq "NFS"} )){
[string]$remotePath = $nfs.extensiondata.info.nas.remotepath
[string]$remoteHost = $nfs.extensiondata.info.nas.remotehost
[string]$shareName = $nfs.Name
Foreach ($NEWHost in $NEWHosts) {
If ((Get-VMHost $NEWHOST | Get-Datastore | Where {$_.Name -eq $shareName -and $_.type -eq "NFS"} -ErrorAction SilentlyContinue )-eq $null){
Write-Host "NFS mount $shareName doesn't exist on $($NEWHOST.name)" -fore Red
New-Datastore -Nfs -VMHost $NEWHost.name -Name $Sharename -Path $remotePath -NfsHost $remoteHost | Out-Null
}
}
}
}
Else {
$NEWHOST = Read-Host "Enter new host name"
$Newhost = Get-VMHost $NEWHost
foreach($nfs in ($REFHOST | Get-Datastore | Where {$_.type -eq "NFS"} )){
[string]$remotePath = $nfs.extensiondata.info.nas.remotepath
[string]$remoteHost = $nfs.extensiondata.info.nas.remotehost
[string]$shareName = $nfs.Name
If (($NEWHOST | Get-Datastore | Where {$_.Name -eq $shareName -and $_.type -eq "NFS"} -ErrorAction SilentlyContinue )-eq $null){
Write-Host "NFS mount $shareName doesn't exist on $($NEWHOST.name)" -fore Red
New-Datastore -Nfs -VMHost $NEWHost.name -Name $Sharename -Path $remotePath -NfsHost $remoteHost | Out-Null
}
}
}
|
combined_dataset/train/non-malicious/1403.ps1 | 1403.ps1 |
function Test-CPerformanceCounterCategory
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$CategoryName
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
return [Diagnostics.PerformanceCounterCategory]::Exists( $CategoryName )
}
|
combined_dataset/train/non-malicious/3546.ps1 | 3546.ps1 |
function Create-VM(
[string] $resourceGroupName,
[string] $location,
[int] $nick = 0)
{
$suffix = $(Get-RandomSuffix 5) + $nick
$vmName = "PSTestVM" + $suffix
$vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore
if ($vm -eq $null)
{
$subnetConfigName = "PSTestSNC" + $suffix
$subnetConfig = New-AzVirtualNetworkSubnetConfig -Name $subnetConfigName -AddressPrefix 192.168.1.0/24
$vnetName = "PSTestVNET" + $suffix
$vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Location $location `
-Name $vnetName -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig -Force
$pipName = "pstestpublicdns" + $suffix
$pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Location $location `
-AllocationMethod Static -IdleTimeoutInMinutes 4 -Name $pipName -Force
$nsgRuleRDPName = "PSTestNSGRuleRDP" + $suffix
$nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name $nsgRuleRDPName -Protocol Tcp `
-Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * `
-DestinationPortRange 3389 -Access Allow
$nsgRuleWebName = "PSTestNSGRuleWeb" + $suffix
$nsgRuleWeb = New-AzNetworkSecurityRuleConfig -Name $nsgRuleWebName -Protocol Tcp `
-Direction Inbound -Priority 1001 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * `
-DestinationPortRange 80 -Access Allow
$nsgName = "PSTestNSG" + $suffix
$nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName -Location $location `
-Name $nsgName -SecurityRules $nsgRuleRDP,$nsgRuleWeb -Force
$nicName = "PSTestNIC" + $suffix
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Location $location `
-SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id -Force
$UserName='demouser'
$PasswordString = $(Get-RandomSuffix 12)
$Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText
$Credential=New-Object PSCredential($UserName,$Password)
$vmConfig = New-AzVMConfig -VMName $vmName -VMSize Standard_D1 | `
Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $Credential | `
Set-AzVMSourceImage -PublisherName MicrosoftWindowsServer -Offer WindowsServer `
-Skus 2016-Datacenter -Version latest | Add-AzVMNetworkInterface -Id $nic.Id
New-AzVM -ResourceGroupName $resourceGroupName -Location $location -VM $vmConfig | Out-Null
$vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName
}
return $vm
}
function Create-UnmanagedVM(
[string] $resourceGroupName,
[string] $location,
[string] $saname,
[int] $nick = 0)
{
$suffix = $(Get-RandomSuffix 5) + $nick
$vmName = "PSTestVM" + $suffix
$vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore
if ($vm -eq $null)
{
$subnetConfigName = "PSTestSNC" + $suffix
$subnetConfig = New-AzVirtualNetworkSubnetConfig -Name $subnetConfigName -AddressPrefix 192.168.1.0/24
$vnetName = "PSTestVNET" + $suffix
$vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Location $location `
-Name $vnetName -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig -Force
$pipName = "pstestpublicdns" + $suffix
$pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Location $location `
-AllocationMethod Static -IdleTimeoutInMinutes 4 -Name $pipName -Force
$nsgRuleRDPName = "PSTestNSGRuleRDP" + $suffix
$nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name $nsgRuleRDPName -Protocol Tcp `
-Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * `
-DestinationPortRange 3389 -Access Allow
$nsgRuleWebName = "PSTestNSGRuleWeb" + $suffix
$nsgRuleWeb = New-AzNetworkSecurityRuleConfig -Name $nsgRuleWebName -Protocol Tcp `
-Direction Inbound -Priority 1001 -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix * `
-DestinationPortRange 80 -Access Allow
$nsgName = "PSTestNSG" + $suffix
$nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName -Location $location `
-Name $nsgName -SecurityRules $nsgRuleRDP,$nsgRuleWeb -Force
$nicName = "PSTestNIC" + $suffix
$nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $resourceGroupName -Location $location `
-SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id -Force
$UserName='demouser'
$PasswordString = $(Get-RandomSuffix 12)
$Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText
$Credential=New-Object PSCredential($UserName,$Password)
$vmsize = "Standard_D1"
$vm = New-AzVMConfig -VMName $vmName -VMSize $vmSize
$pubName = "MicrosoftWindowsServer"
$offerName = "WindowsServer"
$skuName = "2016-Datacenter"
$vm = Set-AzVMOperatingSystem -VM $vm -Windows -ComputerName $vmName -Credential $Credential
$vm = Set-AzVMSourceImage -VM $vm -PublisherName $pubName -Offer $offerName -Skus $skuName -Version "latest"
$vm = Add-AzVMNetworkInterface -VM $vm -Id $NIC.Id
$sa = Get-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $saname
$diskName = "mydisk"
$OSDiskUri = $sa.PrimaryEndpoints.Blob.ToString() + "vhds/" + $diskName? + ".vhd"
$vm = Set-AzVMOSDisk -VM $vm -Name $diskName -VhdUri $OSDiskUri -CreateOption fromImage
New-AzVM -ResourceGroupName $resourceGroupName -Location $location -VM $vm | Out-Null
}
return $vm
}
function Create-GalleryVM(
[string] $resourceGroupName,
[string] $location,
[int] $nick = 0)
{
$suffix = $(Get-RandomSuffix 5) + $nick
$vmName = "PSTestGVM" + $suffix
$vm = Get-AzVM -ResourceGroupName $resourceGroupName -Name $vmName -ErrorAction Ignore
if ($vm -eq $null)
{
$subnetConfigName = "PSTestSNC" + $suffix
$vnetName = "PSTestVNET" + $suffix
$pipName = "pstestpublicdns" + $suffix
$nsgName = "PSTestNSG" + $suffix
$dnsLabel = "pstestdnslabel" + "-" + $suffix
$UserName='demouser'
$PasswordString = $(Get-RandomSuffix 12)
$Password=$PasswordString| ConvertTo-SecureString -Force -AsPlainText
$Credential=New-Object PSCredential($UserName,$Password)
$vm = New-AzVm `
-ResourceGroupName $resourceGroupName `
-Name $vmName `
-Location $location `
-SubnetName $subnetConfigName `
-SecurityGroupName $nsgName `
-PublicIpAddressName $pipName `
-ImageName "MicrosoftWindowsServer:WindowsServer:2012-R2-Datacenter:latest" `
-Credential $Credential `
-DomainNameLabel $dnsLabel
}
return $vm
}
function Cleanup-ResourceGroup(
[string] $resourceGroupName)
{
$resourceGroup = Get-AzResourceGroup -Name $resourceGroupName -ErrorAction Ignore
if ($resourceGroup -ne $null)
{
$vaults = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName
foreach ($vault in $vaults)
{
Delete-Vault $vault
}
Remove-AzResourceGroup -Name $resourceGroupName -Force
}
}
function Delete-Vault($vault)
{
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureVM
foreach ($container in $containers)
{
$items = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $container `
-WorkloadType AzureVM
foreach ($item in $items)
{
Disable-AzRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Item $item `
-RemoveRecoveryPoints -Force
}
}
Remove-AzRecoveryServicesVault -Vault $vault
}
function Start-TestSleep($milliseconds)
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
Start-Sleep -Milliseconds $milliseconds
}
}
function Enable-Protection(
$vault,
$vm,
[string] $resourceGroupName = "")
{
Start-TestSleep 5000
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureVM `
-FriendlyName $vm.Name;
if($resourceGroupName -eq "")
{
$resourceGroupName = $vm.ResourceGroupName
}
if ($container -eq $null)
{
$policy = Get-AzRecoveryServicesBackupProtectionPolicy `
-VaultId $vault.ID `
-Name "DefaultPolicy";
Enable-AzRecoveryServicesBackupProtection `
-VaultId $vault.ID `
-Policy $policy `
-Name $vm.Name `
-ResourceGroupName $resourceGroupName | Out-Null
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType AzureVM `
-FriendlyName $vm.Name;
}
$item = Get-AzRecoveryServicesBackupItem `
-VaultId $vault.ID `
-Container $container `
-WorkloadType AzureVM `
-Name $vm.Name
return $item
} |
combined_dataset/train/non-malicious/Get-ChildItemProxy.ps1 | Get-ChildItemProxy.ps1 | Function Get-ChildItemProxy {
[CmdletBinding(DefaultParameterSetName='Items', SupportsTransactions=$true)]
param(
[Parameter(ParameterSetName='Items', Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[System.String[]]
${Path},
[Parameter(ParameterSetName='LiteralItems', Mandatory=$true, Position=0, ValueFromPipelineByPropertyName=$true)]
[Alias('PSPath')]
[System.String[]]
${LiteralPath},
[Parameter(Position=1)]
[System.String]
${Filter},
[System.String[]]
${Include},
[System.String[]]
${Exclude},
[Switch]
${Recurse},
[Switch]
${Force},
[Switch]
${Name},
[Switch]
${ContainersOnly},
[Switch]
${NoContainersOnly}
)
begin
{
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer) -and $outBuffer -gt 1024)
{
$PSBoundParameters['OutBuffer'] = 1024
}
$wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Get-ChildItem', [System.Management.Automation.CommandTypes]::Cmdlet)
if ($ContainersOnly)
{
[Void]$PSBoundParameters.Remove("ContainersOnly")
$scriptCmd = {& $wrappedCmd @PSBoundParameters | Where-Object {$_.PSIsContainer -eq $true}}
} elseif ($NoContainersOnly)
{
[Void]$PSBoundParameters.Remove("NoContainersOnly")
$scriptCmd = {& $wrappedCmd @PSBoundParameters | Where-Object {$_.PSIsContainer -eq $false}}
}
{
$scriptCmd = {& $wrappedCmd @PSBoundParameters }
}
$steppablePipeline = $scriptCmd.GetSteppablePipeline()
$steppablePipeline.Begin($PSCmdlet)
} catch {
throw
}
}
process
{
try {
$steppablePipeline.Process($_)
} catch {
throw
}
}
end
{
try {
$steppablePipeline.End()
} catch {
throw
}
}
<#
.ForwardHelpTargetName Get-ChildItem
.ForwardHelpCategory Cmdlet
#>
}
|
combined_dataset/train/non-malicious/4112.ps1 | 4112.ps1 |
Set-Variable -Name FileName -Scope Global -Force
Set-Variable -Name Log -Scope Global -Force
Function DeleteLogFiles {
Set-Variable Count -Scope Local -Force
Set-Variable Files -Scope Local -Force
Set-Variable i -Scope Local -Force
$Months = @("Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec")
$Files = Get-ChildItem $Global:Log -Filter "*.log"
$Count = $Files.Count
If ($Count -ne 0) {
For ($i=0; $i -le $Count; $i++) {
For ($j=0; $j -le $Months.Count; $j++) {
$Month = "-"+$Months[$j]+"-"
$a = $Files[$i] -match $Month
If ($a -eq $true) {
$File = $Global:Log + "\" + $Files[$i]
If (Test-Path $File) {
Remove-Item -Path $File -Force
}
}
}
}
}
$File = $Global:Log + "\NotRebooted.log"
If (Test-Path $File) {
Remove-Item -Path $File -Force
}
Remove-Variable Count -Scope Local -Force
Remove-Variable Files -Scope Local -Force
Remove-Variable i -Scope Local -Force
}
Function NewLogFile {
$FileName = "NotRebooted.log"
$Log = $Env:windir + "\Logs"
New-Item -Path $Log -Name $FileName -ItemType File -Force
}
cls
DeleteLogFiles
NewLogFile
Restart-Computer -ComputerName localhost -Force
|
combined_dataset/train/non-malicious/2106.ps1 | 2106.ps1 |
Describe "Native streams behavior with PowerShell" -Tags 'CI' {
$powershell = Join-Path -Path $PsHome -ChildPath "pwsh"
Context "Error stream" {
$error.Clear()
$command = [string]::Join('', @(
'[Console]::Error.Write(\"foo`n`nbar`n`nbaz\"); ',
'[Console]::Error.Write(\"middle\"); ',
'[Console]::Error.Write(\"foo`n`nbar`n`nbaz\")'
))
$out = & $powershell -noprofile -command $command 2>&1
It 'should not add records to $error variable' {
$error.Count | Should -Be 9
}
It 'uses ErrorRecord object to return stderr output' {
($out | Measure-Object).Count | Should -BeGreaterThan 1
$out[0] | Should -BeOfType 'System.Management.Automation.ErrorRecord'
$out[0].FullyQualifiedErrorId | Should -Be 'NativeCommandError'
$out | Select-Object -Skip 1 | ForEach-Object {
$_ | Should -BeOfType 'System.Management.Automation.ErrorRecord'
$_.FullyQualifiedErrorId | Should -Be 'NativeCommandErrorMessage'
}
}
It 'uses correct exception messages for error stream' {
($out | Measure-Object).Count | Should -Be 9
$out[0].Exception.Message | Should -BeExactly 'foo'
$out[1].Exception.Message | Should -BeExactly ''
$out[2].Exception.Message | Should -BeExactly 'bar'
$out[3].Exception.Message | Should -BeExactly ''
$out[4].Exception.Message | Should -BeExactly 'bazmiddlefoo'
$out[5].Exception.Message | Should -BeExactly ''
$out[6].Exception.Message | Should -BeExactly 'bar'
$out[7].Exception.Message | Should -BeExactly ''
$out[8].Exception.Message | Should -BeExactly 'baz'
}
It 'preserves error stream as is with Out-String' {
($out | Out-String).Replace("`r", '') | Should -BeExactly "foo`n`nbar`n`nbazmiddlefoo`n`nbar`n`nbaz`n"
}
It 'does not get truncated or split when redirected' {
$longtext = "0123456789"
while ($longtext.Length -lt [console]::WindowWidth) {
$longtext += $longtext
}
pwsh -c "& { [Console]::Error.WriteLine('$longtext') }" 2>&1 > $testdrive\error.txt
$e = Get-Content -Path $testdrive\error.txt
$e.Count | Should -Be 1
$e | Should -BeExactly $longtext
}
}
}
Describe 'piping powershell objects to finished native executable' -Tags 'CI' {
It 'doesn''t throw any exceptions, when we are piping to the closed executable' {
1..3 | ForEach-Object {
Start-Sleep -Milliseconds 100
@{'a' = 'b'}
} | testexe -echoargs | Should -BeNullOrEmpty
}
}
|
combined_dataset/train/non-malicious/Backup Rotation (7zip).ps1 | Backup Rotation (7zip).ps1 | First file RotateBackups_MasterList.txt
RowNbr,BackupName,VersionsRetained,BackupType
1,TargetBackup,2,Folder
2,LstDefBackup,5,File
3,XMLBackup,3,File
4,SourceBackup,2,Folder
5,TXTBackup,8,File
Second file RotateBackups_FolderList.txt
RowNbr,BackupName,FolderName
1,TargetBackup,c:\\MyBooks\\target
2,SourceBackup,c:\\MyBooks\\source
Third file RotateBackups_FileExtensions.txt
RowNbr,BackupName,FileExtension,FolderLoc
1,LstDefBackup,*.def,c:\\MyBooks\\target
2,LstDefBackup,*.lst,c:\\MyBooks\\target
3,XMLBackup,*.xml,c:\\MyBooks\\target
4,TXTBackup,*.txt,c:\\MyBooks\\rfiles
When executed, files are created in c:\\Zipfiles that have a name associated with the BackupName, a batch date-time. BackupName files are counted & compared to VersionsRetained value, and excess ones (oldest first) are marked for deletion upon next run of script. Can specify a delete to recycle bin (default) or a destructive delete of the backup.
Use at your own risk.
Script:
function create-7zip([String] $aDirectory, [String] $aZipfile){
[string]$pathToZipExe = "C:\\Program Files\\7-zip\\7z.exe";
[Array]$arguments = "a", "-tzip", "$aZipfile", "$aDirectory", "-r";
& $pathToZipExe $arguments;
}
# Call it by using:
#create-7zip "c:\\temp\\myFolder" "c:\\temp\\myFolder.zip"
#************************************************************************************
#************************************************************************************
# Initialize variables
$zipFolder = "C:\\ZipFiles"
$nameConv = "{0:yyyyMMdd_HHmmss}" -f (Get-Date) + ".zip"
$fileList = @{}
$FileCountArray = @()
$bkupTypeArr = @()
$myDocFolder = "c:\\Documents and Settings\\MyPC\\My Documents\\"
# Import text files for master, folder and file backup information
$bkupRotateMasterArr = Import-Csv $myDocFolder"RotateBackups_MasterList.txt"
$fldrBkupArray = Import-Csv $myDocFolder"RotateBackups_FolderList.txt"
$fileExtBkupArr = Import-Csv $myDocFolder"RotateBackups_FileExtensions.txt"
# Switch to delete Item or to send to recycle bin
# delete is destructive and cannot recover file.
# Recycle setting removes file from folder, but sends to recycle bin
# and can be restored if needed.
# Must be either "Kill" or "Recycle"
$KillOrRecycle = "Recycle"
#************************************************************************************
#************************************************************************************
# Load contents of master backup array
$bkup_Counts = @{}
$b = $null
foreach($b in $bkupRotateMasterArr)
{
$bkup_Counts[$b.BackupName] = $b.VersionsRetained
}
#set Backup Types from the array we just defined
$type = $null
foreach ($type in $bkup_Counts.Keys) {
$bkupTypeArr += $type
}
#create array of our filenames for this batch
$type = $null
$fArray = @{}
foreach ($type in $bkupRotateMasterArr) {
$fArray[$type.BackupName] = ($type.BackupName + $nameConv)
}
# if extension array not null, get list of files to back up
if ($fileExtBkupArr) {
# Gather the list of files to be backed up
$f = $null
foreach ($f in $fileExtBkupArr) {
$arr = @()
$arr = (Get-ChildItem $f.FolderLoc -Recurse -Include $f.FileExtension | Select-Object fullname)
foreach ($a in $arr) {
if ($a) {
$fileList[$a] = $f.BackupName
} # if $a not null
} # end inner foreach
} # end outer foreach
} # if FileExtension Backup Array not null
# if filelist count gt zero, then create zip file of them for appropriate backup
if ($fileList.Count -gt 0) { # must have entries in hashtable
$f = $null
#Loop thru file list & associate file with the appropriate backup
foreach ($f in $fileList.Keys) {
$arcFile = $null
if ($fileList.ContainsKey($f)) {
if ($fArray.ContainsKey($fileList[$f])) {
$arcFile = $fArray[$fileList[$f]]
create-7zip $f.FullName $zipFolder\\$arcFile
} #if key in fArray
} # if key in Filelist
} # end foreach
} # if hastable not empty
# if folder backup not null then back up folders
if ($fldrBkupArray) { # check if array not null (no entries)
$f = $null
#Backup Folders now
foreach ($f in $fldrBkupArray) {
$arcFldr = $null
#if ($fArray.ContainsKey($f[1])) {
if ($fArray.ContainsKey($f.BackupName)) {
$arcFldr = $fArray[$f.BackupName]
create-7zip $f.FolderName $zipFolder\\$arcFldr
} #end if
} # end foreach
} # end if $fldrBkupArray not null
# if 7zip succeeded, we'll continue
if ($LASTEXITCODE -gt 0)
{Throw "7Zip failed" }
ELSE { # if Exitcode = 0 then continue with job
# Remove any files with Archive bit = False
# we marked it for deletion in previous run
Add-Type -AssemblyName Microsoft.VisualBasic
$files=get-childitem -path $zipFolder
# we'll delete all files that don't have the archive bit set
Foreach($file in $files) {
If((Get-ItemProperty -Path $file.fullname).attributes -band [io.fileattributes]::archive)
{ Write-output "$file is set to be retained" }
ELSE {
if ($KillOrRecycle = "Recycle") {
Write-output "$file does not have the archive bit set. Deleting (Sent to recycle bin)."
[Microsoft.VisualBasic.FileIO.Filesystem]::DeleteFile($file.fullname,'OnlyErrorDialogs','SendToRecycleBin')
$output = $_.ErrorDetails
}
ELSE {
Write-output "$file does not have the archive bit set. Deleting."
remove-item -recurse $file.fullname
$output =$_.ErrorDetails
}
}
} #end Foreach
# Export BackupCounts to XML
$bkup_counts | Export-Clixml bkup_counts.xml
# Get Number of ZIP files in folder
$btype = $null
foreach ($btype in $bkupTypeArr) {
$FileCountArray += ,@(($btype),(dir $zipFolder\\$btype"*.zip").count)
}
# Import BkupCounts from XML
$bkup_Counts= Import-Clixml bkup_counts.xml
# set Attribute byte on ALL files in zipfolder so we know we'll get the right ones
attrib $zipFolder"\\*" +a
$row = $null
# Get LST & DEF filenames in array & display count
foreach ($row in $bkup_Counts.Keys) {
Get-ChildItem -Path $zipFolder -Include $row"*" -Recurse #|
(dir $zipFolder\\$row"*".zip).count - $bkup_Counts[$row]
$delfiles = 0
$delfiles = (dir $zipFolder\\$row"*".zip).count - $bkup_Counts[$row]
if ($delfiles -gt 0) { #sort folder by createdtime
# if more than specified nbr of backups present, un-archive excess ones to delete next run.
dir $zipFolder\\$row"*" | sort-object -property {$_.CreationTime} |
select-object -first $delfiles |
foreach-object { attrib $_.FULLNAME -A}
} # end if delfiles gt 0
} # End foreach in bkup_counts
} # End Else Last ExitCode = 0
|
combined_dataset/train/non-malicious/3781.ps1 | 3781.ps1 |
function Test-SyncGroup
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
$storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Get SyncGroup by Name"
$syncGroup = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Get SyncGroup by ParentObject"
$syncGroup = Get-AzStorageSyncGroup -ParentObject $storageSyncService -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Get SyncGroup by ParentResourceId"
$syncGroup = Get-AzStorageSyncGroup -ParentResourceId $storageSyncService.ResourceId -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -AsJob | Wait-Job
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName | Get-AzStorageSyncGroup | Remove-AzStorageSyncGroup -Force -AsJob | Wait-Job
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName | Remove-AzStorageSyncGroup -Force -AsJob | Wait-Job
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-NewSyncGroup
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
$syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-GetSyncGroup
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Get SyncGroup by Name"
$syncGroup = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-GetSyncGroups
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Get SyncGroup by Name"
$syncGroups = Get-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Verbose
Assert-AreEqual $syncGroups.Length 1
$syncGroup = $syncGroups[0]
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-GetSyncGroupParentObject
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
$storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Get SyncGroup by ParentObject"
$syncGroup = Get-AzStorageSyncGroup -ParentObject $storageSyncService -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-GetSyncGroupParentResourceId
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
$storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Get SyncGroup by ParentResourceId"
$syncGroup = Get-AzStorageSyncGroup -ParentResourceId $storageSyncService.ResourceId -Name $syncGroupName -Verbose
Write-Verbose "Validating SyncGroup Properties"
Assert-AreEqual $syncGroupName $syncGroup.SyncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-RemoveSyncGroup
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-RemoveSyncGroupInputObject
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
$syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -InputObject $syncGroup -Force
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
}
function Test-RemoveSyncGroupResourceId
{
$resourceGroupName = Get-ResourceGroupName
Write-Verbose "RecordMode : $(Get-StorageTestMode)"
try
{
$storageSyncServiceName = Get-ResourceName("sss")
$syncGroupName = Get-ResourceName("sg")
$resourceGroupLocation = Get-ResourceGroupLocation
$resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices");
Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup"
New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation;
Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService"
New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName
Write-Verbose "Resource: $syncGroupName | Loc: $resourceLocation | Type : SyncGroup"
$syncGroup = New-AzStorageSyncGroup -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Name $syncGroupName
Write-Verbose "Removing SyncGroup: $syncGroupName"
Remove-AzStorageSyncGroup -ResourceId $syncGroup.ResourceId -Force
Write-Verbose "Removing StorageSyncService: $storageSyncServiceName"
Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName
}
finally
{
Write-Verbose "Removing ResourceGroup : $resourceGroupName"
Clean-ResourceGroup $resourceGroupName
}
} |
combined_dataset/train/non-malicious/sample_11_58.ps1 | sample_11_58.ps1 | @{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIImEQYJKoZIhvcNAQcCoIImAjCCJf4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl
# RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT
# Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5
# eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW
# AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1
# PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD
# s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX
# ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w
# S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
# aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO
# 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j
# cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV
# HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf
# E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L
# fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t
# ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH
# g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1
# et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG
# azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz
# WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+
# DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS
# cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/
# OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU
# pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA
# vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA
# AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY
# mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g
# BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH
# AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl
# AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC
# lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz
# /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b
# jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9
# TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b
# 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9
# pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj
# ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol
# Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ
# 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN
# Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w
# 3gI/h+5WoezrtUyFMYIaBTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB
# IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ
# KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB
# gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq
# aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa
# gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy
# QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs
# 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6
# 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf
# L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4
# XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V
# pyexP/sw9u51ejlEtaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3
# DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRAB
# BKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8
# TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZZ/PqiPeGBMyMDI0MDEx
# MjAwNTYwNC45NTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy
# YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcx
# JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCC
# BQigAwIBAgITMwAAAdYnaf9yLVbIrgABAAAB1jANBgkqhkiG9w0BAQsFADB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEyMzRaFw0yNDAy
# MDExOTEyMzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL
# Ex5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDPLM2Om8r5u3fcbDEOXydJtbkW5U34KFaftC+8QyNqplMIzSTC1ToE
# 0zcweQCvPIfpYtyPB3jt6fPRprvhwCksUw9p0OfmZzWPDvkt40BUStu813QlrloR
# dplLz2xpk29jIOZ4+rBbKaZkBPZ4R4LXQhkkHne0Y/Yh85ZqMMRaMWkBM6nUwV5a
# DiwXqdE9Jyl0i1aWYbCqzwBRdN7CTlAJxrJ47ov3uf/lFg9hnVQcqQYgRrRFpDNF
# MOP0gwz5Nj6a24GZncFEGRmKwImL+5KWPnVgvadJSRp6ZqrYV3FmbBmZtsF0hSlV
# jLQO8nxelGV7TvqIISIsv2bQMgUBVEz8wHFyU3863gHj8BCbEpJzm75fLJsL3P66
# lJUNRN7CRsfNEbHdX/d6jopVOFwF7ommTQjpU37A/7YR0wJDTt6ZsXU+j/wYlo9b
# 22t1qUthqjRs32oGf2TRTCoQWLhJe3cAIYRlla/gEKlbuDDsG3926y4EMHFxTjsj
# rcZEbDWwjB3wrp11Dyg1QKcDyLUs2anBolvQwJTN0mMOuXO8tBz20ng/+Xw+4w+W
# 9PMkvW1faYi435VjKRZsHfxIPjIzZ0wf4FibmVPJHZ+aTxGsVJPxydChvvGCf4fe
# 8XfYY9P5lbn9ScKc4adTd44GCrBlJ/JOsoA4OvNHY6W+XcKVcIIGWwIDAQABo4IB
# STCCAUUwHQYDVR0OBBYEFGGaVDY7TQBiMCKg2+j/zRTcYsZOMB8GA1UdIwQYMBaA
# FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh
# bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH
# MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC
# MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG
# SIb3DQEBCwUAA4ICAQDUv+RjNidwJxSbMk1IvS8LfxNM8VaVhpxR1SkW+FRY6AKk
# n2s3On29nGEVlatblIv1qVTKkrUxLYMZ0z+RA6mmfXue2Y7/YBbzM5kUeUgU2y1M
# mbin6xadT9DzECeE7E4+3k2DmZxuV+GLFYQsqkDbe8oy7+3BSiU29qyZAYT9vRDA
# LPUC5ZwyoPkNfKbqjl3VgFTqIubEQr56M0YdMWlqCqq0yVln9mPbhHHzXHOjaQsu
# rohHCf7VT8ct79po34Fd8XcsqmyhdKBy1jdyknrik+F3vEl/90qaon5N8KTZoGtO
# FlaJFPnZ2DqQtb2WWkfuAoGWrGSA43Myl7+PYbUsri/NrMvAd9Z+J9FlqsMwXQFx
# AB7ujJi4hP8BH8j6qkmy4uulU5SSQa6XkElcaKQYSpJcSjkjyTDIOpf6LZBTaFx6
# eeoqDZ0lURhiRqO+1yo8uXO89e6kgBeC8t1WN5ITqXnjocYgDvyFpptsUDgnRUiI
# 1M/Ql/O299VktMkIL72i6Qd4BBsrj3Z+iLEnKP9epUwosP1m3N2v9yhXQ1HiusJl
# 63IfXIyfBJaWvQDgU3Jk4eIZSr/2KIj4ptXt496CRiHTi011kcwDpdjQLAQiCvoj
# 1puyhfwVf2G5ZwBptIXivNRba34KkD5oqmEoF1yRFQ84iDsf/giyn/XIT7YY/zCC
# B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw
# gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
# KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx
# MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry
# IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT
# cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx
# XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ
# HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1
# KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s
# 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg
# fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3
# Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je
# 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY
# hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY
# P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC
# NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w
# HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB
# BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD
# CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T
# AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV
# HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w
# cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE
# TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC
# AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a
# ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp
# 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq
# 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB
# woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG
# +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B
# FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77
# IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ
# fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K
# 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx
# yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB
# +aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEl
# MCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
# blNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD5r3DVRpAGQo9s
# TLUHeBC87NpK+qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MA0GCSqGSIb3DQEBCwUAAgUA6Ur23zAiGA8yMDI0MDExMTIzMjMxMVoYDzIwMjQw
# MTEyMjMyMzExWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpSvbfAgEAMAcCAQAC
# AgQYMAcCAQACAhU+MAoCBQDpTEhfAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD
# ggEBACno8CogT+Xwzfb7b33B7KBa0OpBUCO+m+nSFzOecC+7WUCbQ47e44m0MUGI
# DHnxmCAPWF4X/za+XHtnQ/z8c+dhM0UKHfxic+KxZR0OTS0FKa8fAdty/Zv656Uk
# iZ8Qb2SjU+ZUj3y7DLSQ6psy6Gh5NV0kwhPosZDWNMseKHO7FH8kRY6uGua+r00L
# 9hCQcUf8ekLZ/b/Zwodz9D6xo3QCgQs4nB7NJepSIVxNjJvMWC+FCxplBKbySUkK
# CEs50x6iJnlUCsMm6zPz5x/DCn0o8qyKEVK6CYHJqrhMmF0wizBIDl0nTFAYWuOo
# GqLLL+mNNf/144gMgkisEl+TJL8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdYnaf9yLVbIrgABAAAB1jANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCAKly3Qp7jIV88ouK0mLrkzS9HdIS8EY0/Oy2CCHLjxIjCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EINbLTQ1XeNM+EBinOEJMjZd0jMNDur+AK+O8P12j
# 5ST8MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHW
# J2n/ci1WyK4AAQAAAdYwIgQgqgKVOn4d3fahYzULOQfdc47J0jL631hgDfRk3zmA
# SCcwDQYJKoZIhvcNAQELBQAEggIAR6n89A+ZHy8DfzY4Z295YzoMMiB970C9QpHt
# +O53neMguDJ/TJjT8B63Dy7GEpCYy1QCtIqKHJtQoDZqHGPekteW//S3FIEV1dmr
# VX5MO9iJ3R8m7/Z0LtkMybdXqZ8VI+9VGNip4ecMJP/0msqP39ZqjuwjyRFRQAkh
# xa2fMyj6LguzwLTQjb17bk6jNBKUXBovzmRYb/glKWFI98nUfn0AAd4IZNtdubfu
# qnpeVMkpKFIQB4F+UKQeqHkg2ebhX7e+ZqSPkwvsFepw32Z+4iwDZW5Ir+Dqd4oW
# dA3OobpRN2mqIWFuPjizg4AlbxHDm/buNomjlWubvOAnHehkt5lUrNs15L47f09+
# 1/gqF8M6QSzOr/e8Lg/dDXlMVuJS0I+iThTW7CKnDi1iqmiMz0NQ4s2LFwqNRJkD
# JuC6q8uFprwOexqoxpoWHAq57Y7q0+YRsTp/D/Gw6UCdU9ILgeNE1hpDJTKLVSlu
# +8OofizokYI4rceXLGgygP+ukAMJKuzwbfOGdDBDWwTy6le77GzwmS6OrGVKF/Da
# /3gUX/A9TuoGx5/PwUXUHcWjN+FmtY1As/QtOx6/bmICML1eRYXKLIcC8ruk8G1e
# GIv+WL3EN0XiascuYoxfU6XCssE/gNOUvRk/kKsrrY/xjxJxKcdq4xbouw/SE+T/
# njMXi40=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1139.ps1 | 1139.ps1 |
Set-StrictMode -Version 'Latest'
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
Describe 'Get-ServiceConfiguration' {
BeforeEach {
$Global:Error.Clear()
}
It 'should load all service configuration' {
Get-Service |
Where-Object { $_.Name -notlike 'Carbon*' } |
Get-ServiceConfiguration |
Format-List -Property *
$Global:Error.Count | Should -Be 0
}
It 'should write an error if the service doesn''t exist' {
$info = Get-CServiceConfiguration -Name 'YOLOyolo' -ErrorAction SilentlyContinue
$info | Should -BeNullOrEmpty
$Global:Error | Should -Match 'Cannot\ find\ any\ service'
}
It 'should ignore missing service' {
$info = Get-CServiceConfiguration -Name 'FUBARsnafu' -ErrorAction Ignore
$info | Should -BeNullOrEmpty
$Global:Error | Should -BeNullOrEmpty
}
It 'should load extended type data' {
$services = Get-Service | Where-Object { $_.Name -notlike 'Carbon*' }
$memberNames = $null
foreach( $service in $services )
{
$info = Get-CServiceConfiguration -Name $service.Name
if( -not $memberNames )
{
$memberNames =
$info |
Get-Member -MemberType 'Property' |
Select-Object -ExpandProperty 'Name'
}
foreach( $memberName in $memberNames )
{
$info.$memberName | Should -Be $service.$memberName
}
}
$Global:Error.Count | Should -Be 0
}
}
|
combined_dataset/train/non-malicious/2262.ps1 | 2262.ps1 | [CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true)]
$DriveLetter,
[parameter(Mandatory=$true)]
$ShareName,
[parameter(Mandatory=$true)]
$ADGroup,
[parameter(Mandatory=$false)]
[switch]$CreateDFS
)
$ErrorActionPreference = "Stop"
try {
[System.Reflection.Assembly]::LoadWithPartialName("System.DirectoryServices") | Out-Null
}
catch {
Write-Error $_.Exception
}
try {
$Domain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() | Select-Object -ExpandProperty Name
}
catch {
Write-Error $_.Exception
}
if ($CreateDFS -eq $true) {
$DFSRoles = @("FS-DFS-Namespace", "RSAT-DFS-Mgmt-Con")
$DFSRoles | ForEach-Object {
Install-WindowsFeature $_ | Out-Null
}
}
$FolderStructure = @(
"$($DriveLetter)\$($ShareName)",
"$($DriveLetter)\$($ShareName)\Apps",
"$($DriveLetter)\$($ShareName)\Pkgs",
"$($DriveLetter)\$($ShareName)\SUM",
"$($DriveLetter)\$($ShareName)\SUM\ADRs",
"$($DriveLetter)\$($ShareName)\OSD",
"$($DriveLetter)\$($ShareName)\OSD\BootImages",
"$($DriveLetter)\$($ShareName)\OSD\CSettings",
"$($DriveLetter)\$($ShareName)\OSD\DriverSources",
"$($DriveLetter)\$($ShareName)\OSD\DriverPackages",
"$($DriveLetter)\$($ShareName)\OSD\OSImages",
"$($DriveLetter)\$($ShareName)\OSD\MDT",
"$($DriveLetter)\$($ShareName)\OSD\MDT\Settings",
"$($DriveLetter)\$($ShareName)\OSD\MDT\Toolkit"
)
$FolderStructure | ForEach-Object {
try {
if (-not(Test-Path -Path $_ -ErrorAction SilentlyContinue)) {
Write-Output "INFO: Creating folder $($_)"
New-Item -Path $_ -ItemType Directory | Out-Null
}
}
catch {
Write-Error $_.Exception
}
}
try {
$ACLObject = Get-Acl "$($DriveLetter)\$($ShareName)"
$ACLObject.SetAccessRuleProtection($True, $False)
$RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("$($ADGroup)","FullControl","ContainerInherit,ObjectInherit","None","Allow")
$ACLObject.AddAccessRule($RuleObject)
$RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("SYSTEM","FullControl","ContainerInherit,ObjectInherit","None","Allow")
$ACLObject.AddAccessRule($RuleObject)
$RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("Administrators","FullControl","ContainerInherit,ObjectInherit","None","Allow")
$ACLObject.AddAccessRule($RuleObject)
$RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("Authenticated Users",@("ReadData","AppendData","Synchronize"),"None","None","Allow")
$ACLObject.AddAccessRule($RuleObject)
$RuleObject = New-Object System.Security.AccessControl.FileSystemAccessRule("CREATOR OWNER","FullControl","ContainerInherit,ObjectInherit","InheritOnly","Allow")
Set-Acl "$($DriveLetter)\$($ShareName)" $ACLObject
}
catch {
Write-Warning $_.Exception
}
try {
if ($ShareName.Substring(($ShareName.Length-1)) -match "$") {
$Data = $ShareName.Substring(0,($ShareName.Length-1))
}
$SecurityDescriptor = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_SecurityDescriptor").CreateInstance()
$ACE = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_ACE").CreateInstance()
$Trustee = ([WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_Trustee").CreateInstance()
$Trustee.Name = "Everyone"
$Trustee.Domain = $null
$ACE.AccessMask = 2032127
$ACE.AceFlags = 3
$ACE.AceType = 0
$ACE.Trustee = $Trustee
$SecurityDescriptor.DACL += $ACE.PsObject.BaseObject
$WMIConnection = [WmiClass]"\\$($env:COMPUTERNAME)\root\cimv2:Win32_Share"
$ObjectParams = $WMIConnection.psbase.GetMethodParameters("Create")
$ObjectParams.Path = "$($DriveLetter)\$($Data)$"
$ObjectParams.Name = "$($Data)$"
$ObjectParams.Type = 0
$ObjectParams.MaximumAllowed = 100
$ObjectParams.Access = $SecurityDescriptor
$WMIConnection.InvokeMethod("Create",$ObjectParams,$null) | Out-Null
$GetShareObject = Get-WmiObject -Namespace "root\cimv2" -Class "Win32_Share" | Where-Object { $_.Name -like "$($Data)$" }
if ($GetShareObject) {
Write-Output "INFO: Successfully shared \\$($env:COMPUTERNAME)\$($Data)$"
}
}
catch {
Write-Warning $_.Exception
}
if ($PSBoundParameters["CreateDFS"].IsPresent) {
try {
New-DfsnRoot -Path "\\$($Domain)\$($Data)$" -TargetPath "\\$($env:COMPUTERNAME)\$($Data)$" -Type DomainV2 -State Online | Out-Null
}
catch {
Write-Warning $_.Exception
}
} |
combined_dataset/train/non-malicious/2430.ps1 | 2430.ps1 |
[CmdletBinding()]
param (
[Parameter(Mandatory,ValueFromPipeline,ValueFromPipelineByPropertyName)]
[string[]]$ServiceName,
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateScript({Test-Connection -ComputerName $_ -Quiet -Count 1 })]
[string[]]$Computername = 'localhost',
[Parameter(Mandatory)]
[string]$Username,
[Parameter(Mandatory)]
[string]$Password
)
process {
foreach ($Computer in $Computername) {
foreach ($Service in $ServiceName) {
try {
Write-Verbose -Message "Changing service '$Service' on the computer '$Computer'"
$s = Get-WmiObject -ComputerName $Computer -Class Win32_Service -Filter "Name = '$Service'"
if (!$s) {
throw "The service '$Service' does not exist"
}
$s.Change($null, $null, $null, $null, $null, $null, $Username, $Password) | Out-Null
$s | Restart-Service -Force
} catch {
Write-Error -Message "Error: Computer: $Computer - Service: $Service - Error: $($_.Exception.Message)"
}
}
}
} |
combined_dataset/train/non-malicious/sample_65_10.ps1 | sample_65_10.ps1 | #
# Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker'
#
# Generated by: Microsoft Corporation
#
# Generated on: 19/01/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = ''
# Version number of this module.
ModuleVersion = '1.2100.2671.410'
# Supported PSEditions
# CompatiblePSEditions = ''
# ID used to uniquely identify this module
GUID = '9ee2434c-26a4-4fad-909d-2dc59f4b657b'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft AzStackHci Readiness Checker'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @(
'AzStackHci.Connectivity.psm1'
'AzStackHci.Connectivity.Helpers.psm1'
)
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Invoke-AzStackHciConnectivityValidation',
'Get-AzStackHciConnectivityServiceName',
'Get-AzStackHciConnectivityOperationName'
)
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Microsoft','AzStackHci'
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCbBRp4czO32Gty
# FHPuzNaErRLNIxPMgnBKulxkj5uv16CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILeBbQrf/XKyAd0AX7HYr1x9
# EER6RRFxhRVzXUZ5DwagMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAi1/69E8l5Vo15vGGuWjSLIcvHf0k8vSSOhvD0so+xJtHgNmy2+UpaA9s
# eaDW3gLw2pYpwMC0IesAxMxSpIQVutirYviI8udPeW6gyTt9H2xUjsYyeKjGmcg9
# VZ7B5mDyXl85Mic6ZpJG97/U+7bxx26Le2vR+Vj1E6k7sFoyHjpuYmAWQHWgZbiD
# CfX8hhXX3I8uS5mN+uYYfq7IdW3zF77ztR5Q/1LwYbeXeDFcZBnO064r1cMHQb7G
# iI1MJ55PAMnM3o4bpdZMsyrg0dbbDAUrxD1gAEgPZ8wBjM5CLOunIxd6uHSk4LTX
# C1Z6x/7DMtgROx/mVznGmwlT9dxp2qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBa9GQRTe+Xo/csSRvY258jEj6JV3cmHoXY1wWtLeoFWAIGZjOrHlUn
# GBMyMDI0MDUxNjE4NDQyOS4yODFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwnUMwIhgPMjAyNDA1MTYyMjU3MDdaGA8yMDI0MDUxNzIyNTcwN1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCdQwIBADAHAgEAAgID3zAHAgEAAgIRrTAKAgUA
# 6fHuwwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGRlJmD4Pm0a2ZXNrC7c
# hWy5hXLsafZMqicwyWFUOagBv008UJXV934PwR/AYu6JEfRQNBQKDOYskFLAOnvO
# jXU9VhvPALsmy8+mZD2thf4r2HFkYffZGvyfS7G61QPbGd/6gez0O4p8pdFeQq8o
# jY4M2biKfSLGPGc+lo2XncRfMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgkjjui/hGQLpBYjNRLhGHrY3W6OVfB/iihYMtOupDWzwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIKTJslI+Gq3aHsWJ9P5eKg7d9P5UfEDHlHAwLXSd1TWf
# MA0GCSqGSIb3DQEBCwUABIICADVBgmhvKvsdtmQnUquLfm9qOf4Q/NWGx7uf0bfA
# mc/cpNVAPGTcNvdYPG1egUeq7uUPoK0gcN1nUjF4zvJbofaRGiBUwIk0gcXeHz4e
# OZRJDroXLj3fR7KG9GH+LsvtK3Cmk0wx+nLc4OhmdBOg9IMVU8BDDn5wPDifJ/TV
# Sifs/Z1U6NEx05ONpBUm+9cusL423TgtprajTSiLs7JIx13LaM/WDSgW1GwgBHh4
# Q5nE3fHtbRzvbnDB6DlqxUdusARrZkGOiUZIvWqDaxZkG4YynuzIDM2zTMm7ArVf
# CHqROpYrOW/sHnj81vJsN060Q7PByBwbShVcPjBR4iBPopHUmit/+PudKAmr62wJ
# 9eFGR50izrk1xrejZGonXQivT6qWipsYrvnuPjZHj1XAq2TvnteF1lV2FUmRL7ee
# BIEhcidhtfZ8LC4w4LX1PGIr/gBOWNJM8dHpMf8X+LY0UnnY7W1mJYKZxtL7HlnJ
# hs8/gbYet/S+VhJRwIZsOHN6C5lOOWIoo5jYOLNTyxhC+O3WxFW/1+3XAwgTSUTx
# QW50Rked/XEDVgiagAC/w8bQDgZijSOl0j3bWkatxp5BaLqSToxIyE4ILQk0evh6
# OzN4UDdILbhnhfyrswX4uZVkWTENHR6nLzjzurW8YKdJW5TlbXuAu3skSbFuYar2
# wj8C
# SIG # End signature block
|
combined_dataset/train/non-malicious/View-Process.ps1 | View-Process.ps1 | function View-Process {
param(
[string[]]$ComputerNames,
[string[]]$ProcessNames,
$User
)
###########################################################################################################
if ($User -is [String]) {
$Connection = Get-Credential -Credential $User
}
###########################################################################################################
foreach ($int1 in $ComputerNames) {
if ($ProcessNames -eq $null) {
if ($Connection -eq $null) {
$View_Process = gwmi "win32_process" -ComputerName $int1 |
select __SERVER,Name,Handle
}
else {
$View_Process = gwmi "win32_process" -ComputerName $int1 -Credential $Connection |
select __SERVER,Name,Handle
}
$View_Process
}
else {
foreach ($int2 in $ProcessNames) {
if ($int2 -notlike "*.exe") {$int2 = $int2 + '.exe'}
if ($Connection -eq $null) {
$View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" |
select __SERVER,Name,Handle
}
else {
$View_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" -Credential $Connection |
select __SERVER,Name,Handle
}
$View_Process
}
}
}
###########################################################################################################
}
|
combined_dataset/train/non-malicious/sample_52_4.ps1 | sample_52_4.ps1 | # Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function ConvertFrom-ScriptExtent {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[CmdletBinding()]
[OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFileRange, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferRange')]
[OutputType([Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices], ParameterSetName='BufferPosition')]
param(
[Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent[]]
$Extent,
[Parameter(ParameterSetName='BufferRange')]
[switch]
$BufferRange,
[Parameter(ParameterSetName='BufferPosition')]
[switch]
$BufferPosition,
[Parameter(ParameterSetName='BufferPosition')]
[switch]
$Start,
[Parameter(ParameterSetName='BufferPosition')]
[switch]
$End
)
process {
foreach ($aExtent in $Extent) {
switch ($PSCmdlet.ParameterSetName) {
BufferRange {
# yield
[Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new(
$aExtent.StartLineNumber,
$aExtent.StartColumnNumber,
$aExtent.EndLineNumber,
$aExtent.EndColumnNumber)
}
BufferPosition {
if ($End) {
$line = $aExtent.EndLineNumber
$column = $aExtent.EndLineNumber
} else {
$line = $aExtent.StartLineNumber
$column = $aExtent.StartLineNumber
}
# yield
[Microsoft.PowerShell.EditorServices.Extensions.FileRange, Microsoft.PowerShell.EditorServices]::new(
$line,
$column)
}
}
}
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBPKxil1U4JnRPS
# QyqUqw0RKxJ6fsZihk0k1ECh3hKbp6CCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIK4/
# 5I8fIFzVsF+1m770kKJ3FjDZS+ZNvbZeAbFH/Nn6MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAPjEqhEi/tA3h2TqnT1tkgZNUOD2yLnDmyKW5
# B6XgbNdHfxF4fzL79K3Fu3oCuNa2zT2C8uNf8jRkpZRDXKb1oHon8KcUs/Nx9nHD
# 4ynu+NmvwJLXonvpFBMuhB4s2OSWvLwXIbj1tLzn+W8yEl2KoPE2ZpuJJDoiily3
# A3TI6Lctb5DgEFyUZ8nVzv3Q+Ff+2/6mhfLWZ8HpTbiOGKdjHIUjJvktmwtTqduO
# MMfhzY7cfEt3vW1cBvkqoJzZrMe8AOzN1ISCwb4hvIRzEqu/cO75MojvmWXhETEo
# to4E20SHsmqzqdmHCiNBw467ZqPOfcESzRFiW+3r+4lHk8z1HqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC0b6WDzAPx4DMWpcvN+xb7J0p0OhzfLVj7
# yhTuGIGW3wIGZXsV8QF4GBMyMDI0MDEwNDAyMDg1My4xMTFaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAAB
# AAAB1DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzA1MjUxOTEyMjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybW
# cSAbu8FLwTEtOvw3uXMpa1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4
# CpXB1Hwn1YYovuYujoQV9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyyS
# vjwPvZuxH8RNcOOB8ABDhJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1
# F3lt7Ni47pJMGMLqZQCK7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQ
# P/7c7oPJPDFgpbGB2HRJaE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1Ls
# JmFWJHbqGr6o0irW7IqDkf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBk
# rmil0H/tv3HYyE6A490ZFEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/
# ZGHJ2cbuIer9umQYu/Fz1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qm
# YRymjDmpfzZvfvGBGUbOpx+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuN
# X1Tpz4KZLM8GlzZLje3aHfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/
# wHCt4HyXW4WgTGPizyExTQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6
# EoB5Hedcsru0DHZJMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdR
# hYlZ9Bk4/bLzLOzq+wcC7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL
# 4PizKnStLDBsWT+ds1hayNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04
# PGjcFhH1gGRphz+tcDNK/CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcT
# V9W13cm2FD5F/XWO37Ti+G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40
# YIkTNnuco6ny7vEBmWFjcr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rv
# EQ/PUJi3popYsrQKuogphdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHh
# eQNd/a3X/2zpSwEROOcy1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+R
# XUB4A6UL1E1Xjtzr/b9qz9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYA
# TVI2lwL9QDSEt8F0RW6LekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71Hyil
# telaMhRUsNVkaKzAJrUoESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy
# 3vUDJpjUTYLtaTWkQtz6UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQAtM12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6T/xwTAi
# GA8yMDI0MDEwMzE0NDYyNVoYDzIwMjQwMTA0MTQ0NjI1WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDpP/HBAgEAMAcCAQACAiFXMAcCAQACAhPIMAoCBQDpQUNBAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALufOA9K6r3uobCpP1be2P4LwO5g
# LCJ/JZ2A/40jbyBVBk3jk8uPQFM/7Ny79WYdEXDvPduGHUgo/Eo9ngrpID5meSe6
# tmrYO0Em2ueEBlslhPabP8wGoyEyMQkPDA3WHQk8CH3Ec93wBPEIKN0Ua7xHpOzW
# p+GcZiRKs0oUg3YEmHdRhyU7vxOKoXKhMKD4E++6SG+LdWY89dh5XH7zlOkfELPQ
# +iYamyMCfDNBZSzJGkhGNYRHnVpRCJL2B3+p8t9eh7a66mWh2jRCc7UzHKgm6mct
# GtnzuvHQTzH+DCzCkt1t1NZeUQ7t8kWWBeJKkJz3XyTcXurQdfmZBG9eOzsxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdTk
# 6QMvwKxprAABAAAB1DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCA41yl7g44MbGEp9Ai1uL7gmkSw
# eoloQlc4ZWNSX3C5bzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzqh/rY
# FKXOlzvWS5xCtPi9aU+fBUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQgoF7qE+Me
# TL9N6DGst7RvaXCDpOWS8qcQIsyNaRgAiZswDQYJKoZIhvcNAQELBQAEggIAMPsb
# ZdCMpBrLv5WhMZpxXC04dSLB4WH86rzroy1fFz/0NeHlABhuhfqg/IgFFu2s9NDA
# ZjJIzZKRsBM3gnG7YJABWUJoRNcdFu6+DDWc6E+AaO+gFmQ7nM3uLO3R20N/GhMG
# N3oaw2RMY+nOdczjgBlSKbo860A0d1rsgWuJ9F7CMEGl8LmnXHZfKB3vz12SlB8n
# kDFp/KLOCf/1+1+Uoq8twsM3LukSZSTLtljLVsaWGeYbBjY3L1okZxRD40YI3phI
# AYKZekdECKxvHgJ6JalY2VFxfUs5BXCtWzU2KpvffEMVwKwOm7bePJqtu72/pGl1
# kDrCsbeNxnRgR+rGNgSrKnk1BSZNyXNsdp/VjteWx7WgjisBgzaVfH3iYif92MH5
# 655KYJGLpc3Cj7I1aZ6uBVgqp86Z/lbtXSCvf5/w9YglzH6Hw6Lm+KsAq3CJ57RZ
# 60gF0eJAN3L8c0f/pzgRlVqPvS7xgdEdK6gudZZiW+anvbXAxJ8jdSkcBEogP0Jb
# m3NuzCOsGydTnRxdkaGqxbmENM9fC9jfBxvMmHD89gFzbdxAsPrhTn7oi7H2Bqe/
# GxvRkcoyiH8Gkcid19VgtV07F7XHNs4NJL69zWnafLnlbgMK+dX5XRZ1L6dWYkzv
# wf/UvaW5Cz6DYLOPpAOGUNkoUGPO5kkNiaLJq3U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-XVM_10.ps1 | New-XVM_10.ps1 | Function New-XVM
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$false,Position=1)]
[string]$ComputerName=$env:COMPUTERNAME,
[Parameter(Mandatory=$true,Position=2)]
[string]$Name,
[Parameter(Mandatory=$true,Position=3)]
[string]$SwitchName,
[Parameter(Mandatory=$true,Position=4)]
[ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")]
[string]$VhdType,
[Parameter(Mandatory=$false,Position=5)]
[hashtable]$Configuration
)
DynamicParam
{
Switch ($VhdType) {
"ExistingVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("VhdPath",$vhdPath)
return $paramDictionary
break
}
"NewVHD" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("DiskType",$diskType)
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $false
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection)
$paramDictionary.Add("DiskSize",$diskSize)
return $paramDictionary
break
}
"Differencing" {
$attributes = New-Object System.Management.Automation.ParameterAttribute
$attributes.ParameterSetName = "ByParam"
$attributes.Mandatory = $true
$attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute]
$attributeCollection.Add($attributes)
$parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection)
$paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary
$paramDictionary.Add("ParentVhdPath",$parentVhdPath)
return $paramDictionary
}
}
}
Begin
{
Try
{
$vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop
}
Catch
{
$PSCmdlet.ThrowTerminatingError($Error[0])
}
$defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath
}
Process
{
$validConfigNames = "MemoryStartupBytes","BootDevice"
$configParams = @()
Switch ($VhdType) {
"NoVHD" {
$newVhdPath = $null
}
"ExistingVHD" {
$newVhdPath = $vhdPath.Value
}
"NewVhd" {
if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"}
if (-not $diskSize.IsSet) {$diskSize.Value = 127GB}
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
Switch ($diskType.Value) {
"Fixed" {
$vhdFile = New-VHD -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
"Dynamic" {
$vhdFile = New-VHD -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop
}
}
}
"Differencing" {
$newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx"
$vhdFile = New-VHD -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop
}
}
if ($vhdFile -ne $null) {
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'"
} else {
$command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD"
}
if ($Configuration -ne $null) {
foreach ($configName in $Configuration.Keys.GetEnumerator()) {
if ($validConfigNames -contains $configName) {
$configParams += "-$configName" + " " + $Configuration[$configName]
}
}
$configParams = $configParams -join " "
}
if ($configParams.Count -eq 0) {
$command += " -ErrorAction Stop"
} else {
$command += " $configParams -ErrorAction Stop"
}
Try
{
Invoke-Expression -Command $command
}
Catch
{
$PSCmdlet.WriteError($Error[0])
Remove-Item -Path $vhdFile.Path
}
}
End {}
}
|
combined_dataset/train/non-malicious/Reflection_1.ps1 | Reflection_1.ps1 | $nul = "<NULL>"
function Get-AssembliesTree {
[AppDomain]::CurrentDomain.GetAssemblies() | % {
$nod = New-Object Windows.Forms.TreeNode
$nod.Text = $_.GetName().Name
$nod.Tag = $_
$tvAssem.Nodes.Add($nod)
$nod.Nodes.Add($nul)
}
}
function Add-Types {
$_.Node.Nodes.Clear()
try {
foreach ($t in $_.Node.Tag.GetTypes()) {
if ($t.IsPublic) {
$node = $_.Node.Nodes.Add($t.FullName)
$node.Tag = $t
$node.Nodes.Add($nul)
}
}
}
catch {}
}
function Add-Members {
try {
foreach ($m in $_.Node.Tag.GetMembers()) {
$node = $_.Node.Nodes.Add($m.Name)
$node.Tag = $m.MemberType
}
}
catch {}
}
$tvAssem_BeforeExpand= {
Add-Types
Add-Members
}
function frmMain_Show {
Add-Type -AssemblyName System.Windows.Forms
[Windows.Forms.Application]::EnableVisualStyles()
$ico = [Drawing.Icon]::ExtractAssociatedIcon((
[Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory() + '\\MSBuild.exe'
))
$frmMain = New-Object Windows.Forms.Form
$tvAssem = New-Object Windows.Forms.TreeView
$sbPanel = New-Object Windows.Forms.StatusBar
#
#tvAssem
#
$tvAssem.Dock = "Fill"
$tvAssem.Sorted = $true
$tvAssem.Add_AfterSelect({$sbPanel.Text = $_.Node.Tag})
$tvAssem.Add_BeforeExpand($tvAssem_BeforeExpand)
#
#sbPanel
#
$sbPanel.Font = New-Object Drawing.Font("Microsoft Sans Serif", 9, [Drawing.FontStyle]::Bold)
$sbPanel.SizingGrip = $false
#
#frmMain
#
$frmMain.ClientSize = New-Object Drawing.Size(590, 550)
$frmMain.Controls.AddRange(@($tvAssem, $sbPanel))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.Icon = $ico
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Reflection"
$frmMain.Add_Load({Get-AssembliesTree})
[void]$frmMain.ShowDialog()
}
frmMain_Show
|
combined_dataset/train/non-malicious/Spread-Mailboxes.ps1 | Spread-Mailboxes.ps1 | ###########################################################################
#
# NAME: Spread-Mailboxes.ps1
#
# AUTHOR: Jan Egil Ring
# EMAIL: jer@powershell.no
#
# COMMENT: Script to spread mailboxes alphabetically across mailboxdatabases based on the first character in the user`s displayname.
# For more information, see the following blog-post: http://blog.powershell.no/2010/05/14/script-to-spread-exchange-mailboxes-alphabetically-across-databases
#
# You have a royalty-free right to use, modify, reproduce, and
# distribute this script file in any way you find useful, provided that
# you agree that the creator, owner above has no warranty, obligations,
# or liability for such use.
#
# VERSION HISTORY:
# 1.0 14.05.2010 - Initial release
#
###########################################################################
#Add the Exchange Server 2010 Management Shell snapin
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.E2010 -ErrorAction SilentlyContinue
#Loop through each mailbox
foreach ($mailbox in (Get-Mailbox -ResultSize unlimited)) {
$displayname = $mailbox.Displayname
#Determine which database the mailbox should reside on. Displaynames not matching [A-Z] on first character goes to the last database.
switch -regex ($displayname.substring(0,1))
{
"[A-F]" {$mailboxdatabase = "MDB A-F"}
"[G-L]" {$mailboxdatabase = "MDB G-L"}
"[M-R]" {$mailboxdatabase = "MDB M-R"}
"[S-X]" {$mailboxdatabase = "MDB S-X" }
"[Y-Z]" {$mailboxdatabase = "MDB Y-Z" }
default {$mailboxdatabase = "MDB Y-Z" }
}
#Move mailbox to the correct database if not already correct.
if (($mailbox.database.name) -ne $mailboxdatabase) {New-MoveRequest -Identity $mailbox -TargetDatabase $mailboxdatabase;Write-Host "Moving $displayname to $mailboxdatabase" -ForegroundColor Green}
}
|
combined_dataset/train/non-malicious/834.ps1 | 834.ps1 | class AsrCommon
{
[psobject]$Logger
AsrCommon($logger)
{
$this.Logger = $logger
}
[psobject] GetAndEnsureVaultContext($vaultName)
{
$this.Logger.LogTrace("Ensuring services vault context '$($vaultName)'")
$targetVault = Get-AzureRmRecoveryServicesVault -Name $vaultName
if ($targetVault -eq $null)
{
$this.Logger.LogError("Vault with name '$($vaultName)' unable to find")
}
Set-AzureRmRecoveryServicesAsrVaultContext -Vault $targetVault
return $targetVault
}
[psobject] GetFabricServer($sourceConfigurationServer)
{
$this.Logger.LogTrace("Getting fabric server for configuration server '$($sourceConfigurationServer)'")
$fabricServer = Get-AzureRmRecoveryServicesAsrFabric -FriendlyName $sourceConfigurationServer
return $fabricServer
}
[psobject] GetProtectionContainer($fabricServer)
{
$this.Logger.LogTrace("Getting protection container reference for fabric server '$($fabricServer.Name)-$($fabricServer.FriendlyName)'")
$protectionContainer = Get-AzureRmRecoveryServicesAsrProtectionContainer -Fabric $fabricServer
return $protectionContainer
}
[psobject] GetProtectableItem($protectionContainer, $sourceMachineName)
{
$this.Logger.LogTrace("Getting protectable item reference '$($sourceMachineName)'")
$protectableVM = Get-AzureRmRecoveryServicesAsrProtectableItem `
-ProtectionContainer $protectionContainer `
-FriendlyName $sourceMachineName
return $protectableVM
}
[psobject] GetProtectedItem($protectionContainer, $sourceMachineName)
{
$this.Logger.LogTrace("Getting protected item reference '$($sourceMachineName)'")
$protectedItem = Get-AzureRmRecoveryServicesAsrReplicationProtectedItem `
-ProtectionContainer $protectionContainer `
-FriendlyName $sourceMachineName
return $protectedItem
}
[psobject] GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer) {
$vaultServer = $this.GetAndEnsureVaultContext($vaultName)
$fabricServer = $this.GetFabricServer($sourceConfigurationServer)
$protectionContainer = $this.GetProtectionContainer($fabricServer)
$protectableVM = $this.GetProtectableItem($protectionContainer, $sourceMachineName)
$this.Logger.LogTrace("ProtectableStatus: '$($protectableVM.ProtectionStatus)'")
if ($protectableVM.ReplicationProtectedItemId -ne $null) {
$protectedItem = $this.GetProtectedItem($protectionContainer, $sourceMachineName)
$this.Logger.LogTrace("ProtectionState: '$($protectedItem.ProtectionState)'")
$this.Logger.LogTrace("ProtectionDescription: '$($protectedItem.ProtectionStateDescription)'")
return $protectedItem
} else {
$this.Logger.LogTrace("'$($sourceMachineName)' protectable item is not in a protected state ready for replication")
return $null
}
}
}
Function New-AsrCommonInstance($Logger)
{
return [AsrCommon]::new($Logger)
}
|
combined_dataset/train/non-malicious/1101.ps1 | 1101.ps1 |
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Test-ShouldGetAllMimeTypes
{
$mimeMap = Get-IisMimeMap
Assert-NotNull $mimeMap
Assert-True ($mimeMap.Length -gt 0)
$mimeMap | ForEach-Object {
Assert-True ($_.FileExtension -like '.*') ('invalid file extension ''{0}''' -f $_.FileExtension)
Assert-True ($_.MimeType -like '*/*') 'invalid mime type'
}
}
function Test-ShouldGetWildcardFileExtension
{
$mimeMap = Get-IisMimeMap -FileExtension '.htm*'
Assert-NotNull $mimeMap
Assert-Equal 2 $mimeMap.Length
Assert-Equal '.htm' $mimeMap[0].FileExtension
Assert-Equal 'text/html' $mimeMap[0].MimeType
Assert-Equal '.html' $mimeMap[1].FileExtension
Assert-Equal 'text/html' $mimeMap[1].MimeType
}
function Test-ShouldGetWildcardMimeType
{
$mimeMap = Get-IisMimeMap -MimeType 'text/*'
Assert-NotNull $mimeMap
Assert-True ($mimeMap.Length -gt 1)
$mimeMap | ForEach-Object {
Assert-True ($_.MimeType -like 'text/*')
}
}
|
combined_dataset/train/non-malicious/3900.ps1 | 3900.ps1 |
function Test-GetNonExistingBatchAccount
{
Assert-Throws { Get-AzBatchAccount -Name "accountthatdoesnotexist" }
}
function Test-BatchAccountEndToEnd
{
$accountName = Get-BatchAccountName
$resourceGroup = Get-ResourceGroupName
try
{
$location = Get-BatchAccountProviderLocation
$tagName = "tag1"
$tagValue = "tagValue1"
New-AzResourceGroup -Name $resourceGroup -Location $location
$createdAccount = New-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Location $location -Tag @{$tagName = $tagValue}
Assert-AreEqual $accountName $createdAccount.AccountName
Assert-AreEqual $resourceGroup $createdAccount.ResourceGroupName
Assert-AreEqual $location $createdAccount.Location
Assert-AreEqual 1 $createdAccount.Tags.Count
Assert-AreEqual $tagValue $createdAccount.Tags[$tagName]
Assert-True { $createdAccount.DedicatedCoreQuota -gt 0 }
Assert-True { $createdAccount.LowPriorityCoreQuota -gt 0 }
Assert-True { $createdAccount.PoolQuota -gt 0 }
Assert-True { $createdAccount.ActiveJobAndJobScheduleQuota -gt 0 }
$newTagName = "tag2"
$newTagValue = "tagValue2"
Set-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Tag @{$newTagName = $newTagValue}
$updatedAccount = Get-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup
Assert-AreEqual $accountName $updatedAccount.AccountName
Assert-AreEqual 1 $updatedAccount.Tags.Count
Assert-AreEqual $newTagValue $updatedAccount.Tags[$newTagName]
$accountWithKeys = Get-AzBatchAccountKeys -Name $accountName
Assert-NotNull $accountWithKeys.PrimaryAccountKey
Assert-NotNull $accountWithKeys.SecondaryAccountKey
$accountWithKeys = Get-AzBatchAccountKeys -Name $accountName -ResourceGroupName $resourceGroup
Assert-NotNull $accountWithKeys.PrimaryAccountKey
Assert-NotNull $accountWithKeys.SecondaryAccountKey
$updatedKey = New-AzBatchAccountKey -Name $accountName -ResourceGroupName $resourceGroup -KeyType Primary
Assert-NotNull $updatedKey.PrimaryAccountKey
Assert-AreNotEqual $accountWithKeys.PrimaryAccountKey $updatedKey.PrimaryAccountKey
Assert-AreEqual $accountWithKeys.SecondaryAccountKey $updatedKey.SecondaryAccountKey
}
finally
{
try
{
Remove-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup -Force
$errorMessage = "The specified account does not exist."
Assert-ThrowsContains { Get-AzBatchAccount -Name $accountName -ResourceGroupName $resourceGroup } $errorMessage
}
finally
{
Remove-AzResourceGroup $resourceGroup
}
}
}
function Test-GetBatchSupportedImage
{
$context = New-Object Microsoft.Azure.Commands.Batch.Test.ScenarioTests.ScenarioTestContext
$supportedImages = Get-AzBatchSupportedImage -BatchContext $context
foreach($supportedImage in $supportedImages)
{
Assert-True { $supportedImage.NodeAgentSkuId.StartsWith("batch.node") }
Assert-True { $supportedImage.OSType -in "linux","windows" }
Assert-AreNotEqual $null $supportedImage.VerificationType
}
} |
combined_dataset/train/non-malicious/Dir for days_2.ps1 | Dir for days_2.ps1 | Function Create-DatePaths {
Param (
[Parameter(Position=0,Mandatory=$True)]
[DateTime] $Start,
[Parameter(Position=1,Mandatory=$True)]
[ValidateScript({$_ -gt $Start})]
[DateTime] $End,
$DestinationPath=(Join-Path $env:UserProfile "Test")
)
0..(New-TimeSpan $Start $End).Days | % {
$TargetPath = Join-Path $DestinationPath $(Get-Date $Start -Format "yyyy\\\\MM-MMMM\\\\yyyy-MM-dd")
If (!(Test-Path $TargetPath)) { New-Item $TargetPath -ItemType Directory }
$Start = $Start.AddDays(1)
}
}
|
combined_dataset/train/non-malicious/sample_31_97.ps1 | sample_31_97.ps1 | #
# Module manifest for module 'OCI.PSModules.Aispeech'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aispeech.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '101b9a53-66d0-4458-870f-5f2f3debb208'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aispeech Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aispeech.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAispeechTranscriptionJob',
'Get-OCIAispeechTranscriptionJobsList',
'Get-OCIAispeechTranscriptionTask',
'Get-OCIAispeechTranscriptionTasksList',
'Move-OCIAispeechTranscriptionJobCompartment',
'New-OCIAispeechTranscriptionJob',
'Remove-OCIAispeechTranscriptionJob',
'Stop-OCIAispeechTranscriptionJob',
'Stop-OCIAispeechTranscriptionTask',
'Update-OCIAispeechTranscriptionJob'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aispeech'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/631.ps1 | 631.ps1 | param(
[string]$Version,
[string]$Path,
[switch]$Force,
$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "https://bitbucket.org/splatteredbits/carbon/downloads/Carbon-1.7.0.zip"
Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path (Join-Path $Config.Path "Carbon.zip")
}
$ModulePath = (Join-Path $env:PSModulePath.Split(";")[0] "Carbon")
if(Test-Path $ModulePath){
Remove-Item $ModulePath -Force -Recurse
}
New-Item -Path $ModulePath -ItemType Directory
$_.Downloads | ForEach-Object{
Unzip-File -File $(Join-Path $_.Path $_.Filename) -Destination $ModulePath
}
Move-Item -Path "$ModulePath\Carbon\*" -Destination $ModulePath -ErrorAction SilentlyContinue
$_.Downloads | ForEach-Object{
Remove-Item $(Join-Path $_.Path $_.Filename)
}
if($Update){$_.Result = "AppUpdated";$_
}else{$_.Result = "AppInstalled";$_}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
$ModulePath = (Join-Path $env:PSModulePath.Split(";")[0] "Carbon");if(Test-Path $ModulePath){Remove-Item -Path $ModulePath -Force -Recurse}
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
} |
combined_dataset/train/non-malicious/3416.ps1 | 3416.ps1 |
function Test-AzureProvider
{
$defaultProviders = Get-AzureRmResourceProvider
Assert-True { $defaultProviders.Length -gt 0 }
$allProviders = Get-AzureRmResourceProvider -ListAvailable
Assert-True { $allProviders.Length -gt $defaultProviders.Length }
$ErrorActionPreference = "SilentlyContinue"
$Error.Clear()
$nonProviders = Get-AzureRmResourceProvider -Location "abc"
Assert-True { $Error[0].Contains("Provided location is not supported") }
Assert-True { $nonProviders.Length -eq 0 }
$ErrorActionPreference = "Stop"
$globalProviders = Get-AzureRmResourceProvider -Location "global"
Assert-True { $globalProviders.Length -gt 0 }
Register-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement"
$endTime = [DateTime]::UtcNow.AddMinutes(5)
while ([DateTime]::UtcNow -lt $endTime -and @(Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement")[0].RegistrationState -ne "Registered")
{
[Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(1000)
}
$provider = Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement"
Assert-True { $provider[0].RegistrationState -eq "Registered" }
Unregister-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement"
while ([DateTime]::UtcNow -lt $endTime -and @(Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement")[0].RegistrationState -ne "Unregistered")
{
[Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(1000)
}
$provider = Get-AzureRmResourceProvider -ProviderNamespace "Microsoft.ApiManagement"
Assert-True { $provider[0].RegistrationState -eq "Unregistered" }
}
function Test-AzureProvider-WithZoneMappings
{
$testProvider = Get-AzureRmResourceProvider -ProviderNamespace "Providers.Test"
Assert-True { $testProvider.Count -gt 0 }
$statefulResources = $testProvider | where-object {$_.ResourceTypes.ResourceTypeName -contains "statefulResources"}
Assert-NotNull { $statefulResources }
Assert-NotNull { $statefulResources.ZoneMappings }
Assert-True { $statefulResources.ZoneMappings.Count -eq 2 }
Assert-True { $statefulResources.ZoneMappings["West Europe"] -contains "3"}
}
function Test-AzureProviderOperation
{
$allActions = Get-AzureRmProviderOperation *
Assert-True { $allActions.Length -gt 0 }
$insightsActions = Get-AzureRmProviderOperation Microsoft.Insights/*
$insightsActions
Assert-True { $insightsActions.Length -gt 0 }
Assert-True { $allActions.Length -gt $insightsActions.Length }
$nonInsightsActions = $allActions | Where-Object { $_.Operation.ToLower().StartsWith("microsoft.insights/") -eq $false }
$actualLength = $allActions.Length - $nonInsightsActions.Length;
$expectedLength = $insightsActions.Length;
Assert-True { $actualLength -eq $expectedLength }
foreach ($action in $insightsActions)
{
Assert-True { $action.Operation.ToLower().StartsWith("microsoft.insights/"); }
}
$insightsCaseActions = Get-AzureRmProviderOperation MicROsoFt.InSIghTs/*
Assert-True { $insightsCaseActions.Length -gt 0 }
Assert-True { $insightsCaseActions.Length -eq $insightsActions.Length }
foreach ($action in $insightsCaseActions)
{
Assert-True { $action.Operation.ToLower().Startswith("microsoft.insights/"); }
}
$insightsReadActions = Get-AzureRmProviderOperation Microsoft.Insights/*/read
Assert-True { $insightsReadActions.Length -gt 0 }
Assert-True { $insightsActions.Length -gt $insightsReadActions.Length }
foreach ($action in $insightsReadActions)
{
Assert-True { $action.Operation.ToLower().EndsWith("/read"); }
Assert-True { $action.Operation.ToLower().StartsWith("microsoft.insights/");}
}
$readActions = Get-AzureRmProviderOperation */read
Assert-True { $readActions.Length -gt 0 }
Assert-True { $readActions.Length -lt $allActions.Length }
Assert-True { $readActions.Length -gt $insightsReadActions.Length }
foreach ($action in $readActions)
{
Assert-True { $action.Operation.ToLower().EndsWith("/read"); }
}
$action = Get-AzureRmProviderOperation Microsoft.OperationalInsights/workspaces/usages/read
Assert-AreEqual $action.Operation.ToLower() "Microsoft.OperationalInsights/workspaces/usages/read".ToLower();
$action = Get-AzureRmProviderOperation Microsoft.OperationalInsights/workspaces/usages/read/123
Assert-True { $action.Length -eq 0 }
$exceptionMessage = "Provider NonExistentProvider not found.";
Assert-Throws { Get-AzureRmProviderOperation NonExistentProvider/* } $exceptionMessage
Assert-Throws { Get-AzureRmProviderOperation NonExistentProvider/servers/read } $exceptionMessage
$exceptionMessage = "Individual parts in the search string should either equal * or not contain *.";
Assert-Throws {Get-AzureRmProviderOperation Microsoft.ClassicCompute/virtual*/read } $exceptionMessage
$exceptionMessage = "To get all operations under Microsoft.Sql, please specify the search string as Microsoft.Sql/*.";
Assert-Throws {Get-AzureRmProviderOperation Microsoft.Sql } $exceptionMessage
$exceptionMessage = "Wildcard character ? is not supported.";
Assert-Throws {Get-AzureRmProviderOperation Microsoft.Sql/servers/*/rea? } $exceptionMessage
} |
combined_dataset/train/non-malicious/2527.ps1 | 2527.ps1 |
function New-CodeSigningCertificate {
[CmdletBinding()]
param(
[Security.Cryptography.X509Certificates.X500DistinguishedName]$Subject = "CN=PowerGUI User",
[ValidateSet(1024,2048)]
[int]$KeyLength = 2048,
[DateTime]$ValidFrom = [datetime]::Now,
[DateTime]$ValidTo = [datetime]::Now.AddYears(1)
)
$signature = @"
[DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptAcquireContext(
ref IntPtr phProv,
string pszContainer,
string pszProvider,
uint dwProvType,
Int64 dwFlags
);
[DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptReleaseContext(
IntPtr phProv,
int flags
);
[DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptGenKey(
IntPtr phProv,
int Algid,
int dwFlags,
ref IntPtr phKey
);
[DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptExportPublicKeyInfo(
IntPtr phProv,
int dwKeySpec,
int dwCertEncodingType,
IntPtr pbInfo,
ref int pcbInfo
);
[DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptHashPublicKeyInfo(
IntPtr phProv,
int Algid,
int dwFlags,
int dwCertEncodingType,
IntPtr pInfo,
IntPtr pbComputedHash,
ref int pcbComputedHash
);
[DllImport("Crypt32.dll", SetLastError=true)]
public static extern bool CryptEncodeObject(
int dwCertEncodingType,
[MarshalAs(UnmanagedType.LPStr)]string lpszStructType,
ref CRYPTOAPI_BLOB pvStructInfo,
byte[] pbEncoded,
ref int pcbEncoded
);
[DllImport("Crypt32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern IntPtr CertCreateSelfSignCertificate(
IntPtr phProv,
CRYPTOAPI_BLOB pSubjectIssuerBlob,
int flags,
CRYPT_KEY_PROV_INFO pKeyProvInfo,
IntPtr pSignatureAlgorithm,
SystemTime pStartTime,
SystemTime pEndTime,
CERT_EXTENSIONS pExtensions
);
[DllImport("advapi32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool CryptDestroyKey(
IntPtr cryptKeyHandle
);
[DllImport("kernel32.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern bool FileTimeToSystemTime(
[In] ref long fileTime,
out SystemTime SystemTime
);
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CRYPT_KEY_PROV_INFO {
public string pwszContainerName;
public string pwszProvName;
public int dwProvType;
public int dwFlags;
public int cProvParam;
public IntPtr rgProvParam;
public int dwKeySpec;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CERT_EXTENSIONS {
public int cExtension;
public IntPtr rgExtension;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CERT_EXTENSION {
[MarshalAs(UnmanagedType.LPStr)]public String pszObjId;
public Boolean fCritical;
public CRYPTOAPI_BLOB Value;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CERT_BASIC_CONSTRAINTS2_INFO {
public Boolean fCA;
public Boolean fPathLenConstraint;
public int dwPathLenConstraint;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CRYPTOAPI_BLOB {
public int cbData;
public IntPtr pbData;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CRYPT_BIT_BLOB {
public uint cbData;
public IntPtr pbData;
public uint cUnusedBits;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CERT_PUBLIC_KEY_INFO {
public CRYPT_ALGORITHM_IDENTIFIER Algorithm;
public CRYPT_BIT_BLOB PublicKey;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct CRYPT_ALGORITHM_IDENTIFIER {
[MarshalAs(UnmanagedType.LPStr)]public String pszObjId;
public CRYPTOAPI_BLOB Parameters;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct SystemTime {
public short Year;
public short Month;
public short DayOfWeek;
public short Day;
public short Hour;
public short Minute;
public short Second;
public short Milliseconds;
}
"@
Add-Type -MemberDefinition $signature -Namespace Quest -Name PowerGUI
$pszContainer = [Guid]::NewGuid().ToString()
[IntPtr]$phProv = [IntPtr]::Zero
$Provider = "Microsoft Base Cryptographic Provider v1.0"
$Result = [Quest.PowerGUI]::CryptAcquireContext([ref]$phProv,$pszContainer,$Provider,0x1,0x8)
if (!$Result) {Write-Warning "Unable to create provider context!"; return}
[IntPtr]$phKey = [IntPtr]::Zero
if ($KeyLength -eq 2048) {
$Result = [Quest.PowerGUI]::CryptGenKey($phProv,2,0x08000001,[ref]$phKey)
} else {
$Result = [Quest.PowerGUI]::CryptGenKey($phProv,2,0x04000001,[ref]$phKey)
}
if (!$Result) {Write-Warning "Unable to create key context!"; return}
$dataHandle = [Runtime.InteropServices.GCHandle]::Alloc($Subject.RawData,"pinned")
$ptrName = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB -Property @{
cbData = $Subject.RawData.Count;
pbData = $dataHandle.AddrOfPinnedObject()
}
$PrivateKey = New-Object Quest.PowerGUI+CRYPT_KEY_PROV_INFO -Property @{
pwszContainerName = $pszContainer;
pwszProvName = $Provider;
dwProvType = 1;
dwKeySpec = 2
}
$Extensions = New-Object Security.Cryptography.X509Certificates.X509ExtensionCollection
[void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509BasicConstraintsExtension $false,$false,0,$false))
$OIDs = New-Object Security.Cryptography.OidCollection
[void]$OIDs.Add("code signing")
[void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509EnhancedKeyUsageExtension -ArgumentList $OIDs, $false))
$pcbInfo = 0
if (([Quest.PowerGUI]::CryptExportPublicKeyInfo($phProv,2,1,[IntPtr]::Zero,[ref]$pcbInfo))) {
$pbInfo = [Runtime.InteropServices.Marshal]::AllocHGlobal($pcbInfo)
$Return = [Quest.PowerGUI]::CryptExportPublicKeyInfo($phProv,2,1,$pbInfo,[ref]$pcbInfo)
$pcbComputedHash = 0
if (([Quest.PowerGUI]::CryptHashPublicKeyInfo([IntPtr]::Zero,0x00008004,0,1,$pbInfo,[IntPtr]::Zero,[ref]$pcbComputedHash))) {
$pbComputedHash = [Runtime.InteropServices.Marshal]::AllocHGlobal($pcbComputedHash)
[void][Quest.PowerGUI]::CryptHashPublicKeyInfo([IntPtr]::Zero,0x00008004,0,1,$pbInfo,$pbComputedHash,[ref]$pcbComputedHash)
$pcbEncoded = 0
$uSKI = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB -Property @{
cbData = $pcbComputedHash;
pbData = $pbComputedHash
}
$pcbEncoded = 0
if (([Quest.PowerGUI]::CryptEncodeObject(1,"2.5.29.14",[ref]$uSKI,$null,[ref]$pcbEncoded))) {
$pbEncoded = New-Object byte[] -ArgumentList $pcbEncoded
$Return = [Quest.PowerGUI]::CryptEncodeObject(1,"2.5.29.14",[ref]$uSKI,$pbEncoded,[ref]$pcbEncoded)
$AsnEncodedData = New-Object Security.Cryptography.AsnEncodedData -ArgumentList "2.5.29.14", $pbEncoded
[void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509SubjectKeyIdentifierExtension -ArgumentList $AsnEncodedData, $false))
}
}
}
[void]$Extensions.Add((New-Object Security.Cryptography.X509Certificates.X509KeyUsageExtension -ArgumentList "DigitalSignature", $true))
$uExtensionCollection = @()
foreach ($mExt in $Extensions) {
$uExtension = New-Object Quest.PowerGUI+CERT_EXTENSION
$uExtension.pszObjId = $mExt.Oid.Value
$uExtension.fCritical = $mExt.Critical
$value = New-Object Quest.PowerGUI+CRYPTOAPI_BLOB
$value.cbData = $mExt.RawData.Length
$value.pbData = [Runtime.InteropServices.Marshal]::AllocHGlobal($value.cbData)
[Runtime.InteropServices.Marshal]::Copy($mExt.RawData,0,$Value.pbData,$Value.cbData)
$uExtension.Value = $value
$uExtensionCollection += $uExtension
}
$uExtensions = New-Object Quest.PowerGUI+CERT_EXTENSIONS
$ExtensionSize = [Runtime.InteropServices.Marshal]::SizeOf([Quest.PowerGUI+CERT_EXTENSION]) * $Extensions.Count
$uExtensions.cExtension = $Extensions.Count
$uExtensions.rgExtension = [Runtime.InteropServices.Marshal]::AllocHGlobal($ExtensionSize)
for ($n = 0; $n -lt $Extensions.Count; ++$n) {
$offset = $n * [Runtime.InteropServices.Marshal]::SizeOf([Quest.PowerGUI+CERT_EXTENSION])
$next = $offset + $uExtensions.rgExtension.ToInt64()
[IntPtr]$NextAddress = New-Object IntPtr $next
[Runtime.InteropServices.Marshal]::StructureToPtr($uExtensionCollection[$n],$NextAddress,$false)
}
$pStartTime = New-Object Quest.PowerGUI+SystemTime
[void][Quest.PowerGUI]::FileTimeToSystemTime([ref]$ValidFrom.ToFileTime(),[ref]$pStartTime)
$pEndTime = New-Object Quest.PowerGUI+SystemTime
[void][Quest.PowerGUI]::FileTimeToSystemTime([ref]$ValidTo.ToFileTime(),[ref]$pEndTime)
$pvContext = [Quest.PowerGUI]::CertCreateSelfSignCertificate($phProv,$ptrName,0,$PrivateKey,[IntPtr]::Zero,$pStartTime,$pEndTime,$uExtensions)
if (!$pvContext.Equals([IntPtr]::Zero)) {
New-Object Security.Cryptography.X509Certificates.X509Certificate2 -ArgumentList $pvContext
}
foreach ($uExt in $uExtensionCollection) {
[void][Runtime.InteropServices.Marshal]::FreeHGlobal($uExt.Value.pbData)
}
[void][Runtime.InteropServices.Marshal]::FreeHGlobal($uExtensions.rgExtension)
[void][Runtime.InteropServices.Marshal]::FreeHGlobal($pbInfo)
[void][Runtime.InteropServices.Marshal]::FreeHGlobal($pbComputedHash)
[void]$dataHandle.Free()
[void][Quest.PowerGUI]::CryptDestroyKey($phKey)
[void][Quest.PowerGUI]::CryptReleaseContext($phProv,0)
}
|
combined_dataset/train/non-malicious/sample_58_40.ps1 | sample_58_40.ps1 | param(
[Parameter(Mandatory = $true)][string] $InputPath, # Full path to directory where NuGet packages to be checked are stored
[Parameter(Mandatory = $true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation
[Parameter(Mandatory = $true)][string] $DotnetSymbolVersion, # Version of dotnet symbol to use
[Parameter(Mandatory = $false)][switch] $CheckForWindowsPdbs, # If we should check for the existence of windows pdbs in addition to portable PDBs
[Parameter(Mandatory = $false)][switch] $ContinueOnError, # If we should keep checking symbols after an error
[Parameter(Mandatory = $false)][switch] $Clean, # Clean extracted symbols directory after checking symbols
[Parameter(Mandatory = $false)][string] $SymbolExclusionFile # Exclude the symbols in the file from publishing to symbol server
)
. $PSScriptRoot\..\tools.ps1
# Maximum number of jobs to run in parallel
$MaxParallelJobs = 16
# Max number of retries
$MaxRetry = 5
# Wait time between check for system load
$SecondsBetweenLoadChecks = 10
# Set error codes
Set-Variable -Name "ERROR_BADEXTRACT" -Option Constant -Value -1
Set-Variable -Name "ERROR_FILEDOESNOTEXIST" -Option Constant -Value -2
$WindowsPdbVerificationParam = ""
if ($CheckForWindowsPdbs) {
$WindowsPdbVerificationParam = "--windows-pdbs"
}
$ExclusionSet = New-Object System.Collections.Generic.HashSet[string];
if (!$InputPath -or !(Test-Path $InputPath)){
Write-Host "No symbols to validate."
ExitWithExitCode 0
}
#Check if the path exists
if ($SymbolExclusionFile -and (Test-Path $SymbolExclusionFile)){
[string[]]$Exclusions = Get-Content "$SymbolExclusionFile"
$Exclusions | foreach { if($_ -and $_.Trim()){$ExclusionSet.Add($_)} }
}
else{
Write-Host "Symbol Exclusion file does not exists. No symbols to exclude."
}
$CountMissingSymbols = {
param(
[string] $PackagePath, # Path to a NuGet package
[string] $WindowsPdbVerificationParam # If we should check for the existence of windows pdbs in addition to portable PDBs
)
Add-Type -AssemblyName System.IO.Compression.FileSystem
Write-Host "Validating $PackagePath "
# Ensure input file exist
if (!(Test-Path $PackagePath)) {
Write-PipelineTaskError "Input file does not exist: $PackagePath"
return [pscustomobject]@{
result = $using:ERROR_FILEDOESNOTEXIST
packagePath = $PackagePath
}
}
# Extensions for which we'll look for symbols
$RelevantExtensions = @('.dll', '.exe', '.so', '.dylib')
# How many files are missing symbol information
$MissingSymbols = 0
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath)
$PackageGuid = New-Guid
$ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageGuid
$SymbolsPath = Join-Path -Path $ExtractPath -ChildPath 'Symbols'
try {
[System.IO.Compression.ZipFile]::ExtractToDirectory($PackagePath, $ExtractPath)
}
catch {
Write-Host "Something went wrong extracting $PackagePath"
Write-Host $_
return [pscustomobject]@{
result = $using:ERROR_BADEXTRACT
packagePath = $PackagePath
}
}
Get-ChildItem -Recurse $ExtractPath |
Where-Object { $RelevantExtensions -contains $_.Extension } |
ForEach-Object {
$FileName = $_.FullName
if ($FileName -Match '\\ref\\') {
Write-Host "`t Ignoring reference assembly file " $FileName
return
}
$FirstMatchingSymbolDescriptionOrDefault = {
param(
[string] $FullPath, # Full path to the module that has to be checked
[string] $TargetServerParam, # Parameter to pass to `Symbol Tool` indicating the server to lookup for symbols
[string] $WindowsPdbVerificationParam, # Parameter to pass to potential check for windows-pdbs.
[string] $SymbolsPath
)
$FileName = [System.IO.Path]::GetFileName($FullPath)
$Extension = [System.IO.Path]::GetExtension($FullPath)
# Those below are potential symbol files that the `dotnet symbol` might
# return. Which one will be returned depend on the type of file we are
# checking and which type of file was uploaded.
# The file itself is returned
$SymbolPath = $SymbolsPath + '\' + $FileName
# PDB file for the module
$PdbPath = $SymbolPath.Replace($Extension, '.pdb')
# PDB file for R2R module (created by crossgen)
$NGenPdb = $SymbolPath.Replace($Extension, '.ni.pdb')
# DBG file for a .so library
$SODbg = $SymbolPath.Replace($Extension, '.so.dbg')
# DWARF file for a .dylib
$DylibDwarf = $SymbolPath.Replace($Extension, '.dylib.dwarf')
$dotnetSymbolExe = "$env:USERPROFILE\.dotnet\tools"
$dotnetSymbolExe = Resolve-Path "$dotnetSymbolExe\dotnet-symbol.exe"
$totalRetries = 0
while ($totalRetries -lt $using:MaxRetry) {
# Save the output and get diagnostic output
$output = & $dotnetSymbolExe --symbols --modules $WindowsPdbVerificationParam $TargetServerParam $FullPath -o $SymbolsPath --diagnostics | Out-String
if ((Test-Path $PdbPath) -and (Test-path $SymbolPath)) {
return 'Module and PDB for Module'
}
elseif ((Test-Path $NGenPdb) -and (Test-Path $PdbPath) -and (Test-Path $SymbolPath)) {
return 'Dll, PDB and NGen PDB'
}
elseif ((Test-Path $SODbg) -and (Test-Path $SymbolPath)) {
return 'So and DBG for SO'
}
elseif ((Test-Path $DylibDwarf) -and (Test-Path $SymbolPath)) {
return 'Dylib and Dwarf for Dylib'
}
elseif (Test-Path $SymbolPath) {
return 'Module'
}
else
{
$totalRetries++
}
}
return $null
}
$FileRelativePath = $FileName.Replace("$ExtractPath\", "")
if (($($using:ExclusionSet) -ne $null) -and ($($using:ExclusionSet).Contains($FileRelativePath) -or ($($using:ExclusionSet).Contains($FileRelativePath.Replace("\", "/"))))){
Write-Host "Skipping $FileName from symbol validation"
}
else {
$FileGuid = New-Guid
$ExpandedSymbolsPath = Join-Path -Path $SymbolsPath -ChildPath $FileGuid
$SymbolsOnMSDL = & $FirstMatchingSymbolDescriptionOrDefault `
-FullPath $FileName `
-TargetServerParam '--microsoft-symbol-server' `
-SymbolsPath "$ExpandedSymbolsPath-msdl" `
-WindowsPdbVerificationParam $WindowsPdbVerificationParam
$SymbolsOnSymWeb = & $FirstMatchingSymbolDescriptionOrDefault `
-FullPath $FileName `
-TargetServerParam '--internal-server' `
-SymbolsPath "$ExpandedSymbolsPath-symweb" `
-WindowsPdbVerificationParam $WindowsPdbVerificationParam
Write-Host -NoNewLine "`t Checking file " $FileName "... "
if ($SymbolsOnMSDL -ne $null -and $SymbolsOnSymWeb -ne $null) {
Write-Host "Symbols found on MSDL ($SymbolsOnMSDL) and SymWeb ($SymbolsOnSymWeb)"
}
else {
$MissingSymbols++
if ($SymbolsOnMSDL -eq $null -and $SymbolsOnSymWeb -eq $null) {
Write-Host 'No symbols found on MSDL or SymWeb!'
}
else {
if ($SymbolsOnMSDL -eq $null) {
Write-Host 'No symbols found on MSDL!'
}
else {
Write-Host 'No symbols found on SymWeb!'
}
}
}
}
}
if ($using:Clean) {
Remove-Item $ExtractPath -Recurse -Force
}
Pop-Location
return [pscustomobject]@{
result = $MissingSymbols
packagePath = $PackagePath
}
}
function CheckJobResult(
$result,
$packagePath,
[ref]$DupedSymbols,
[ref]$TotalFailures) {
if ($result -eq $ERROR_BADEXTRACT) {
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath has duplicated symbol files"
$DupedSymbols.Value++
}
elseif ($result -eq $ERROR_FILEDOESNOTEXIST) {
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$packagePath does not exist"
$TotalFailures.Value++
}
elseif ($result -gt '0') {
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Missing symbols for $result modules in the package $packagePath"
$TotalFailures.Value++
}
else {
Write-Host "All symbols verified for package $packagePath"
}
}
function CheckSymbolsAvailable {
if (Test-Path $ExtractPath) {
Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue
}
$TotalPackages = 0
$TotalFailures = 0
$DupedSymbols = 0
Get-ChildItem "$InputPath\*.nupkg" |
ForEach-Object {
$FileName = $_.Name
$FullName = $_.FullName
# These packages from Arcade-Services include some native libraries that
# our current symbol uploader can't handle. Below is a workaround until
# we get issue: https://github.com/dotnet/arcade/issues/2457 sorted.
if ($FileName -Match 'Microsoft\.DotNet\.Darc\.') {
Write-Host "Ignoring Arcade-services file: $FileName"
Write-Host
return
}
elseif ($FileName -Match 'Microsoft\.DotNet\.Maestro\.Tasks\.') {
Write-Host "Ignoring Arcade-services file: $FileName"
Write-Host
return
}
$TotalPackages++
Start-Job -ScriptBlock $CountMissingSymbols -ArgumentList @($FullName,$WindowsPdbVerificationParam) | Out-Null
$NumJobs = @(Get-Job -State 'Running').Count
while ($NumJobs -ge $MaxParallelJobs) {
Write-Host "There are $NumJobs validation jobs running right now. Waiting $SecondsBetweenLoadChecks seconds to check again."
sleep $SecondsBetweenLoadChecks
$NumJobs = @(Get-Job -State 'Running').Count
}
foreach ($Job in @(Get-Job -State 'Completed')) {
$jobResult = Wait-Job -Id $Job.Id | Receive-Job
CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures)
Remove-Job -Id $Job.Id
}
Write-Host
}
foreach ($Job in @(Get-Job)) {
$jobResult = Wait-Job -Id $Job.Id | Receive-Job
CheckJobResult $jobResult.result $jobResult.packagePath ([ref]$DupedSymbols) ([ref]$TotalFailures)
}
if ($TotalFailures -gt 0 -or $DupedSymbols -gt 0) {
if ($TotalFailures -gt 0) {
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "Symbols missing for $TotalFailures/$TotalPackages packages"
}
if ($DupedSymbols -gt 0) {
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message "$DupedSymbols/$TotalPackages packages had duplicated symbol files and could not be extracted"
}
ExitWithExitCode 1
}
else {
Write-Host "All symbols validated!"
}
}
function InstallDotnetSymbol {
$dotnetSymbolPackageName = 'dotnet-symbol'
$dotnetRoot = InitializeDotNetCli -install:$true
$dotnet = "$dotnetRoot\dotnet.exe"
$toolList = & "$dotnet" tool list --global
if (($toolList -like "*$dotnetSymbolPackageName*") -and ($toolList -like "*$dotnetSymbolVersion*")) {
Write-Host "dotnet-symbol version $dotnetSymbolVersion is already installed."
}
else {
Write-Host "Installing dotnet-symbol version $dotnetSymbolVersion..."
Write-Host 'You may need to restart your command window if this is the first dotnet tool you have installed.'
& "$dotnet" tool install $dotnetSymbolPackageName --version $dotnetSymbolVersion --verbosity "minimal" --global
}
}
try {
InstallDotnetSymbol
foreach ($Job in @(Get-Job)) {
Remove-Job -Id $Job.Id
}
CheckSymbolsAvailable
}
catch {
Write-Host $_.ScriptStackTrace
Write-PipelineTelemetryError -Category 'CheckSymbols' -Message $_
ExitWithExitCode 1
}
|
combined_dataset/train/non-malicious/sample_11_53.ps1 | sample_11_53.ps1 | ##----------------------------------------------------------------------------
## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved.
##----------------------------------------------------------------------------
# Import string constants
. ./StringConstants.ps1
# Import shared functions and vars
. ./Commonalities.ps1
Stop-Service -Name $ServiceConstants.serviceName
Remove-Service -ServiceToRemove $ServiceConstants.serviceName
# Get temporary scoped Environment variables from ACS component framework
$dataPath = Get-DataPath
$installationPath = Get-InstallationPath
# Remove files when stopped if its an axis path
Remove-AxisDirectory -AxisFilePath $dataPath
Remove-AxisDirectory -AxisFilePath $installationPath
# SIG # Begin signature block
# MIIoIQYJKoZIhvcNAQcCoIIoEjCCKA4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBpzVb2Ni4mr+so
# HX7QJ3UIWzYSPUcVkmMxSFV/IfT8gaCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx
# MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW
# QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0
# aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH
# zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9
# hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB
# UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t
# 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g
# fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu
# j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP
# cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc
# aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI
# KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E
# BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp
# Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5
# NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH
# fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY
# SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs
# X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G
# Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j
# +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB
# Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl
# EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet
# ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF
# xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM
# aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGekwghnl
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF
# AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCC8
# zpn/ICHg5yqsnPKbuMkmlTNOcU8e8bXR5Jl73q3ZXTANBgkqhkiG9w0BAQEFAASC
# AYAl2sJKrfvadGgAzljkTovOfJWLOPdSB0UdoPUMtGpWXjFP9wX+4a+COI6SB2WV
# NPipxUd/yI71SwJ3q3R4rcC/GUbpqKmwSy45R2vsvNrSkYNL7MYTbwaTKj+6hu7m
# vahxwlAX4Mo+8AqOQdSmtcCfdRM8SYGPcOuEQXeJJNRmXSaB/MYw3XrbchR2XsUd
# rxZPQH95UMMbePUbVjIw++qMRKDdS1LDfcJ7pZ14xSehtolNgvvFWwsZJTMbrNvI
# WB5qb5ieuHksn73rWTiiCZbRvVJmXMsypxaTadR2EV8MTsm5+NBHm2uPaF3n+EMw
# PbYGhTx6xKfzSW9kvvkFSCVmum0fxDDWoylpDBrSO7J/dRX/wKc9mBnAE+h/tly/
# GQBNSKBantVMW8TsiUfrhbpbrkyH6D1LkcFigGhlXMt8HuByYAlM2xlWfBk69iTm
# JHe+qJpmse4TYspHhAveTFRCe0gv35PNzbRTWRt5skuTRPkkNDLmgvK4j1sXkuwv
# L8ehghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG9w0BBwKgghcYMIIX
# FAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEEoGgEZjBkAgEBBglg
# hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgN4QSSsXv021u0ZUzk3DINC7AY59k
# wUo0OeF/62eq0GECEEeZ/t0ljquiXcuI5ojj/j4YDzIwMjQwOTIwMDk1NjM4WqCC
# EwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCSqGSIb3DQEBCwUA
# MGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UE
# AxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBp
# bmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5WjBIMQswCQYDVQQG
# EwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNVBAMTF0RpZ2lDZXJ0
# IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# o1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xiFVjBqZMRp82qsmrd
# ECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PWKyAcwZeUtKVQgfLP
# ywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+cV7EBpo88MUueQ8b
# ZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfXeCk5a+B4WZfjRCtK
# 1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1HbybHLK3X9/w7nZ9
# MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5kGQc3AZEPHLVRzapM
# ZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9NpHnxkTZ0P387RXoyq
# q1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVpdceDZNZ1zY8Sdlal
# JPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64b5bV4RAT/mFHCoz+
# 8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj7ArxES5k4MsiK8rx
# KBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEAAaOCAYswggGHMA4G
# A1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwHATAfBgNVHSMEGDAW
# gBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbvE+fvzdBkodVWqWUx
# o97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMuZGlnaWNlcnQuY29t
# L0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NBLmNy
# bDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp
# Z2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2VydHMuZGlnaWNlcnQu
# Y29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVTdGFtcGluZ0NB
# LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCNT4o8aJzYJf/LLOTN
# 6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3tPUiOuGu6fF29wmE3
# aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZXeY/bJlYrsPOnvTcM
# 2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml101DkRBK+IA2eqUTQ
# +OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdPM43UjXd9dUWhpVgm
# agNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfvTVLzyWAhxFZH7doR
# S4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qoNtS5cpZ+l3k4SF/K
# wtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsHXjlY9HxzMVWggBHL
# FAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaGa7oX/cR3bBVsrquv
# czroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxguyj/OOVSWtasFyIj
# TvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+WssBkbvQR7w8F/g29mt
# kIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3
# DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX
# BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0
# ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ
# BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln
# aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE
# 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML
# JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU
# 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy
# dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk
# dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm
# f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a
# bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY
# SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg
# vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5
# FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9
# Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB
# ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj
# gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG
# AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au
# ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy
# dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0
# hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0
# LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN
# AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp
# +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9
# qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8
# ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z
# JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE
# tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx
# ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7
# 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT
# 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP
# Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm
# fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIFjTCC
# BHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0BAQwFADBlMQswCQYD
# VQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGln
# aWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0Ew
# HhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQswCQYDVQQGEwJVUzEV
# MBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29t
# MSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqGSIb3
# DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3yithZ
# wuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1Ifxp4V
# pX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDVySAd
# YyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiODCu3
# T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQjdjU
# N6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/CNda
# SaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCiEhtm
# mnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADMfRyV
# w4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QYuKZ3
# AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXKchYi
# Cd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t9dmp
# sh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7Nfj
# gtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNt
# yA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAChjdodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3J0MEUG
# A1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2Vy
# dEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRVHSAAMA0GCSqGSIb3
# DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyhhyzshV6pGrsi+Ica
# aVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO0Cre+i1Wz/n096ww
# epqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo8L8vC6bp8jQ87PcD
# x4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++hUD38dglohJ9vytsg
# jTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5xaiNrIv8SuFQtJ37Y
# OtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3ICAQEwdzBjMQswCQYD
# VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD
# ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBAhAF
# RK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoGCSqGSIb3DQEJAzEN
# BgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIwMDk1NjM4WjArBgsq
# hkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZPGZzPQDAvBgkqhkiG
# 9w0BCQQxIgQgZt8I6422OjBF3Oe2n7X+oR0+4i5jijRhBm+me1yoSuUwNwYLKoZI
# hvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK2lWarjMWr00amtQM
# eCgwDQYJKoZIhvcNAQEBBQAEggIAFhZDw4qMwV2oSAC+kS+DXNhnMTiDoeQ+/x8C
# v8f6BQ1HjWk/BAeeCDj/ZCgiC+3z+QgSdm2/Q0mp6M0beLdgplOzLFE3BrcWGHSs
# iEiRkIeTgYZt1048D5Zp7mpGmPJJayi/fTtcuv+mhyJF+3Loug/GZgMGWQdFDTM1
# Zf/Rg8ZdxneqAWbh9P+7KcUi+QWxzQss5wWHeGsOb3r3ayCVlC6iRqE2pXAOyEkb
# D60qnwQ7nOKjikfs6IrLTHFh6KWKpKzD6yvAKEekEiJRRZPpvIsndLZ2sjt//Fy8
# mo73CXdKs3jty6iJgnwRrStxItss+03xX4JApM04Nzv70CSqTW9b4dZQRB42kP4Y
# 8Q0lliGGKzmDBr+neaDWEwYIBOYfP0i3hGaTvlqozLfNgKns7ZRmLXnWHgcdLKWo
# QXiLf9Lvk1H51l95d9HL2pYS1BoDeKeGt67yajOdp1AwJqPbfs6QOxkSRYbhVHuF
# zLGPnLdLwWgjL9npI92hNIQfP6luvfPC9We0XWl0DhnNzTGs5ketXF9/E4Nhj1Qf
# xq+Uezd7JznsCH4k7IUemAnVtT0FBYs8DcbzCZwFlzC5WmBnud/LiV+WD/O8YGI4
# IDepEkd/SMDe8WcbmV1od+L564mKxbqYE7TxK+git8OfmaBcB7GO27xRcCsBl5Y8
# IdIE+bU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_38_4.ps1 | sample_38_4.ps1 | #
# Module manifest for module 'PSGet_AzStackHci.EnvironmentChecker'
#
# Generated by: Microsoft Corporation
#
# Generated on: 19/01/2022
#
@{
# Script module or binary module file associated with this manifest.
RootModule = ''
# Version number of this module.
ModuleVersion = '1.2100.2531.331'
# Supported PSEditions
# CompatiblePSEditions = ''
# ID used to uniquely identify this module
GUID = 'c1719136-a98f-4092-8db7-9f92b15dbef2'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2022 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft AzStackHci Readiness Checker'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @(
'AzStackHci.MOCStack.psm1'
'AzStackHci.MOCStack.Helpers.psm1'
)
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Invoke-AzStackHciMOCStackValidation'
)
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Microsoft','AzStackHci'
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMAzAvDF3++n05
# F66rns5ldpkR9RGSSH2diM9XMjGyAaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOdw2L9UTLr01utVm7G9FdPt
# jBzsgf3BCOa98K6d43biMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAtGC1n/pqXzs1ZmIyWcCON0K+837oAuEU6SUJo5qwR9m1bcUFx+WqcGB4
# eMafouI0xWx+nvNDVHpr0UzLHsVyp4zQEGuIdiFwUNK+M1dX2aF8fd7CIHJ0Iu25
# 3MKRri063MkvENB11xAuIsD3Xc95Jw7MIdXqu/X8vkDcJvUOdyO7ZKBi5n4xnoyC
# HUMsNJPxK/G1huXW73Qi5m7a/XUSLGAnhAhkkAWmvpHgqGBw3CijYpRSktrbeBjk
# AX1pGLTCfxo3GpPlyf4/mJ8kQTuKknHiMA/ohJNFJ+BoEG8BC1d7xib0+iV4LvxL
# vYM8nihDT1R96u8ukyVSatZh5Pvuh6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAWk08o+81p3QsKlruIqK3qEW4hikh/h88Me1YlqmJlZAIGZbwSmWnK
# GBMyMDI0MDIxMjE0MDYzMi41NDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy
# MloYDzIwMjQwMjEzMDk1MTIyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGia
# AgEAMAoCAQACAhA5AgH/MAcCAQACAhP8MAoCBQDpdboaAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBADQeYBN/t7KLX5/X88WTUfxjS80bxBfilJfF3AIjcI/2
# UQJXIfqFIvEqMd1jHT32G0+4Uuuo+b8jW+39m8VA6VJBIQrSlg9x3sH+Kt931BSw
# 8yGtj1H6enwRjiR4ebfz+b62vA8RlyHp1PPyrI3x1QYIsocJLxC6Yly83/4mXMJI
# MIjLouTLlSj6puEmDZD94kB6S91uzyJwjtLWGvHiiaX2FTVVYMguGaWbcfJ3d0O4
# uF0aXbJ+kNqY3bVpGzoIFtcnoKcPaBBAw7HmuVi1b4qIxYYSKvGPDKIA9WKQxRL/
# wQJQqTcjWrf9oDFPbLLcu972Lw5g+ML43RqPjdhCjz0xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB
# 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBF/KI3tkz2SwNyY0L112JSu5rip5xCjRiml/hb/Rs6
# RzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+
# RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgiLrL13zZQgm581jPxPYeOTTO
# j+MDbj3O5P8XwVvjtHMwDQYJKoZIhvcNAQELBQAEggIAZBYPFriLrHhz93qrghA3
# pl8gL5c8gsOUvWnVxtTEvhg9i0wBVaFZN1UrHcnfbGM6wRTLV0Q89eycbHvhSODx
# 0VdUqee4dxfNlMC3Umb6Y+IlcX8/uIt/zujO4O+nmZJSXmqKpeIAbfNDcEJasLlz
# gnlFd4y9RkGdlwUkwVZD/Z5RLuH9K13rWhcWoO8K5NoKZLvE4whj7zJudT4d5BaP
# jpXiokCFWSIYdLfV6ExCc+ZSUbwThkUIdeviuZVbtwwRAz35EpTuE1zxU92a4wut
# uhJmpOFUlsA+QPS5Lk6CPIe+gkvcICighLmEBt+O3qGauhEfA6xWVw2yhI5kPPQg
# Bv7tjZ0k4cq11RAVUYy/gACmtbTyIZJyvWLqxW/bgE/+cffP6G6IyjiTd5UhXK7n
# V+7ArgVulIh7Hj80i3tEwhO45DiT853Ue0Ybu3XxMGclSYFGZk1pVBnJf3WKim2q
# 3AxuAeu3rpbhRWD8Ge9cQ2VRuoeNn1VYXHCDsOYh3srVRWGX1b0liKH8rMe2G2og
# JtfHWtY8v5CRSO2OJZ4snmBTETww/1b6huvOjdcCyNH5uzWL/Hguq3Wg80NzmTPO
# brXN38YAHY51tVM3rHnvTuC2SH4CReJDAooMUgwkqya0E0ttu2UyEYFawd+PjiZk
# QQTLpCMWQa2SiHizGHgCSyc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_52_85.ps1 | sample_52_85.ps1 | #
# Module manifest for module 'Az.MachineLearning'
#
# Generated by: Microsoft Corporation
#
# Generated on: 5/16/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.MachineLearning.psm1'
# Version number of this module.
ModuleVersion = '1.1.4'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '287cb4af-0379-4154-86bf-63c34f734bd3'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - Machine Learning Web Services cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core.
For more information on Machine Learning, please visit the following: https://learn.microsoft.com/azure/machine-learning/'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Microsoft.Azure.Management.MachineLearning.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-AzMlWebServiceRegionalProperty', 'Export-AzMlWebService',
'Get-AzMlCommitmentAssociation', 'Get-AzMlCommitmentPlan',
'Get-AzMlCommitmentPlanUsageHistory', 'Get-AzMlWebService',
'Get-AzMlWebServiceKey', 'Import-AzMlWebService',
'Move-AzMlCommitmentAssociation', 'New-AzMlCommitmentPlan',
'New-AzMlWebService', 'Remove-AzMlCommitmentPlan',
'Remove-AzMlWebService', 'Update-AzMlCommitmentPlan',
'Update-AzMlWebService'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'Get-AzMlWebServiceKeys'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','MachineLearning','MachineLearningCompute'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Removed the outdated deps.json file.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD5JXOLYoqhP7tm
# d+stQ4rkqyYXRvMvmiWGNOHne7lrmqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIzptOOcHH7QKjn0tytzZmTd
# +xz7vjxvWPM1GBrQguloMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADQaOGYHSVfHTFbDRObuanqwlPO5HSisukkuSF1NH57k2aeWhRtQ++KEi
# vTOGNzUw0wXZLHFBw4nRmJcGiWk+BYuPJG6yRrQJVlDfBDvwAW8sCEf7wxDpKaN1
# xtAXU5j/hMkbDswRgk59ZB7FgpT2yrL0qdo9LAivmW9NYWY/8M7+U1WrDwDk8seX
# ZsNi7HxXFQ1Q92T7TL5Nb9G9xx9oo7CTpOHnxHpVyYN0ZAgpckHuKxcrhngTjdDW
# dncVzzeDXj3WkG/hQscGc8W/5rJdfIAZy6Dyj4jaHx4ZLF2rzc0BlaGiHZxcBOz6
# aD/HxaGb4vcAUELiOi0gc0pAXRPA36GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDaIGIijlP1g7uvmi8zMkObonZZMharkzRD1MX0LA3MuAIGZjOTMUia
# GBMyMDI0MDUxNjA3MjMzNC4zNjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/dJTAiGA8yMDI0MDUxNjAxMTcy
# NVoYDzIwMjQwNTE3MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp790l
# AgEAMAoCAQACAiY8AgH/MAcCAQACAhN/MAoCBQDp8S6lAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEhVGnVlLQhp31Br8gQI4FrzQ3vgx9Hz7GvwwXnR7GaG
# Ut443VjhqROBrxMxQAcaG7FEj9Ec75+06i7qsIn29zx09CxxDDhDGN2gDPFciLsE
# BiuURZx2G5F9uUGFDLtMdH7wD0O9iNBOy4u6pEX8Ip1IkkkmbgAGeDW66AJ2vhiv
# tKEdEy5eaL8estsNjCQ3L6A3hKgxoH2kApXhBX/zLQPT6H3lzouSfxjm3v3SXXHf
# iXrIxLwskfDd6kHcAiEHUrdKpYIpKCrcG9rtprvYW65JqkZaE/mtxtCTO1jsw2op
# 4gX0JsxTp0cnXjpgIHfNXUkclqhWpMH25ciLVUZGQFcxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB
# 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBKCoSjHVpOcSY8scJ520c9rFFw4nX3KtXDrY1dJu4n
# XjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh
# 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgIbP0ZWY+r31SEk/v7RUAyrZJ
# M1k6l1N9wsbSPOKyaUMwDQYJKoZIhvcNAQELBQAEggIAop1MIrCVzSIOnAyhikSR
# 5oXYnefsLuqXRLePBNSfrxSSI891jpuWmZjdd1kuqrrAc/pvq9vJEexGrkN/RkAA
# ciD2vMjE7Zbp4HaUvWimW7wQj2fJTF8o0iA5RVv+2Eufv4TPHd1iLr7o6dmviJw6
# KuYA4PBY39N0eHP20lNJgasaWndZztK8T0ThVzEjbD8v12UIS+vW+HABcSkGjuBL
# OVJj6JJCElV7M7goOQe7z9wT7wey+XKbpzu/0OimYFkdRMMHZq9zrYBhNEhlU8iz
# ugZAvFzTPezWPgqLMo71CxQaLfRc1aEt7rrBJ7S7FEv5GdgHFfFhGAWyeAHXtsYs
# EYrrE6TMAKjBEN4MKENVs0K0GK3aYGOHqTq0flo9lZ1aYNTUf6TZgJv3vVGI15K2
# lZbJPTQ99rok3Gyg/qtLMvZMFYQL/Dk3k9wjtzvrdeKXEWxbYZpIjHSwKaA1cTzC
# ETl9SCZodY87Act4okD1OU0y0QFTtL1bConhbHp6lBMZrIyizb8VVzhMrukcTD7P
# OTRZP7iiMN9CYcPr9JCwoyCfRAqkue716o/QHqVd0AhEXF2XWrrzIyrMAecnnwNt
# s9geN8IThXCUisok62P4Z4MzjFYInZmtU1pJn7Hlnw4vwbEDGFb8BRkBjKme2IO2
# FuY1e15Y3hzCtA1gvPIL1Jk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/225.ps1 | 225.ps1 | function Get-ScriptAlias
{
[CmdletBinding()]
PARAM
(
[Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateScript({ Test-Path -Path $_ })]
[Alias("FullName")]
[System.String[]]$Path
)
PROCESS
{
FOREACH ($File in $Path)
{
TRY
{
$ScriptContent = (Get-Content $File -Delimiter $([char]0))
$AbstractSyntaxTree = [System.Management.Automation.Language.Parser]::
ParseInput($ScriptContent, [ref]$null, [ref]$null)
$AbstractSyntaxTree.FindAll({ $args[0] -is [System.Management.Automation.Language.CommandAst] }, $true) |
ForEach-Object -Process {
$Command = $_.CommandElements[0]
if ($Alias = Get-Alias | Where-Object { $_.Name -eq $Command })
{
[PSCustomObject]@{
File = $File
Alias = $Alias.Name
Definition = $Alias.Definition
StartLineNumber = $Command.Extent.StartLineNumber
EndLineNumber = $Command.Extent.EndLineNumber
StartColumnNumber = $Command.Extent.StartColumnNumber
EndColumnNumber = $Command.Extent.EndColumnNumber
StartOffset = $Command.Extent.StartOffset
EndOffset = $Command.Extent.EndOffset
}
}
}
}
CATCH
{
Write-Error -Message $($Error[0].Exception.Message)
}
}
}
} |
combined_dataset/train/non-malicious/Get-LocalGroups_1.ps1 | Get-LocalGroups_1.ps1 | function Add-NoteProperty {
<#
.Synopsis
Adds a NoteProperty member to an object.
.Description
This function makes adding a property a lot easier than Add-Member, assuming
you want to add a NoteProperty, which I find is true about 90% of the time.
.Parameter object
The object to add the property to.
.Parameter name
The name of the new property.
.Parameter value
The object to add as the property.
.Example
# Create a new custom object and add some properties.
PS> $custom_obj = New-Object PSObject
PS> Add-NoteProperty $custom_obj Name 'Custom'
PS> Add-NoteProperty $custom_obj Value 42
.Example
# Add a NoteProperty by passing the object to be modified down the pipeline.
PS> $bunch_of_objects | Add-NoteProperty -name 'meaning_of_life' -value 42
.Notes
NAME: Add-NoteProperty
AUTHOR: Tim Johnson <tojo2000@tojo200.com>
FILE: LocalGroups.psm1
#>
param([Parameter(Mandatory = $true,
ValueFromPipeline = $true,
Position = 0)]
$object,
[Parameter(Mandatory = $true,
Position = 1)]
[string]$name,
[Parameter(Mandatory = $true,
Position = 2)]
$value)
BEGIN{}
PROCESS{
$object | Add-Member -MemberType NoteProperty `
-Name $name `
-Value $value
}
END{}
}
function Get-COMProperty{
<#
.Synopsis
Gets a property of a __ComObject object.
.Description
This function calls the InvokeMember static method of the class to get
properties that aren't directly exposed to PowerShell, such as local group
members found by calling Members() on a DirectoryServices group object.
.Parameter com_object
The object to retrieve the property from.
.Parameter property_name
The name of the property.
.Example
# Get the names of all members of a group.
PS> [adsi]$computer = 'WinNT://servername'
PS> $groups = $groups = $computer.psbase.children |
>> ?{$_.psbase.schemaclassname -eq 'group'}
PS> $groups[0].Members() | %{Get-COMProperty $_ 'Name'}
.Notes
NAME: Get-COMProperty
AUTHOR: Tim Johnson <tojo2000@tojo200.com>
FILE: LocalGroups.psm1
#>
param([Parameter(Mandatory = $true,
Position = 0)]
$com_object,
[Parameter(Mandatory = $true,
Position = 1)]
[string]$property_name)
[string]$property = $com_object.GetType().InvokeMember($property_name,
'GetProperty',
$null,
$com_object,
$null)
Write-Output $property
}
function Get-LocalGroups{
<#
.Synopsis
Gets a list of objects with information about local groups and their members.
.Description
This function returns a list of custom PSObjects that are a list of local
groups on a computer. Each object has a property called Members that is a
list of PSObjects representing each member, with Name, Domain, and ADSPath.
.Parameter computername
The object to retrieve the property from.
.Example
# Get a list of groups from a server.
PS> Get-LocalGroups servername
.Notes
NAME: Get-LocalGroups
AUTHOR: Tim Johnson <tojo2000@tojo200.com>
FILE: LocalGroups.psm1
#>
param([Parameter(Mandatory = $true,
ValueFromPipeline = $true)]
[string]$computername = $env:computername)
BEGIN{}
PROCESS{
$output = @()
[adsi]$computer = "WinNT://$computername"
$groups = $computer.psbase.children |
?{$_.psbase.schemaclassname -eq 'group'}
foreach ($group in $groups) {
$members = @()
$grp_obj = New-Object PSObject
Add-NoteProperty $grp_obj 'Name' $group.Name.ToString()
Add-NoteProperty $grp_obj 'aDSPath' $group.aDSPath.ToString()
foreach ($user in $group.Members()){
$usr_obj = New-Object PSObject
Add-NoteProperty $usr_obj 'aDSPath' (Get-COMProperty $user 'aDSPath')
Add-NoteProperty $usr_obj 'Name' (Get-COMProperty $user 'Name')
$path = $usr_obj.aDSPath.split('/')
if ($path.Count -eq 4){
Add-NoteProperty $usr_obj 'Domain' $path[2]
}elseif ($path.Count -eq 5) {
Add-NoteProperty $usr_obj 'Domain' $path[3]
}else{
Add-NoteProperty $usr_obj 'Domain' 'Unknown'
}
$members += $usr_obj
}
$members = @($members | Sort-Object -Property Domain, Name)
Add-NoteProperty $grp_obj 'Members' $members
Write-Output $grp_obj
}
}
END{}
}
|
combined_dataset/train/non-malicious/Harley.ps1 | Harley.ps1 | ###
# Description: Add Voice to Powershell
# Version: 1.1 (11 Nov 2008)
# Mike Hays / www.mike-hays.net / blog.mike-hays.net
# Virtualization, Powershell, and more...
###
# This is the actual speaking part. I cheat by adding spaces
# (This makes the word sound right).
$spokenText = "Super ca li fragilistic expi alidocious"
# Create an object that represents the COM SAPI.SpVoice
$voice = New-Object -com SAPI.SpVoice
# Get the list of available voices
$voiceList = $voice.GetVoices()
# This script prefers using LH Michelle as a stand-in for Mary Poppins,
# but I can't be sure that she exists on all computers, so I check for that.
# She comes with some installations of Microsoft Word 2003.
$voiceDescList = @()
for ($i=0; $i -lt $voiceList.Count; $i++)
{
$voiceDescList += $voiceList.Item($i).GetDescription()
}
if ($voiceDescList -contains "LH Michelle")
{
$voiceMember = "Name=LH Michelle"
}
else
{
# This is the default voice if LH Michelle doesn't exist.
# This will probably be Microsoft Sam
$voiceMember = "Name=" + $voiceDescList[0]
}
$voiceToUse = $voice.GetVoices($voiceMember)
# This sets the voice property on the COM object
$voice.Voice = $voiceToUse.Item(0)
# This actually does the speaking.
[void] $voice.Speak($spokenText)
# She's no Julie Andrews, but she'll say what you want.
# END
|
combined_dataset/train/non-malicious/783e4a84-4d47-4c57-a257-2298ce2b32ff.ps1 | 783e4a84-4d47-4c57-a257-2298ce2b32ff.ps1 | Function Get-DiskUsage {
<#
.SYNOPSIS
A tribute to the excellent Unix command DU.
.DESCRIPTION
This command will output the full path and the size of any object
and it's subobjects. Using just the Get-DiskUsage command without
any parameters will result in an output of the directory you are
currently placed in and it's subfolders.
.PARAMETER Path
If desired a path can be specified with the Path parameter. In no path
is specified $PWD will be used.
.PARAMETER h
the -h paramater is the same as -h in Unix. It will list the folders
and subfolders in the most appropriate unit depending on the size
(i.e. Human Readable).
.PARAMETER l
The -l paramater will add the largest file to the end of the output.
.PARAMETER Sort
Allows you to sort by Folder or Size. If none i specified the default
of Folder will be used.
.PARAMETER Depth
Depth will allow you to specify a maximum recursion depth. A depth
of 1 would return the immediate subfolders under the root.
.PARAMETER Force
Works the same way as Get-ChildItem -force.
.PARAMETER Descending
Works the same way as Sort-Object -descending.
.LINK
http://www.donthaveasite.nu
.NOTES
Author: Jonas Hallqvist
Developed with Powershell v3
#>
[CmdletBinding(
SupportsShouldProcess=$True
)]
param (
[String]$Path=$PWD,
[Switch]$h,
[Switch]$l,
[String]$Sort="Folder",
[Int]$Depth,
[Switch]$Force,
[Switch]$Descending
)
$ErrorActionPreference = "silentlycontinue"
function HumanReadable {
param ($size)
switch ($size) {
{$_ -ge 1PB}{"{0:#'P'}" -f ($size / 1PB); break}
{$_ -ge 1TB}{"{0:#'T'}" -f ($size / 1TB); break}
{$_ -ge 1GB}{"{0:#'G'}" -f ($size / 1GB); break}
{$_ -ge 1MB}{"{0:#'M'}" -f ($size / 1MB); break}
{$_ -ge 1KB}{"{0:#'K'}" -f ($size / 1KB); break}
#{$_ -eq $null}{"0B"}
default {"{0}" -f ($size) + "B"}
}
}
function LargestFolder {
if ($h) {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
else {
$large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize -HideTableHeaders
Write-host "Largest Folder is:" -NoNewline
$large
}
}
function Max-Depth {
param(
[String]$Path = '.',
[String]$Filter = '*',
[Int]$Level = 0,
[Switch]$Force,
[Switch]$Descending,
[int]$i=0
)
$results=@()
$root = (Resolve-Path $Path).Path
if ($root -notmatch '\\\\$') {$root += '\\'}
if (Test-Path $root -PathType Container) {
do {
[String[]]$_path += $root + "$Filter"
$Filter = '*\\' + $Filter
$i++
}
until ($i -eq $Level)
$dirs=Get-ChildItem -directory $_path -Force:$Force
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.Fullname -recurse | Measure-Object -Property Length -Sum).Sum
$results += New-Object psobject -Property @{Folder=$dir.fullname;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
if ($Depth) {
Max-Depth -Path $Path -Level $Depth -Force:$Force -Descending:$Descending
}
else {
$results = @()
$dirs=Get-ChildItem -directory $Path -Force:$Force -Recurse
foreach ($dir in $dirs) {
$size = 0
$size += (gci $dir.FullName -Recurse | Measure-Object -Property Length -Sum).Sum
$results+= New-Object psobject -Property @{Folder=$dir.FullName;Size=$size}
}
if ($h) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize
}
if ($l) {
LargestFolder
}
if (($h -eq $false) -and ($l -eq $false)) {
$results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize
}
}
}
|
combined_dataset/train/non-malicious/List DHCP Clients .ps1 | List DHCP Clients .ps1 | $DHCP_EnumSubnetClients = @'
[DllImport("dhcpsapi.dll", SetLastError = true, CharSet = CharSet.Auto)]
public static extern uint DhcpEnumSubnetClients(
string ServerIpAddress,
uint SubnetAddress,
ref uint ResumeHandle,
uint PreferredMaximum,
out IntPtr ClientInfo,
ref uint ElementsRead,
ref uint ElementsTotal);
'@
$DHCP_Structs = @'
namespace mystruct {
using System;
using System.Runtime.InteropServices;
public struct CUSTOM_CLIENT_INFO
{
public string ClientName;
public string IpAddress;
public string MacAddress;
}
[StructLayout(LayoutKind.Sequential)]
public struct DHCP_CLIENT_INFO_ARRAY
{
public uint NumElements;
public IntPtr Clients;
}
[StructLayout(LayoutKind.Sequential)]
public struct DHCP_CLIENT_UID
{
public uint DataLength;
public IntPtr Data;
}
[StructLayout(LayoutKind.Sequential)]
public struct DATE_TIME
{
public uint dwLowDateTime;
public uint dwHighDateTime;
public DateTime Convert()
{
if (dwHighDateTime== 0 && dwLowDateTime == 0)
{
return DateTime.MinValue;
}
if (dwHighDateTime == int.MaxValue && dwLowDateTime == UInt32.MaxValue)
{
return DateTime.MaxValue;
}
return DateTime.FromFileTime((((long) dwHighDateTime) << 32) | (UInt32) dwLowDateTime);
}
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct DHCP_HOST_INFO
{
public uint IpAddress;
public string NetBiosName;
public string HostName;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Auto)]
public struct DHCP_CLIENT_INFO
{
public uint ClientIpAddress;
public uint SubnetMask;
public DHCP_CLIENT_UID ClientHardwareAddress;
[MarshalAs(UnmanagedType.LPWStr)]
public string ClientName;
[MarshalAs(UnmanagedType.LPWStr)]
public string ClientComment;
public DATE_TIME ClientLeaseExpires;
public DHCP_HOST_INFO OwnerHost;
}
}
'@
$resumeHandle = 0
$clientInfo = 0
$ElementsRead = 0
$ElementsTotal = 0
Add-Type $DHCP_Structs
Add-Type -MemberDefinition $DHCP_EnumSubnetClients -Name GetDHCPInfo -Namespace Win32DHCP
$DHCPServerIP = "192.168.1.100" # change this to match your DHCP server IP
[void][Win32DHCP.GetDHCPInfo]::DhcpEnumSubnetClients($DHCPServerIP,0,[ref]$resumeHandle,0,[ref]$clientInfo,[ref]$ElementsRead,[ref]$ElementsTotal)
$clients = [system.runtime.interopservices.marshal]::PtrToStructure($clientInfo,[mystruct.DHCP_CLIENT_INFO_ARRAY])
[int]$size = $clients.NumElements
[int]$current = $clients.Clients
$ptr_array = new-object system.intptr[]($size)
$current = new-object system.intptr($current)
for ($i=0;$i -lt $size;$i++)
{
$ptr_array[$i] = [system.runtime.interopservices.marshal]::ReadIntPtr($current)
$current = $current + [system.runtime.interopservices.marshal]::SizeOf([system.IntPtr])
}
function uIntToIP {
param ($intIP)
$objIP = new-object system.net.ipaddress($intIP)
$arrIP = $objIP.IPAddressToString.split(".")
return $arrIP[3] + "." + $arrIP[2] + "." + $arrIP[1] + "." + $arrIP[0]
}
[array]$clients_array = new-object mystruct.CUSTOM_CLIENT_INFO
for ($i=0;$i -lt $size;$i++)
{
$objDHCPInfo = New-Object psobject
$current_element = [system.runtime.interopservices.marshal]::PtrToStructure($ptr_array[$i],[mystruct.DHCP_CLIENT_INFO])
add-member -inputobject $objDHCPInfo -memberType noteproperty -name ClientIP -value $(uIntToIP $current_element.ClientIpAddress)
add-member -inputobject $objDHCPInfo -memberType noteproperty -name ClientName -value $current_element.ClientName
add-member -inputobject $objDHCPInfo -memberType noteproperty -name OwnerIP -value $(uIntToIP $current_element.Ownerhost.IpAddress)
add-member -inputobject $objDHCPInfo -memberType noteproperty -name OwnerName -value $current_element.Ownerhost.NetBiosName
add-member -inputobject $objDHCPInfo -memberType noteproperty -name SubnetMask -value $(uIntToIP $current_element.SubnetMask)
add-member -inputobject $objDHCPInfo -memberType noteproperty -name LeaseExpires -value $current_element.ClientLeaseExpires.Convert()
$mac = [System.String]::Format(
"{0:x2}-{1:x2}-{2:x2}-{3:x2}-{4:x2}-{5:x2}",
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data),
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 1),
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 2),
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 3),
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 4),
[system.runtime.interopservices.marshal]::ReadByte($current_element.ClientHardwareAddress.Data, 5)
)
add-member -inputobject $objDHCPInfo -memberType noteproperty -name MacAddress -value $mac
$objDHCPInfo
}
|
combined_dataset/train/non-malicious/198.ps1 | 198.ps1 | function Get-SCSMWorkItemCreatedByUser
{
[CmdletBinding(DefaultParameterSetName = 'GUID')]
param
(
[Parameter(ParameterSetName = 'SMObject',
Mandatory = $true,
ValueFromPipeline = $true)]
$SMObject,
[Parameter(ParameterSetName = 'GUID',
Mandatory = $true)]
$Guid
)
BEGIN
{
Import-Module -Name SMLets -ErrorAction Stop
$RelationshipClass_CreatedByUser_Object = Get-SCSMRelationshipClass -Name System.WorkItemCreatedByUser
}
PROCESS
{
IF ($PSBoundParameters['GUID'])
{
foreach ($Item in $GUID)
{
$SMObject = Get-SCSMObject -id $item
Write-Verbose -Message "[PROCESS] Working on $($Item.Name)"
Get-ScsmRelatedObject -SMObject $SMObject -Relationship $RelationshipClass_CreatedByUser_Object |
Select-Object -Property @{ Label = "WorkItemName"; Expression = { $SMObject.Name } },
@{ Label = "WorkItemGUID"; Expression = { $SMObject.get_id() } }, *
}
}
IF ($PSBoundParameters['SMobject'])
{
foreach ($Item in $SMObject)
{
Write-Verbose -Message "[PROCESS] Working on $($Item.Name)"
Get-ScsmRelatedObject -SMObject $Item -Relationship $RelationshipClass_CreatedByUser_Object |
Select-Object -Property @{ Label = "WorkItemName"; Expression = { $Item.Name } },
@{ Label = "WorkItemGUID"; Expression = { $Item.get_id() } }, *
}
}
}
} |
combined_dataset/train/non-malicious/sample_7_8.ps1 | sample_7_8.ps1 | $debug = $false
$vmmskey = "HKLM:\SYSTEM\CurrentControlSet\Services\vmms"
if (Test-Path $vmmskey) {
Import-LocalizedData -BindingVariable HyperVNetStrings
#Hyper-V Networking info
Write-DiagProgress -Activity $HyperVNetStrings.ID_HyperVNet -Status $HyperVNetStrings.ID_HyperVNetObtaining
$OutputFile = $Computername + "_Hyper-V-NetworkingInfo.txt"
# detect OS version and SKU
$wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem
[int]$bn = [int]$wmiOSVersion.BuildNumber
if ($bn -lt 9200)
{
$CommandToExecute = "cmd.exe /c cscript.exe //nologo nvspinfo.js /z > $OutputFile"
}
else
{
$CommandToExecute = "cmd.exe /c cscript.exe //nologo nvspinfov2.js /z > $OutputFile"
}
$FileDescription = "Hyper-V Networking Info"
$sectionDescription = "Hyper-V Networking Advanced Information"
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $FileDescription -BackgroundExecution
}
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAVaggZEGB9DOMx
# qMi3kayglRSgD47UZmZpfBSHFLRM66CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGPYqJ8ET80BcOSgWOKbAoQ3
# kaGaiSQZSrixw1CL7wiVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkrhmOgsIaPoCS1f53m2yqPH/PlYcerUsE0PtSb5MP75GWgBVydLT+B3b
# +s8QHgkaIN6q+GT/JSVE/Z4vZ4R0wi2wSHAwYL9+5hLOV5mlnWQNh6aedZRpAIo6
# RxrN5v0TrcUahTIFPR3sVSVvMyDeSveK+v2sV3UvoDIv3Nnakbas8WEPHu9BSExT
# u3K9DY2evs8o3ZHg2JYvDdqMP24ZJGmwirotxXCmswoj0r2heNadtgkbbcLf6803
# zuIYVxZaHjYREVXovrRefjbG1F4RfjYriMSOmB9YyfoliYf5Efw+cB//LEUTW8J1
# E6Ee/RWxk5UNjus4gj15u3HgnwHpAqGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAB0KT9NcegBWZTrDYW9YLHAVhxHr6oRyUwEFQpUpZZpQIGZutC6/UA
# GBMyMDI0MTAyODExNDA0NC42MzdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe
# gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN
# 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F
# mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi
# YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h
# 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss
# jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h
# KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp
# LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly
# 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K
# iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX
# nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2
# g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0
# dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv
# sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G
# cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk
# 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB
# RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX
# GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV
# OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ
# RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI
# lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r
# AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F
# uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0MTAyOTA5MDQwOFowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEAAgIIsAIB/zAHAgEAAgIS
# xjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzScy1wBbp
# cAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG0qSOBjk7VgyCvjFMirT1
# 1HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpeE+oE9viQRHMLsU/3b8hu
# zWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSjn3XQ0nllmNeGCeUkdIsN
# TpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/aN3CjM0gf25XwDETanz7K
# LbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9FVUpwZNtKUwYSNiOSsA9
# S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgxevPxssS
# HmJOr3Qiw55BmDSUFNm13eQhBT2/Y/E14k4wgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA
# AAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH65KUaSnvoMA0GCSqGSIb3
# DQEBCwUABIICADRUg9fEQTdm0r9Vhi+nAH46yXhaUo4gj72VEczUNJ26sDjplel3
# pXH+j5p2Fbc9bABojmO1IWIEu4L/5PXQU+Vj7SVqWT4143XRVi9n0c8ymD5dpQDh
# zIsP79EOdtY423FbhPKLhXXEoL+yRujLQHZk8JcxJllDk4Wzydfm2TnTfiDs5vCO
# GkSCS5r0CDaXgZLtQhRmFJuIHcjn62NwL0SavC726t1UTQ0k4avfue+j2jYyPHBK
# HH4UYyzy3lxulo8hTUnoC6XZKgsngevtMLCn5k9yN7vzdUoj0eWSkT6AN9qABG6h
# CwnuRFNXkG2FGVhVL5LQOLDuNEMNjhVlcAuTGc6jAp1cx/RDnHz1TKANBOiy5LbB
# EQpGO13jil9Dtw1AJCTlx52FLLZ1LVAqP0meiTrT7GX/1N2m70Tjp4pVmYnB8k5J
# lGDgIlaR/TGVVHT3qUvTXa7nrAsmgbD8yVDfm5GHxwHW+QoOAfBRjk3IBrNET1iG
# iL37CxSC940gLki6zGNxkt5G2cK8lUnoEE/pOv4Ikumcr7Epc8bPdT2WhNYfb5OY
# oTDlSAr7pbrMJJceA+gfLeaoG0QmwVZP+W5YU8uyqVdu7LkeIJL4qybcV9MLCajd
# hWB83s24uoN2Tbdcvz9ti1wshqynmawM9zF0YQkKrYQSOipAMMyKC28Z
# SIG # End signature block
|
combined_dataset/train/non-malicious/count-object.ps1 | count-object.ps1 | #a function to count how many items there are, whether its an array, a collection, or actually just
# a single no array/non list/non collection object in which case it would be 1
function count ($InputObject)
{
if ($inputobject -eq $Null ) { return 0}
if ($inputobject -is [system.array]) { return $inputobject.length }
if ($inputobject -is [system.collections.ICollection] -or
$inputobject -is [system.collections.IList] ) { return $inputobject.count }
#strings are ienumerable, they also have a length, but i think we want to treat 1 string as one object
if ($inputobject -is [string]) { return 1 }
#-1 to show that it is enumerable, but we can't know its length, it could be infinate,
#or take a long time even to enumerate without going over
if ($inputobject -is [system.collections.IEnumerable]) { return -1 }
#otherwise just return 1
return 1
}
count (get-process)
count (1,2,3)
count "hello"
count 3
$a = new-object system.collections.arraylist
[void] $a.add(4);
[void] $a.add("yo");
count $a
|
combined_dataset/train/non-malicious/1221.ps1 | 1221.ps1 |
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
$shareName = 'CarbonGetFileShare'
$sharePath = $null
$shareDescription = 'Share for testing Carbon''s Get-FileShare function.'
function Start-TestFixture
{
$sharePath = New-TempDirectory -Prefix $PSCommandPath
Install-SmbShare -Path $sharePath -Name $shareName -Description $shareDescription
}
function Stop-TestFixture
{
$share = Get-WmiObject 'Win32_Share' -Filter "Name='$shareName'"
if( $share -ne $null )
{
[void] $share.Delete()
}
Remove-Item -Path $sharePath
}
function Test-ShouldGetPermissions
{
$shares = Get-FileShare
Assert-NotNull $shares
$carbonShare = $shares | Where-Object { $_.Name -eq $shareName }
}
function Test-ShouldGetSpecificShare
{
$carbonShare = Get-FileShare -Name $shareName
Assert-CarbonShare $carbonShare
}
function Test-ShouldGetOnlyFileShares
{
$nonFileShares = Get-WmiObject -Class 'Win32_Share' | Where-Object { $_.Type -ne 0 -and $_.Type -ne 2147483648 }
if( $nonFileShares )
{
foreach( $nonFileShare in $nonFileShares )
{
$share = Get-FileShare | Where-Object { $_.Name -eq $nonFileShare.Name }
Assert-Null $share
}
}
else
{
Write-Warning ('No non-file shares on this computer.')
}
}
function Test-ShouldAcceptWildcards
{
$carbonShare = Get-FileShare 'CarbonGetFile*'
Assert-CarbonShare $carbonShare
}
function Test-ShouldWriteErrorWhenShareNotFound
{
$share = Get-FileShare -Name 'fjdksdfjsdklfjsd' -ErrorAction SilentlyContinue
Assert-Error -Last -Regex 'not found'
Assert-Null $share
}
function Test-ShouldNotWriteErrorIfNoWildcardMatches
{
$carbonShare = Get-FileShare 'fjdskfsdf*'
Assert-NoError
Assert-Null $carbonShare
}
function Test-ShouldIgnoreErrors
{
Get-FileShare -Name 'fhsdfsdfhsdfsdaf' -ErrorAction Ignore
Assert-NoError
}
function Assert-CarbonShare
{
param(
$Share
)
Assert-NotNull $Share
Assert-Equal $shareDescription $Share.Description
Assert-Equal $sharePath.FullName $Share.Path
}
|
combined_dataset/train/non-malicious/1758.ps1 | 1758.ps1 |
"Hello from PowerShell!"
python3 -c @"
print(' Hello from Python!')
print(' Python and PowerShell get along great!')
"@
"Back to PowerShell."
"Bye now!"
|
combined_dataset/train/non-malicious/sample_7_1.ps1 | sample_7_1.ps1 | BT
/GS0 gs
/TT0 1 Tf
-0.0003 Tc 10.02 0 0 10.02 72 709.98 Tm
(c.)Tj
/TT1 1 Tf
-0.0007 Tc 0.0011 Tw 1.796 0 Td
[(If you are a )5.9(MPN )5.9(Member)]TJ
/TT0 1 Tf
0 Tc 0 Tw 12.784 0 Td
(:)Tj
-0.001 Tc -12.784 -1.204 Td
(i.)Tj
-0.0003 Tc -0.0008 Tw 1.796 0 Td
[(Each licen)6.4(se )6(acquired on b)7.5(e)-0.9(half of y)6.7(o)-2.2(urself may only )6(be used to review one \(1)6.7(\) )6(copy of the )]TJ
10.02 0 0 10.02 513.0258 697.9199 Tm
(Microsoft)Tj
-0.0006 Tc -0.0005 Tw 10.02 0 0 10.02 107.9999 685.8599 Tm
(Instructor-Led Courseware in the form p)Tj
10.02 0 0 10.02 72 709.98 Tm
21.398 -2.407 Td
[(r)0.5(ovided to y)6.4(o)]TJ
-0.0005 Tc -0.0006 Tw 5.788 0 Td
[(u. If the Micr)6.6(osoft Instructor-Led Courseware i)6.5(s)]TJ
-0.0002 Tc -0.0009 Tw -23.593 -1.21 Td
[(in digital form)7.3(at, y)6.8(o)-2.1(u may i)6.8(n)0.5(stall )6(one \(1\) copy on)]TJ
0.0001 Tc -0.0012 Tw 21.539 0 Td
[( up to three \(3)7.1(\) P)6.5(erson)6.8(al Devic)6.4(es. Y)7.4(o)-1.8(u may )]TJ
10.02 0 0 10.02 520.5498 673.7397 Tm
(not)Tj
0.0002 Tc 10.02 0 0 10.02 107.9999 661.6796 Tm
(install th)Tj
10.02 0 0 10.02 72 709.98 Tm
7.342 -4.82 Td
[(e Mic)6.5(r)1.3(os)3.4(oft Instru)6.9(c)6.5(t)-0.7(or-L)6.7(ed Cours)3.4(eware )6(on a d)8(evice you do )6(not o)4.2(wn or c)6.5(o)4.2(ntrol.)]TJ
-0.001 Tc 0 Tw -5.545 -1.204 Td
(ii.)Tj
0.0001 Tc -0.0012 Tw 1.796 0 Td
[(For each lic)6.4(en)6.8(se you )6(acquir)7.2(e on behalf )6(of)7.1( an End )6(User )6(or Tr)7.2(ainer, y)7.1(o)4.1(u may either:)]TJ
-0.001 Tc 0 Tw 0 -1.204 TD
(1.)Tj
-0.0005 Tc -0.0006 Tw 2.245 0 Td
[(distribute one \(1\) hard cop)7.3(y)0.5( version )6(of the Micr)]TJ
0.0001 Tc -0.0012 Tw 20.832 0 Td
[(osof)7.1(t Instructor-L)6.6(ed Courseware )6(to on)6.8(e \(1\) En)]TJ
10.02 0 0 10.02 543.8005 637.5594 Tm
(d)Tj
-0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 130.4998 625.4994 Tm
(User attendin)Tj
10.02 0 0 10.02 72 709.98 Tm
11.744 -8.431 Td
[(g the Private )6(Training Session, )]TJ
-0.0006 Tc -0.0005 Tw 13.735 0 Td
[(and only i)6.4(mmediately p)7.2(r)0.5(ior to th)]TJ
10.02 0 0 10.02 468.8846 625.4994 Tm
(e commencement)Tj
0 Tc -0.0011 Tw 10.02 0 0 10.02 130.4998 613.4393 Tm
(of the Private)Tj
10.02 0 0 10.02 72 709.98 Tm
11.759 -9.635 Td
[( Training Se)5.4(ssion th)6.7(at i)7(s)-2.8( th)6.7(e su)]TJ
0.0003 Tc -0.0014 Tw 13.595 0 Td
[(bject m)7.8(a)-1.7(t)5.4(t)-0.6(er of the )6(Mic)6.6(r)1.4(os)3.5(oft Instru)7(c)6.6(t)-0.6(or-L)]TJ
10.02 0 0 10.02 507.0974 613.4393 Tm
(ed)Tj
-0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 130.4998 601.3191 Tm
(Courseware b)Tj
10.02 0 0 10.02 72 709.98 Tm
11.878 -10.844 Td
[(e)-1(ing provided, )]TJ
/TT1 1 Tf
0 Tw 6.601 0 Td
(or)Tj
/TT0 1 Tf
-0.001 Tc -14.886 -1.204 Td
(2.)Tj
-0.0003 Tc -0.0008 Tw 2.245 0 Td
[(provide one \(1\) End User )6(who is )6(attend)7.5(ing the Private Training S)5.9(e)5.1(ssi)6.7(on with th)]TJ
10.02 0 0 10.02 477.5653 589.259 Tm
(e unique)Tj
-0.0001 Tc -0.001 Tw 10.02 0 0 10.02 130.4998 577.199 Tm
(redemption c)Tj
10.02 0 0 10.02 72 709.98 Tm
11.626 -13.252 Td
[(o)-2(de and in)6.6(str)7(u)0.6(ction)6.6(s)-2.9( on h)6.6(o)3.9(w they can )6(ac)6.2(cess one )6(\(1\) )6(digital version)]TJ
10.02 0 0 10.02 486.1003 577.199 Tm
( of the)Tj
0.0002 Tc -0.0013 Tw 10.02 0 0 10.02 130.4998 565.1389 Tm
(Micro)Tj
10.02 0 0 10.02 72 709.98 Tm
8.199 -14.455 Td
[(s)-2.6(oft In)6.9(st)5.3(ructor-L)6.7(ed Co)4.2(ursew)5.9(a)-1.8(re)5.6(, )]TJ
/TT1 1 Tf
-0.0004 Tc 0 Tw 14.31 0 Td
(or)Tj
/TT0 1 Tf
-0.001 Tc -18.916 -1.204 Td
(3.)Tj
0 Tc -0.0011 Tw 2.245 0 Td
[(you will provi)7(d)1.8(e one \(1\) )6(Tr)7.1(ainer wh)6.7(o is teaching the P)6.4(r)1.1(ivate Tr)7.1(ainin)6.7(g)1.8( Sessi)]TJ
10.02 0 0 10.02 456.7321 553.0788 Tm
(on with the unique)Tj
-0.0001 Tc 10.02 0 0 10.02 130.4998 541.0188 Tm
(redemption c)Tj
10.02 0 0 10.02 72 709.98 Tm
11.626 -16.862 Td
[(o)-2(de and in)6.6(str)7(u)0.6(ction)6.6(s)-2.9( on h)6.6(o)3.9(w they can )6(ac)6.2(cess one )6(\(1\) )6(Trainer C)7.7(o)]TJ
10.02 0 0 10.02 470.8132 541.0188 Tm
(ntent,)Tj
/TT1 1 Tf
-0.0007 Tc 0.0011 Tw 10.02 0 0 10.02 107.9999 528.8986 Tm
(provided you comply )Tj
10.02 0 0 10.02 72 709.98 Tm
14.306 -18.072 Td
(with the following)Tj
/TT0 1 Tf
-0.0062 Tc 0 Tw 9.149 0 Td
(: )Tj
-0.001 Tc -21.659 -1.204 Td
(iii.)Tj
-0.0005 Tc -0.0006 Tw 1.796 0 Td
[(you will only )6(provide access to the Licen)6.2(s)-3.3(ed Conten)7(t to those indivi)6.5(duals wh)]TJ
10.02 0 0 10.02 442.6882 516.8385 Tm
(o have acquired a valid)Tj
-0.0004 Tc 10.02 0 0 10.02 107.9999 504.7784 Tm
(license t)Tj
10.02 0 0 10.02 72 709.98 Tm
7.206 -20.479 Td
[(o)-2.3( the)5( Licensed Con)6.3(t)-1.3(ent, )]TJ
-0.001 Tc 0 Tw -5.41 -1.204 Td
(iv.)Tj
-0.0002 Tc -0.0009 Tw 1.796 0 Td
[(you will ensur)6.9(e)-0.8( that each )6(End User )6(atten)6.5(d)1.6(ing an Private Training S)6(e)5.2(ssi)6.8(on has thei)6.8(r own valid lic)]TJ
10.02 0 0 10.02 527.9326 492.7183 Tm
(ensed)Tj
0.0002 Tc -0.0013 Tw 10.02 0 0 10.02 107.9999 480.6583 Tm
(copy of the )Tj
10.02 0 0 10.02 72 709.98 Tm
8.858 -22.886 Td
[(M)4.2(i)1.2(cros)3.4(oft Instr)7.3(u)0.9(ctor-L)6.7(ed Co)4.2(ursew)5.9(a)-1.8(re th)6.9(at)]TJ
0.0004 Tc -0.0015 Tw 18.112 0 Td
[( is the )6(subjec)6.7(t of the Priv)7.4(at)5.5(e Training S)6.6(e)5.8(ssi)7.4(on, )]TJ
-0.001 Tc 0 Tw -25.174 -1.204 Td
(v.)Tj
-0.0003 Tc -0.0008 Tw 1.796 0 Td
[(you will ensur)6.8(e)-0.9( that each )6(End User pr)6.8(ovi)6.7(d)1.5(ed with a )]TJ
-0.0007 Tw 22.766 0 Td
[(hard copy versi)6.6(o)-2.3(n of the )6(Micr)]TJ
10.02 0 0 10.02 464.8425 468.5982 Tm
(osoft Instructor-Led)Tj
-0.0002 Tc -0.0009 Tw 10.02 0 0 10.02 107.9989 456.478 Tm
(Courseware )Tj
10.02 0 0 10.02 72 709.98 Tm
9.084 -25.3 Td
[(will be presen)6.5(ted with a c)6.1(o)3.8(py of this agr)6.9(eement )6(and each End )6(User)6.9( will agree th)6.5(at their )]TJ
0 Tc -0.0011 Tw -5.491 -1.204 Td
[(use of )6(the Mi)7(crosoft Instru)6.7(ctor-L)6.5(ed Cour)7.1(seware will b)7.8(e)-0.6( subject )6(to the terms in this agreem)7.5(en)6.7(t prior to )]TJ
-0.0004 Tc -0.0007 Tw T*
[(providing them with the )6(Microsoft Instru)6.3(ctor-L)6.1(ed )4.4(Cour)6.7(seware. )6(Each)6.3( individual will be required to )]TJ
-0.0005 Tc T*
[(denote their )6(acceptance )6(of this agreement in a ma)]TJ
-0.0002 Tc -0.0009 Tw 22.293 0 Td
[(nn)6.5(er that i)6.8(s)-3( enf)6.8(o)-2.1(rceable und)7.6(er local law p)7.6(r)0.9(ior to )]TJ
-0.0004 Tc -0.0007 Tw -22.293 -1.204 Td
[(their acce)5(ssin)6.3(g the Microsoft Instructor-Led Course)5(w)5.3(a)-2.4(re, )6( )]TJ
-0.001 Tc 0 Tw -1.796 -1.204 Td
(vi.)Tj
-0.0004 Tc -0.0007 Tw 1.796 0 Td
[(you will ensur)6.7(e)-1( that each )6(Trainer teachin)6.3(g)1.4( an Pr)1.2(ivate )6(Training Session has their )6(own valid licen)]TJ
10.02 0 0 10.02 526.2281 396.1776 Tm
(sed)Tj
-0.0001 Tc -0.001 Tw 10.02 0 0 10.02 107.9989 384.0575 Tm
(copy of the )Tj
10.02 0 0 10.02 72 709.98 Tm
8.855 -32.527 Td
[(Trainer Cont)5(en)6.6(t that i)6.9(s)-2.9( the )6(subject of th)6.6(e Private )6(Traini)6.9(ng Session)6.6(,)3.2( )]TJ
-0.001 Tc 0 Tw -7.059 -1.204 Td
(vii.)Tj
-0.0002 Tc -0.0009 Tw 1.796 0 Td
[(you will only )6(use qualified )6(Trainer)6.9(s)-3( wh)6.5(o )6(hold the appl)]TJ
-0.0003 Tc -0.0008 Tw 23.461 0 Td
[(i)6.7(cable Micr)6.8(osoft Certificati)6.7(o)]TJ
10.02 0 0 10.02 461.4009 371.9974 Tm
(n credential that is)Tj
0.0003 Tc -0.0014 Tw 10.02 0 0 10.02 107.9989 359.9373 Tm
(the subje)Tj
10.02 0 0 10.02 72 709.98 Tm
7.684 -34.934 Td
[(c)0.6(t of)7.3( the Micro)4.3(s)3.5(oft)5.4( Instruct)5.4(or-Le)5.7(d)2.1( Course)]TJ
-0.0005 Tc -0.0006 Tw 17.914 0 Td
[(ware being taught for all your P)5.9(r)0.6(ivate Tr)6.6(ainin)6.2(g)1.3( )]TJ
0.0008 Tc -0.0079 Tw -22.006 -1.204 Td
[(Session)7.5(s)-2(, )]TJ
-0.001 Tc 0 Tw -1.796 -1.204 Td
(viii.)Tj
-0.0005 Tc -0.0006 Tw 1.796 0 Td
[(you will only )6(use qualified )6(MCTs wh)6.2(o hold the applicab)]TJ
-0.0002 Tc -0.0009 Tw 24.036 0 Td
[(le Microsoft )6(Certification c)6.1(r)0.9(edential th)]TJ
10.02 0 0 10.02 513.3766 335.8172 Tm
(at is the)Tj
10.02 0 0 10.02 107.9989 323.697 Tm
(subject )Tj
10.02 0 0 10.02 72 709.98 Tm
7.057 -38.551 Td
[(of the MOC title bei)6.8(n)0.5(g taught for )6(all your Private Training S)6(e)5.2(ssi)6.8(ons u)6.5(s)-3(ing )6(MOC, )]TJ
0.0005 Tc 0 Tw -5.261 -1.204 Td
(ix.)Tj
-0.0004 Tc -0.0007 Tw 1.796 0 Td
[(you will only )6(provide access to the Micr)6.7(osoft In)]TJ
-0.0005 Tc 20.671 0 Td
[(structor-Led Cour)6.6(seware to End )6(Users, and)]TJ
0.0019 Tc 0 Tw -22.467 -1.204 Td
(x.)Tj
-0.0001 Tc -0.001 Tw 1.796 0 Td
[(you will only )6(provide access to the Tr)7(ain)6.6(e)-0.7(r Content )6(to Trainer)7(s)]TJ
10.02 0 0 10.02 382.7803 299.5768 Tm
(.)Tj
-0.0018 Tc 0 Tw 10.02 0 0 10.02 72 275.4567 Tm
(d.)Tj
/TT1 1 Tf
-0.0013 Tc 0.0017 Tw 1.796 0 Td
(If you are an End)Tj
10.02 0 0 10.02 176.1662 275.4567 Tm
( User:)Tj
/TT0 1 Tf
0 Tc -0.0011 Tw 10.02 0 0 10.02 89.9999 263.3966 Tm
(For each lic)Tj
10.02 0 0 10.02 72 709.98 Tm
6.827 -44.569 Td
[(en)6.7(se you )6(acquir)7.1(e, you m)7.5(a)-2(y u)6.7(s)-2.8(e the )6(Micr)]TJ
-0.0003 Tc -0.0008 Tw 17.55 0 Td
[(osoft Instru)6.4(ctor)6.8(-Led Cour)6.8(seware solely for )]TJ
10.02 0 0 10.02 505.1557 263.3966 Tm
(your)Tj
0.0001 Tc -0.0012 Tw 10.02 0 0 10.02 89.9999 251.2764 Tm
(person)Tj
10.02 0 0 10.02 72 709.98 Tm
4.776 -45.779 Td
[(al train)6.8(i)1.1(ng use. If th)6.8(e Microsof)7.1(t Instructor-L)]TJ
0 Tc -0.0011 Tw 19.391 0 Td
[(ed Courseware i)7(s)-2.8( in digital for)7.1(m)1.5(at, y)7(o)-1.9(u may)7( access th)]TJ
10.02 0 0 10.02 550.6074 251.2764 Tm
(e)Tj
10.02 0 0 10.02 89.9999 239.2164 Tm
(Micro)Tj
10.02 0 0 10.02 72 709.98 Tm
4.156 -46.982 Td
[(s)-2.8(oft In)6.7(st)5.1(ructor-L)6.5(ed Co)4(ursew)5.7(a)-2(re onli)7(ne using th)]TJ
-0.0006 Tc -0.0005 Tw 20.502 0 Td
[(e )6(unique redem)6.9(p)1.2(tion code pr)6.5(ovided to y)6.4(o)]TJ
10.02 0 0 10.02 501.1763 239.2164 Tm
(u by the)Tj
0 Tc -0.0011 Tw 10.02 0 0 10.02 89.9999 227.1563 Tm
(training provi)Tj
10.02 0 0 10.02 72 709.98 Tm
7.63 -48.186 Td
[(d)1.8(er and inst)5.1(al)7(l and use )6(one)5.4( \(1\) copy of)]TJ
0.0003 Tc -0.0014 Tw 17.106 0 Td
[( t)5.4(h)1(e Micro)4.3(s)-2.5(of)7.3(t Instruct)5.4(or-L)6.8(ed Course)5.7(ware )]TJ
10.02 0 0 10.02 504.3088 227.1563 Tm
(on up to)Tj
0.0001 Tc -0.0012 Tw 10.02 0 0 10.02 89.9999 215.0962 Tm
(three \(3\) Per)Tj
10.02 0 0 10.02 72 709.98 Tm
7.467 -49.39 Td
[(s)3.3(onal Device)5.5(s)3.3(.)3.4( You may al)7.1(s)3.3(o)-1.8( print one \(1)7.1(\) copy of the )6(Micro)4.1(s)-2.7(oft In)6.8(st)5.2(ructor-L)6.6(ed Co)4.1(ursew)5.8(a)-1.9(re)]TJ
10.02 0 0 10.02 550.8379 215.0962 Tm
(.)Tj
0.0002 Tc 10.02 0 0 10.02 89.9999 203.0361 Tm
(You may n)Tj
10.02 0 0 10.02 72 709.98 Tm
6.513 -50.593 Td
[(o)-1.7(t i)7.2(n)0.9(stall t)5.3(h)0.9(e Mic)6.5(r)1.3(os)3.4(oft Instru)6.9(c)6.5(t)-0.7(or-L)6.7(ed Cours)3.4(eware )6(on a d)8(evice you do )6(not o)4.2(wn or c)6.5(o)4.2(ntrol.)]TJ
0.0006 Tc 0 Tw -6.513 -2.413 Td
(e.)Tj
/TT1 1 Tf
-0.0006 Tc 0.001 Tw 1.796 0 Td
[(If you)4.8( are a )]TJ
10.02 0 0 10.02 150.9375 178.8559 Tm
(Trainer.)Tj
/TT0 1 Tf
-0.001 Tc 0 Tw 10.02 0 0 10.02 89.9999 166.7958 Tm
(i.)Tj
-0.0001 Tc -0.001 Tw 2.246 0 Td
(For each lic)Tj
10.02 0 0 10.02 95.34 166.8 Tm
6.742 0 Td
[(en)6.6(se you )6(acquir)7(e, you m)7.4(a)-2.1(y in)6.6(stall )6(and )]TJ
0.0002 Tc -0.0013 Tw 16.964 0 Td
[(use )6(one \(1\) c)6.5(o)-1.7(py )6(of the )6(Trainer)7.3( Content in th)]TJ
10.02 0 0 10.02 531.8298 166.8 Tm
(e)Tj
-0.0006 Tc -0.0005 Tw 10.02 0 0 10.02 112.5003 154.7399 Tm
(form provided to you on one \(1\) Per)Tj
10.02 0 0 10.02 95.34 166.8 Tm
17.702 -1.204 Td
[(s)-3.4(on)6.1(al Device solely to prepare )]TJ
10.02 0 0 10.02 408.035 154.7399 Tm
(and deliver an Authorized)Tj
-0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 112.5003 142.6799 Tm
(Training Session or Private )Tj
10.02 0 0 10.02 95.34 166.8 Tm
13.772 -2.407 Td
(Training)Tj
0.0001 Tc -0.0012 Tw 3.588 0 Td
[( Se)5.5(s)3.3(s)-2.7(ion, )6(and inst)5.2(al)7.1(l one \(1\) addi)7.1(tional c)6.4(o)-1.8(py o)4.1(n)0.8( anoth)6.8(er Per)7.2(s)-2.7(on)]TJ
10.02 0 0 10.02 546.0434 142.6799 Tm
(al)Tj
-0.0004 Tc -0.0007 Tw 10.02 0 0 10.02 112.5003 130.6198 Tm
(Device as a b)Tj
10.02 0 0 10.02 95.34 166.8 Tm
7.604 -3.611 Td
[(a)-2.4(ckup copy)6.6(, which may be used only )6.1(to )6(reinstall the )6(Trainer Conten)6.3(t. You m)7.1(a)-2.4(y n)6.3(o)]TJ
10.02 0 0 10.02 531.535 130.6198 Tm
(t)Tj
-0.0001 Tc -0.001 Tw 10.02 0 0 10.02 112.5003 118.5597 Tm
(install )Tj
10.02 0 0 10.02 95.34 166.8 Tm
4.568 -4.814 Td
[(or use )6(a copy of the )6(Trainer C)7.7(o)-2(ntent on )]TJ
0 Tc 17.774 0 Td
[(a devic)6.3(e you do n)6.7(o)-1.9(t )6(own or c)6.3(o)-1.9(ntr)7.1(o)-1.9(l. You m)7.5(a)]TJ
10.02 0 0 10.02 513.014 118.5597 Tm
(y also)Tj
-0.0001 Tc 10.02 0 0 10.02 112.5003 106.4395 Tm
(print one \(1\) )Tj
10.02 0 0 10.02 95.34 166.8 Tm
7.614 -6.024 Td
[(copy of the )6(Trainer Conten)6.6(t solely )6(to)]TJ
-0.0006 Tc -0.0005 Tw 16.123 0 Td
[( prepare for and )6(deliver an Authorized Tr)]TJ
10.02 0 0 10.02 514.1778 106.4395 Tm
(aining)Tj
0 Tc -0.0071 Tw 10.02 0 0 10.02 112.5003 94.3794 Tm
(Session or )Tj
10.02 0 0 10.02 95.34 166.8 Tm
6.538 -7.228 Td
[(Private Training Session)6.7(.)]TJ
ET
|
combined_dataset/train/non-malicious/sample_35_41.ps1 | sample_35_41.ps1 | #
# Module manifest for module 'OCI.PSModules.Disasterrecovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan',
'Get-OCIDisasterrecoveryDrPlanExecution',
'Get-OCIDisasterrecoveryDrPlanExecutionsList',
'Get-OCIDisasterrecoveryDrPlansList',
'Get-OCIDisasterrecoveryDrProtectionGroup',
'Get-OCIDisasterrecoveryDrProtectionGroupsList',
'Get-OCIDisasterrecoveryWorkRequest',
'Get-OCIDisasterrecoveryWorkRequestErrorsList',
'Get-OCIDisasterrecoveryWorkRequestLogsList',
'Get-OCIDisasterrecoveryWorkRequestsList',
'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution',
'Invoke-OCIDisasterrecoveryPauseDrPlanExecution',
'Invoke-OCIDisasterrecoveryResumeDrPlanExecution',
'Invoke-OCIDisasterrecoveryRetryDrPlanExecution',
'Move-OCIDisasterrecoveryDrProtectionGroupCompartment',
'New-OCIDisasterrecoveryDrPlan',
'New-OCIDisasterrecoveryDrPlanExecution',
'New-OCIDisasterrecoveryDrProtectionGroup',
'Remove-OCIDisasterrecoveryDrPlan',
'Remove-OCIDisasterrecoveryDrPlanExecution',
'Remove-OCIDisasterrecoveryDrProtectionGroup',
'Stop-OCIDisasterrecoveryDrPlanExecution',
'Stop-OCIDisasterrecoveryWorkRequest',
'Update-OCIDisasterrecoveryDrPlan',
'Update-OCIDisasterrecoveryDrPlanExecution',
'Update-OCIDisasterrecoveryDrProtectionGroup',
'Update-OCIDisasterrecoveryDrProtectionGroupRole'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1164.ps1 | 1164.ps1 |
Set-StrictMode -Version 'Latest'
$parentFSPath = $null
$childFSPath = $null
$originalAcl = $null
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
function Assert-AclInheritanceDisabled
{
param(
$Path
)
It 'should disable access rule inheritance' {
(Get-Acl -Path $Path).AreAccessRulesProtected | Should Be $true
}
}
function New-TestContainer
{
param(
[Parameter(Mandatory=$true)]
$Provider
)
if( $Provider -eq 'FileSystem' )
{
$testRoot = (Get-Item -Path 'TestDrive:').FullName
$path = Join-Path -Path $testRoot -ChildPath ([IO.Path]::GetRandomFileName())
Install-Directory -Path $path
}
elseif( $Provider -eq 'Registry' )
{
$path = ('hkcu:\Carbon+{0}\Disable-AclInheritance.Tests' -f [IO.Path]::GetRandomFileName())
Install-RegistryKey -Path $path
}
else
{
throw $Provider
}
Grant-Permission -Path $path -Identity $env:USERNAME -Permission FullControl
It 'should have inheritance enabled' {
$acl = Get-Acl -Path $path
$acl.AreAccessRulesProtected | Should Be $false
$acl = $null
}
It 'should have inherited access rules' {
Get-Permission -Path $path -Inherited | Should Not BeNullOrEmpty
}
return $path
}
foreach( $provider in @( 'FileSystem', 'Registry' ) )
{
Describe ('Disable-AclInheritance on {0}' -f $provider) {
$path = New-TestContainer -Provider $provider
Protect-Acl -Path $path
Assert-AclInheritanceDisabled -Path $path
It 'should not preserve inherited access rules' {
[object[]]$perm = Get-Permission -Path $path -Inherited
$perm.Count | Should Be 1
$perm[0].IdentityReference | Should Be (Resolve-IdentityName -Name $env:USERNAME)
}
}
Describe ('Disable-AclInheritance on {0} when preserving inherited rules' -f $provider) {
$path = New-TestContainer -Provider $provider
[Security.AccessControl.AccessRule[]]$inheritedPermissions = Get-Permission -Path $path -Inherited | Where-Object { $_.IsInherited }
Protect-Acl -Path $path -Preserve
Assert-AclInheritanceDisabled -Path $path
It 'should preserve inherited access rules' {
[object[]]$currentPermissions = Get-Permission -Path $path -Inherited
$currentPermissions.Count | Should Be $inheritedPermissions.Count
for( $idx = 0; $idx -lt $currentPermissions.Count; ++$idx )
{
$currentPermission = $currentPermissions[$idx]
$inheritedPermission = $inheritedPermissions | Where-Object { $_.IdentityReference -eq $currentPermission.IdentityReference }
$currentPermission.IdentityReference | Should Be $inheritedPermission.IdentityReference
}
}
}
Describe ('Disable-AclInheritance on {0} when part of a pipeline' -f $provider) {
$path = New-TestContainer -Provider $provider
Get-Item -Path $path | Disable-AclInheritance
Assert-AclInheritanceDisabled -Path $path
$path = New-TestContainer -Provider $provider
$path | Disable-AclInheritance
Assert-AclInheritanceDisabled -Path $path
}
Describe ('Disable-AclInheritandce on {0} when inheritance already disabled' -f $provider) {
$path = New-TestContainer -Provider $provider
Disable-AclInheritance -Path $path
Assert-AclInheritanceDisabled -Path $path
Mock -CommandName 'Set-Acl' -ModuleName 'Carbon' -Verifiable
Disable-AclInheritance -Path $path
It 'should not disable an already disabled ACL' {
Assert-MockCalled -CommandName 'Set-Acl' -ModuleName 'Carbon' -Times 0
}
}
}
Get-ChildItem -Path 'hkcu:\Carbon+*' | Remove-Item -Recurse -ErrorAction Ignore
|
combined_dataset/train/non-malicious/2142.ps1 | 2142.ps1 |
Describe "Using assembly" -Tags "CI" {
try
{
Push-Location $PSScriptRoot
$guid = [Guid]::NewGuid()
Add-Type -OutputAssembly $PSScriptRoot\UsingAssemblyTest$guid.dll -TypeDefinition @"
public class ABC {}
"@
It 'parse reports error on non-existing assembly by relative path' {
$err = $null
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly foo.dll", [ref]$null, [ref]$err)
$err.Count | Should -Be 1
$err[0].ErrorId | Should -Be ErrorLoadingAssembly
}
It 'parse reports error on assembly with non-existing fully qualified name' {
$err = $null
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly 'System.Management.Automation, Version=99.0.0.0'", [ref]$null, [ref]$err)
$err.Count | Should -Be 1
$err[0].ErrorId | Should -Be ErrorLoadingAssembly
}
It 'not allow UNC path' {
$err = $null
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly \\networkshare\foo.dll", [ref]$null, [ref]$err)
$err.Count | Should -Be 1
$err[0].ErrorId | Should -Be CannotLoadAssemblyFromUncPath
}
It 'not allow http path' {
$err = $null
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly http://microsoft.com/foo.dll", [ref]$null, [ref]$err)
$err.Count | Should -Be 1
$err[0].ErrorId | Should -Be CannotLoadAssemblyWithUriSchema
}
It "parse does not load the assembly" -pending {
$assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse
$err = $null
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly .\UsingAssemblyTest$guid.dll", [ref]$null, [ref]$err)
$assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse
$err.Count | Should -Be 0
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly '$PSScriptRoot\UsingAssemblyTest$guid.dll'", [ref]$null, [ref]$err)
$assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse
$err.Count | Should -Be 0
$ast = [System.Management.Automation.Language.Parser]::ParseInput("using assembly `"$PSScriptRoot\UsingAssemblyTest$guid.dll`"", [ref]$null, [ref]$err)
$assemblies = [Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeFalse
$err.Count | Should -Be 0
}
It "reports runtime error about non-existing assembly with relative path" {
$e = { [scriptblock]::Create("using assembly .\NonExistingAssembly.dll") } | Should -Throw -ErrorId 'ParseException' -PassThru
$e.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -Be 'ErrorLoadingAssembly'
}
It "Assembly loaded at runtime" -pending {
$assemblies = pwsh -noprofile -command @"
using assembly .\UsingAssemblyTest$guid.dll
[Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
"@
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeTrue
$assemblies = pwsh -noprofile -command @"
using assembly $PSScriptRoot\UsingAssemblyTest$guid.dll
[Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
"@
$assemblies -contains "UsingAssemblyTest$guid" | Should -BeTrue
$assemblies = pwsh -noprofile -command @"
using assembly System.Drawing
[Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
"@
$assemblies -contains "System.Drawing" | Should -BeTrue
$assemblies = pwsh -noprofile -command @"
using assembly 'System.Drawing, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a'
[Appdomain]::CurrentDomain.GetAssemblies().GetName().Name
"@
$assemblies -contains "System.Drawing" | Should -BeTrue
}
}
finally
{
Remove-Item .\UsingAssemblyTest$guid.dll
Pop-Location
}
}
|
combined_dataset/train/non-malicious/1008.ps1 | 1008.ps1 |
$myTopic = "<your-custom-topic-name>"
$myEndpoint = "<your-endpoint-URL>"
$myResourceGroup = "<resource-group-name>"
New-AzResourceGroup -Name $myResourceGroup -Location westus2
New-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic -Location westus2
New-AzEventGridSubscription `
-EventSubscriptionName demoSubscription `
-Endpoint $myEndpoint `
-ResourceGroupName $myResourceGroup `
-TopicName $myTopic
|
combined_dataset/train/non-malicious/3267.ps1 | 3267.ps1 |
class RoleManager : BaseLogger {
[hashtable]$Groups = @{}
[hashtable]$Permissions = @{}
[hashtable]$Roles = @{}
[hashtable]$RoleUserMapping = @{}
hidden [object]$_Backend
hidden [StorageProvider]$_Storage
hidden [string[]]$_AdminPermissions = @('manage-roles', 'show-help' ,'view', 'view-role', 'view-group',
'manage-plugins', 'manage-groups', 'manage-permissions', 'manage-schedules')
RoleManager([object]$Backend, [StorageProvider]$Storage, [Logger]$Logger) {
$this._Backend = $Backend
$this._Storage = $Storage
$this.Logger = $Logger
$this.Initialize()
}
[void]Initialize() {
$this.LogInfo('Initializing')
$this.LoadState()
if (-not $this.Roles['Admin']) {
$this.LogDebug('Creating builtin [Admin] role')
$adminrole = [Role]::New('Admin', 'Bot administrator role', $this.Logger)
$this._AdminPermissions | foreach-object {
$p = [Permission]::new($_, 'Builtin')
$adminRole.AddPermission($p)
}
$this.LogDebug('Added builtin permissions to [Admin] role', $this._AdminPermissions)
$this.Roles.Add($adminRole.Name, $adminRole)
$this.LogDebug('Creating builtin [Admin] group with [Admin] role')
$adminGroup = [Group]::new('Admin', 'Bot administrators', $this.Logger)
$adminGroup.AddRole($adminRole)
$this.Groups.Add($adminGroup.Name, $adminGroup)
$this.SaveState()
} else {
$adminRole = $this.Roles['Admin']
foreach ($perm in $this._AdminPermissions) {
if (-not $adminRole.Permissions.ContainsKey($perm)) {
$this.LogInfo("[Admin] role missing builtin permission [$perm]. Adding permission back.")
$p = [Permission]::new($perm, 'Builtin')
$adminRole.AddPermission($p)
}
}
}
}
[void]SaveState() {
$this.LogDebug('Saving role manager state to storage')
$permissionsToSave = @{}
foreach ($permission in $this.Permissions.GetEnumerator()) {
$permissionsToSave.Add($permission.Name, $permission.Value.ToHash())
}
$this._Storage.SaveConfig('permissions', $permissionsToSave)
$rolesToSave = @{}
foreach ($role in $this.Roles.GetEnumerator()) {
$rolesToSave.Add($role.Name, $role.Value.ToHash())
}
$this._Storage.SaveConfig('roles', $rolesToSave)
$groupsToSave = @{}
foreach ($group in $this.Groups.GetEnumerator()) {
$groupsToSave.Add($group.Name, $group.Value.ToHash())
}
$this._Storage.SaveConfig('groups', $groupsToSave)
}
[void]LoadState() {
$this.LogDebug('Loading role manager state from storage')
$permissionConfig = $this._Storage.GetConfig('permissions')
if ($permissionConfig) {
foreach($permKey in $permissionConfig.Keys) {
$perm = $permissionConfig[$permKey]
$p = [Permission]::new($perm.Name, $perm.Plugin)
if ($perm.Adhoc) {
$p.Adhoc = $perm.Adhoc
}
if ($perm.Description) {
$p.Description = $perm.Description
}
if (-not $this.Permissions.ContainsKey($p.ToString())) {
$this.Permissions.Add($p.ToString(), $p)
}
}
}
$roleConfig = $this._Storage.GetConfig('roles')
if ($roleConfig) {
foreach ($roleKey in $roleConfig.Keys) {
$role = $roleConfig[$roleKey]
$r = [Role]::new($roleKey, $this.Logger)
if ($role.Description) {
$r.Description = $role.Description
}
if ($role.Permissions) {
foreach ($perm in $role.Permissions) {
if ($p = $this.Permissions[$perm]) {
$r.AddPermission($p)
}
}
}
if (-not $this.Roles.ContainsKey($r.Name)) {
$this.Roles.Add($r.Name, $r)
}
}
}
$groupConfig = $this._Storage.GetConfig('groups')
if ($groupConfig) {
foreach ($groupKey in $groupConfig.Keys) {
$group = $groupConfig[$groupKey]
$g = [Group]::new($groupKey, $this.Logger)
if ($group.Description) {
$g.Description = $group.Description
}
if ($group.Users) {
foreach ($u in $group.Users) {
$g.AddUser($u)
}
}
if ($group.Roles) {
foreach ($r in $group.Roles) {
if ($ro = $this.GetRole($r)) {
$g.AddRole($ro)
}
}
}
if (-not $this.Groups.ContainsKey($g.Name)) {
$this.Groups.Add($g.Name, $g)
}
}
}
}
[Group]GetGroup([string]$Groupname) {
if ($g = $this.Groups[$Groupname]) {
return $g
} else {
$this.LogInfo([LogSeverity]::Warning, "Group [$Groupname] not found")
return $null
}
}
[void]UpdateGroupDescription([string]$Groupname, [string]$Description) {
if ($g = $this.Groups[$Groupname]) {
$g.Description = $Description
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Group [$Groupname] not found")
}
}
[void]UpdateRoleDescription([string]$Rolename, [string]$Description) {
if ($r = $this.Roles[$Rolename]) {
$r.Description = $Description
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Role [$Rolename] not found")
}
}
[Permission]GetPermission([string]$PermissionName) {
$p = $this.Permissions[$PermissionName]
if ($p) {
return $p
} else {
$this.LogInfo([LogSeverity]::Warning, "Permission [$PermissionName] not found")
return $null
}
}
[Role]GetRole([string]$RoleName) {
$r = $this.Roles[$RoleName]
if ($r) {
return $r
} else {
$this.LogInfo([LogSeverity]::Warning, "Role [$RoleName] not found")
return $null
}
}
[void]AddGroup([Group]$Group) {
if (-not $this.Groups.ContainsKey($Group.Name)) {
$this.LogVerbose("Adding group [$($Group.Name)]")
$this.Groups.Add($Group.Name, $Group)
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Group [$($Group.Name)] is already loaded")
}
}
[void]AddPermission([Permission]$Permission) {
if (-not $this.Permissions.ContainsKey($Permission.ToString())) {
$this.LogVerbose("Adding permission [$($Permission.Name)]")
$this.Permissions.Add($Permission.ToString(), $Permission)
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Permission [$($Permission.Name)] is already loaded")
}
}
[void]AddRole([Role]$Role) {
if (-not $this.Roles.ContainsKey($Role.Name)) {
$this.LogVerbose("Adding role [$($Role.Name)]")
$this.Roles.Add($Role.Name, $Role)
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Role [$($Role.Name)] is already loaded")
}
}
[void]RemoveGroup([Group]$Group) {
if ($this.Groups.ContainsKey($Group.Name)) {
$this.LogVerbose("Removing group [$($Group.Name)]")
$this.Groups.Remove($Group.Name)
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Group [$($Group.Name)] was not found")
}
}
[void]RemovePermission([Permission]$Permission) {
if (-not $this.Permissions.ContainsKey($Permission.ToString())) {
foreach ($role in $this.Roles.GetEnumerator()) {
if ($role.Value.Permissions.ContainsKey($Permission.ToString())) {
$this.LogVerbose("Removing permission [$($Permission.ToString())] from role [$($role.Value.Name)]")
$role.Value.RemovePermission($Permission)
}
}
$this.LogVerbose("Removing permission [$($Permission.ToString())]")
$this.Permissions.Remove($Permission.ToString())
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Permission [$($Permission.ToString())] was not found")
}
}
[void]RemoveRole([Role]$Role) {
if ($this.Roles.ContainsKey($Role.Name)) {
foreach ($group in $this.Groups.GetEnumerator()) {
if ($group.Value.Roles.ContainsKey($Role.Name)) {
$this.LogVerbose("Removing role [$($Role.Name)] from group [$($group.Value.Name)]")
$group.Value.RemoveRole($Role)
}
}
$this.LogVerbose("Removing role [$($Role.Name)]")
$this.Roles.Remove($Role.Name)
$this.SaveState()
} else {
$this.LogInfo([LogSeverity]::Warning, "Role [$($Role.Name)] was not found")
}
}
[void]AddRoleToGroup([string]$RoleName, [string]$GroupName) {
try {
if ($role = $this.GetRole($RoleName)) {
if ($group = $this.Groups[$GroupName]) {
$this.LogVerbose("Adding role [$RoleName] to group [$($group.Name)]")
$group.AddRole($role)
$this.SaveState()
} else {
$msg = "Unknown group [$GroupName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} else {
$msg = "Unable to find role [$RoleName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
throw $_
}
}
[void]AddUserToGroup([string]$UserId, [string]$GroupName) {
try {
if ($this._Backend.GetUser($UserId)) {
if ($group = $this.Groups[$GroupName]) {
$this.LogVerbose("Adding user [$UserId] to [$($group.Name)]")
$group.AddUser($UserId)
$this.SaveState()
} else {
$msg = "Unknown group [$GroupName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} else {
$msg = "Unable to find user [$UserId]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
$this.LogInfo([LogSeverity]::Error, "Exception adding [$UserId] to [$GroupName]", $_)
throw $_
}
}
[void]RemoveRoleFromGroup([string]$RoleName, [string]$GroupName) {
try {
if ($role = $this.GetRole($RoleName)) {
if ($group = $this.Groups[$GroupName]) {
$this.LogVerbose("Removing role [$RoleName] from group [$($group.Name)]")
$group.RemoveRole($role)
$this.SaveState()
} else {
$msg = "Unknown group [$GroupName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} else {
$msg = "Unable to find role [$RoleName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
$this.LogInfo([LogSeverity]::Error, "Exception removing [$RoleName] from [$GroupName]", $_)
throw $_
}
}
[void]RemoveUserFromGroup([string]$UserId, [string]$GroupName) {
try {
if ($group = $this.Groups[$GroupName]) {
if ($group.Users.ContainsKey($UserId)) {
$this.LogVerbose("Removing user [$UserId] from group [$($group.Name)]")
$group.RemoveUser($UserId)
$this.SaveState()
}
} else {
$msg = "Unknown group [$GroupName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
$this.LogInfo([LogSeverity]::Error, "Exception removing [$UserId] from [$GroupName]", $_)
throw $_
}
}
[void]AddPermissionToRole([string]$PermissionName, [string]$RoleName) {
try {
if ($role = $this.GetRole($RoleName)) {
if ($perm = $this.Permissions[$PermissionName]) {
$this.LogVerbose("Adding permission [$PermissionName] to role [$($role.Name)]")
$role.AddPermission($perm)
$this.SaveState()
} else {
$msg = "Unknown permission [$perm]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} else {
$msg = "Unable to find role [$RoleName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
$this.LogInfo([LogSeverity]::Error, "Exception adding [$PermissionName] to [$RoleName]", $_)
throw $_
}
}
[void]RemovePermissionFromRole([string]$PermissionName, [string]$RoleName) {
try {
if ($role = $this.GetRole($RoleName)) {
if ($perm = $this.Permissions[$PermissionName]) {
$this.LogVerbose("Removing permission [$PermissionName] from role [$($role.Name)]")
$role.RemovePermission($perm)
$this.SaveState()
} else {
$msg = "Unknown permission [$PermissionName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} else {
$msg = "Unable to find role [$RoleName]"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw $msg
}
} catch {
$this.LogInfo([LogSeverity]::Error, "Exception removing [$PermissionName] from [$RoleName]", $_)
throw $_
}
}
[Group[]]GetUserGroups([string]$UserId) {
$userGroups = New-Object System.Collections.ArrayList
foreach ($group in $this.Groups.GetEnumerator()) {
if ($group.Value.Users.ContainsKey($UserId)) {
$userGroups.Add($group.Value)
}
}
return $userGroups
}
[Role[]]GetUserRoles([string]$UserId) {
$userRoles = New-Object System.Collections.ArrayList
foreach ($group in $this.GetUserGroups($UserId)) {
foreach ($role in $group.Roles.GetEnumerator()) {
$userRoles.Add($role.Value)
}
}
return $userRoles
}
[Permission[]]GetUserPermissions([string]$UserId) {
$userPermissions = New-Object System.Collections.ArrayList
if ($userRoles = $this.GetUserRoles($UserId)) {
foreach ($role in $userRoles) {
$userPermissions.AddRange($role.Permissions.Keys)
}
}
return $userPermissions
}
[string]ResolveUserIdToUserName([string]$Id) {
return $this._Backend.UserIdToUsername($Id)
}
[string]ResolveUsernameToId([string]$Username) {
return $this._Backend.UsernameToUserId($Username)
}
}
|
combined_dataset/train/non-malicious/2919.ps1 | 2919.ps1 | task default -depends Test
task Test -depends Compile, Clean {
Assert $false "This fails."
}
task Compile -depends Clean {
"Compile"
}
task Clean {
"Clean"
}
taskTearDown {
"$($psake.context.Peek().currentTaskName) Tear Down"
}
|
combined_dataset/train/non-malicious/3636.ps1 | 3636.ps1 |
function Test-ListServerAdvisors
{
$rg = Create-ResourceGroupForTest
$server = SetupServer $rg
try
{
$response = Get-AzSqlServerAdvisor `
-ResourceGroupName $server.ResourceGroupName `
-ServerName $server.ServerName
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateServer $advisor $server
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListServerAdvisorsExpanded
{
$rg = Create-ResourceGroupForTest
$server = SetupServer $rg
try
{
$response = Get-AzSqlServerAdvisor `
-ResourceGroupName $server.ResourceGroupName `
-ServerName $server.ServerName -ExpandRecommendedActions `
-AdvisorName *
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateServer $advisor $server
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetServerAdvisor
{
$rg = Create-ResourceGroupForTest
$server = SetupServer $rg
try
{
$response = Get-AzSqlServerAdvisor `
-ResourceGroupName $server.ResourceGroupName `
-ServerName $server.ServerName -AdvisorName CreateIndex
Assert-NotNull $response
ValidateServer $response $server
ValidateAdvisorProperties $response
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-UpdateServerAdvisor
{
$rg = Create-ResourceGroupForTest
$server = SetupServer $rg
try
{
$response = Set-AzSqlServerAdvisorAutoExecuteStatus `
-ResourceGroupName $server.ResourceGroupName `
-ServerName $server.ServerName `
-AdvisorName CreateIndex `
-AutoExecuteStatus Disabled
Assert-NotNull $response
ValidateServer $response $server
ValidateAdvisorProperties $response
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListDatabaseAdvisors
{
$rg = Create-ResourceGroupForTest
$db = SetupDatabase $rg
try
{
$response = Get-AzSqlDatabaseAdvisor `
-ResourceGroupName $db.ResourceGroupName `
-ServerName $db.ServerName `
-DatabaseName $db.DatabaseName `
-AdvisorName *
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateDatabase $advisor $db
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListDatabaseAdvisorsExpanded
{
$rg = Create-ResourceGroupForTest
$db = SetupDatabase $rg
try
{
$response = Get-AzSqlDatabaseAdvisor `
-ResourceGroupName $db.ResourceGroupName `
-ServerName $db.ServerName `
-DatabaseName $db.DatabaseName `
-ExpandRecommendedActions
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateDatabase $advisor $db
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetDatabaseAdvisor
{
$rg = Create-ResourceGroupForTest
$db = SetupDatabase $rg
try
{
$response = Get-AzSqlDatabaseAdvisor `
-ResourceGroupName $db.ResourceGroupName `
-ServerName $db.ServerName `
-DatabaseName $db.DatabaseName `
-AdvisorName CreateIndex
Assert-NotNull $response
ValidateDatabase $response $db
ValidateAdvisorProperties $response
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-UpdateDatabaseAdvisor
{
$rg = Create-ResourceGroupForTest
$db = SetupDatabase $rg
try
{
$response = Set-AzSqlDatabaseAdvisorAutoExecuteStatus `
-ResourceGroupName $db.ResourceGroupName `
-ServerName $db.ServerName `
-DatabaseName $db.DatabaseName `
-AdvisorName CreateIndex `
-AutoExecuteStatus Disabled
Assert-NotNull $response
ValidateDatabase $response $db
ValidateAdvisorProperties $response
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListElasticPoolAdvisors
{
$rg = Create-ResourceGroupForTest
$ep = SetupElasticPool $rg
try
{
$response = Get-AzSqlElasticPoolAdvisor `
-ResourceGroupName $ep.ResourceGroupName`
-ServerName $ep.ServerName`
-ElasticPoolName $ep.ElasticPoolName `
-AdvisorName *
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateElasticPool $advisor $ep
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ListElasticPoolAdvisorsExpanded
{
$rg = Create-ResourceGroupForTest
$ep = SetupElasticPool $rg
try
{
$response = Get-AzSqlElasticPoolAdvisor `
-ResourceGroupName $ep.ResourceGroupName `
-ServerName $ep.ServerName `
-ElasticPoolName $ep.ElasticPoolName `
-ExpandRecommendedActions
Assert-NotNull $response
ValidateAdvisorCount $response
foreach($advisor in $response)
{
ValidateElasticPool $advisor $ep
ValidateAdvisorProperties $advisor
}
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetElasticPoolAdvisor
{
$rg = Create-ResourceGroupForTest
$ep = SetupElasticPool $rg
try
{
$response = Get-AzSqlElasticPoolAdvisor `
-ResourceGroupName $ep.ResourceGroupName `
-ServerName $ep.ServerName `
-ElasticPoolName $ep.ElasticPoolName `
-AdvisorName CreateIndex
Assert-NotNull $response
ValidateElasticPool $response $ep
ValidateAdvisorProperties $response
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function SetupServer($resourceGroup)
{
$location = "Southeast Asia"
$server = Create-ServerForTest $resourceGroup $location
return $server
}
function SetupDatabase($resourceGroup)
{
$server = SetupServer $resourceGroup
$databaseName = Get-DatabaseName
$db = New-AzSqlDatabase `
-ResourceGroupName $server.ResourceGroupName `
-ServerName $server.ServerName `
-DatabaseName $databaseName `
-Edition Basic
return $db
}
function SetupElasticPool($resourceGroup)
{
$server = SetupServer $resourceGroup
$poolName = Get-ElasticPoolName
$ep = New-AzSqlElasticPool `
-ServerName $server.ServerName `
-ResourceGroupName $server.ResourceGroupName `
-ElasticPoolName $poolName -Edition Basic
return $ep
}
function ValidateServer($responseAdvisor, $expectedServer)
{
Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedServer.ResourceGroupName
Assert-AreEqual $responseAdvisor.ServerName $expectedServer.ServerName
}
function ValidateDatabase($responseAdvisor, $expectedDatabase)
{
Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedDatabase.ResourceGroupName
Assert-AreEqual $responseAdvisor.ServerName $expectedDatabase.ServerName
Assert-AreEqual $responseAdvisor.DatabaseName $expectedDatabase.DatabaseName
}
function ValidateElasticPool($responseAdvisor, $expectedElasticPool)
{
Assert-AreEqual $responseAdvisor.ResourceGroupName $expectedElasticPool.ResourceGroupName
Assert-AreEqual $responseAdvisor.ServerName $expectedElasticPool.ServerName
Assert-AreEqual $responseAdvisor.ElasticPoolName $expectedElasticPool.ElasticPoolName
}
function ValidateAdvisorProperties($advisor, $expanded = $false)
{
Assert-True {($advisor.AdvisorStatus -eq "GA") `
-or ($advisor.AdvisorStatus -eq "PublicPreview") `
-or ($advisor.AdvisorStatus -eq "PrivatePreview")}
Assert-AreEqual "Disabled" $advisor.AutoExecuteStatus
Assert-True {($advisor.AutoExecuteStatusInheritedFrom -eq "Default") -or `
($advisor.AutoExecuteStatusInheritedFrom -eq "Server") -or `
($advisor.AutoExecuteStatusInheritedFrom -eq "ElasticPool") -or `
($advisor.AutoExecuteStatusInheritedFrom -eq "Database")}
}
function ValidateAdvisorCount($response)
{
$expectedMinAdvisorCount = 4
Assert-True { $response.Count -ge $expectedMinAdvisorCount } "Advisor count was $($response.Count), expected at least $expectedMinAdvisorCount. Response: $response"
} |
combined_dataset/train/non-malicious/2373.ps1 | 2373.ps1 | function Compare-Folder
{
[CmdletBinding()]
param
(
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path -Path $_ -PathType Container })]
[string]$ReferenceFolder,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path -Path $_ -PathType Container })]
[string]$DifferenceFolder,
[Parameter()]
[ValidateNotNullOrEmpty()]
[ValidatePattern('^\\')]
[string]$ExcludeFilePath
)
begin
{
$ErrorActionPreference = 'Stop'
function Get-FileHashesInFolder
{
param (
[string]$Folder
)
$files = Get-ChildItem -Path $Folder -Recurse -File
foreach ($s in $files)
{
$selectObjects = @('Hash', @{ n = 'Path'; e = { $_.Path.SubString($Folder.Length) } })
Get-FileHash $s.Fullname | Select $selectObjects -ExcludeProperty Path
}
}
}
process
{
try
{
$refHashes = Get-FileHashesInFolder -Folder $ReferenceFolder
$destHashes = Get-FileHashesInFolder -Folder $DifferenceFolder
if ($PSBoundParameters.ContainsKey('ExcludeFilePath'))
{
$refHashes = $refHashes.Where({ $_.Path -ne $ExcludeFilePath })
$destHashes = $destHashes.Where({ $_.Path -ne $ExcludeFilePath })
}
$refHashes.Where({ $_.Path -notin $destHashes.Path }).foreach({
[pscustomobject]@{
'Path' = $_.Path
'Reason' = 'NotInDifferenceFolder'
}
})
$destHashes.Where({ $_.Path -notin $refHashes.Path }).foreach({
[pscustomobject]@{
'Path' = $_.Path
'Reason' = 'NotInReferenceFolder'
}
})
$refHashes.Where({ $_.Hash -notin $destHashes.Hash -and $_.Path -in $destHashes.Path }).foreach({
[pscustomobject]@{
'Path' = $_.Path
'Reason' = 'HashDifferent'
}
})
}
catch
{
Write-Error $_.Exception.Message
}
}
} |
combined_dataset/train/non-malicious/Start-ComputerJobs.ps1 | Start-ComputerJobs.ps1 | #requires -version 2.0
function Start-ComputerJobs{
<#
.NOTES
Name: Start-ComputerJobs
Author: Tome Tanasovski
Created: 6/25/2010
Version: 1.0
Website: http://powertoe.wordpress.com
.SYNOPSIS
Multithreads a scriptblock with jobs
.DESCRIPTION
The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs.
You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread.
This can be thought of as a multithreaded approach to a foreach loop.
.PARAMETER ComputerName
Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock.
.PARAMETER ScriptBlock
Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock.
The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName.
.PARAMETER Threads
Specifies the maximum number of jobs that can be simultaneously running at any given time.
This defaults to 10 if nothing is specified.
.EXAMPLE
"computer1","computer2","computer3","computer4","computer5" |Start-ComputerJobs -ScriptBlock {dir \\\\$computername\\c$}
.INPUTS
System.String
.OUTPUTS
PSObject
Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text"
#>
param(
[Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string[]]$ComputerName,
[Parameter(Mandatory=$true)]
[ScriptBlock]$ScriptBlock,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Threads = 10,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Sleep = 5
)
BEGIN {
$firstrun = $true
$computers = @()
$curthreads = 0
$jobs = @()
$valid = $false
}
PROCESS {
if ($firstrun) {
$firstrun = $false
# Validate scriptblock - Making sure it has a $computername variable to use
if ($ScriptBlock -match '\\$computername') {
$valid = $true
} else {
Write-Error 'You must specify a scriptblock that contains a variable called $computername'
$valid = $false
}
}
if ($valid) {
foreach ($computer in $computername) {
while ($jobs.count -eq $Threads) {
$newjobs = @()
$jobs |foreach {
$_ |Receive-Job -NoRecurse
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -eq $Threads) {
sleep $sleep
}
}
$runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', """$computer"""))
Write-Verbose "Starting Job for computer: $computer"
$jobs += Start-Job -ScriptBlock $runscript
$curthreads++
}
}
}
END {
while ($jobs.count -ne 0) {
$newjobs = @()
$jobs |foreach {
$_ |Receive-Job -NoRecurse
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -gt 0) {
sleep $sleep
}
}
}
}
|
combined_dataset/train/non-malicious/Is-Natural.ps1 | Is-Natural.ps1 | function is-natural{
param ($number)
if($number -like "*.*" -or $number -like "*-*"){
return $false
}else{return $true}
}
|
combined_dataset/train/non-malicious/UIAutomation _1.6.ps1 | UIAutomation _1.6.ps1 | ## UI Automation v 1.7 -- REQUIRES the Reflection module (current version: http://poshcode.org/2480 )
##
# WASP 2.0 is getting closer, but this is still just a preview:
# -- a lot of the commands have weird names still because they're being generated ignorantly
# -- eg: Invoke-Toggle.Toggle and Invoke-Invoke.Invoke
# v 1.7 - Fixes using multiple checks like: Select-UIElement Red: Edit
Add-Type -AssemblyName "UIAutomationClient, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"
Add-Type -AssemblyName "UIAutomationTypes, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"
$SWA = "System.Windows.Automation"
# Add-Accelerator InvokePattern "$SWA.InvokePattern" -EA SilentlyContinue
# Add-Accelerator ExpandPattern "$SWA.ExpandCollapsePattern" -EA SilentlyContinue
# Add-Accelerator WindowPattern "$SWA.WindowPattern" -EA SilentlyContinue
# Add-Accelerator TransformPattern "$SWA.TransformPattern" -EA SilentlyContinue
# Add-Accelerator ValuePattern "$SWA.ValuePattern" -EA SilentlyContinue
# Add-Accelerator TextPattern "$SWA.TextPattern" -EA SilentlyContinue
# This is what requires the Reflection module:
Add-Accelerator Automation "$SWA.Automation" -EA SilentlyContinue
Add-Accelerator AutomationElement "$SWA.AutomationElement" -EA SilentlyContinue
Add-Accelerator TextRange "$SWA.Text.TextPatternRange" -EA SilentlyContinue
##### Conditions
Add-Accelerator Condition "$SWA.Condition" -EA SilentlyContinue
Add-Accelerator AndCondition "$SWA.AndCondition" -EA SilentlyContinue
Add-Accelerator OrCondition "$SWA.OrCondition" -EA SilentlyContinue
Add-Accelerator NotCondition "$SWA.NotCondition" -EA SilentlyContinue
Add-Accelerator PropertyCondition "$SWA.PropertyCondition" -EA SilentlyContinue
##### IDentifiers
Add-Accelerator AutoElementIds "$SWA.AutomationElementIdentifiers" -EA SilentlyContinue
Add-Accelerator TransformIds "$SWA.TransformPatternIdentifiers" -EA SilentlyContinue
##### Patterns:
$patterns = Get-Type -Assembly UIAutomationClient -Base System.Windows.Automation.BasePattern
#| Where { $_ -ne [System.Windows.Automation.InvokePattern] }
Add-Type -TypeDefinition @"
using System;
using System.ComponentModel;
using System.Management.Automation;
using System.Reflection;
using System.Text.RegularExpressions;
using System.Windows.Automation;
using System.Runtime.InteropServices;
[AttributeUsage(AttributeTargets.Field | AttributeTargets.Property)]
public class StaticFieldAttribute : ArgumentTransformationAttribute {
private Type _class;
public override string ToString() {
return string.Format("[StaticField(OfClass='{0}')]", OfClass.FullName);
}
public override Object Transform( EngineIntrinsics engineIntrinsics, Object inputData) {
if(inputData is string && !string.IsNullOrEmpty(inputData as string)) {
System.Reflection.FieldInfo field = _class.GetField(inputData as string, BindingFlags.Static | BindingFlags.Public);
if(field != null) {
return field.GetValue(null);
}
}
return inputData;
}
public StaticFieldAttribute( Type ofClass ) {
OfClass = ofClass;
}
public Type OfClass {
get { return _class; }
set { _class = value; }
}
}
public static class UIAutomationHelper {
[DllImport ("user32.dll", CharSet = CharSet.Auto)]
static extern IntPtr FindWindow (string lpClassName, string lpWindowName);
[DllImport ("user32.dll", CharSet = CharSet.Auto)]
static extern bool AttachThreadInput (int idAttach, int idAttachTo, bool fAttach);
[DllImport ("user32.dll", CharSet = CharSet.Auto)]
static extern int GetWindowThreadProcessId (IntPtr hWnd, IntPtr lpdwProcessId);
[DllImport ("user32.dll", CharSet = CharSet.Auto)]
static extern IntPtr SetForegroundWindow (IntPtr hWnd);
public static AutomationElement RootElement {
get { return AutomationElement.RootElement; }
}
///<synopsis>Using Win32 to set foreground window because AutomationElement.SetFocus() is unreliable</synopsis>
public static bool SetForeground(this AutomationElement element)
{
if(element == null) {
throw new ArgumentNullException("element");
}
// Get handle to the element
IntPtr other = FindWindow (null, element.Current.Name);
// // Get the Process ID for the element we are trying to
// // set as the foreground element
// int other_id = GetWindowThreadProcessId (other, IntPtr.Zero);
//
// // Get the Process ID for the current process
// int this_id = GetWindowThreadProcessId (Process.GetCurrentProcess().Handle, IntPtr.Zero);
//
// // Attach the current process's input to that of the
// // given element. We have to do this otherwise the
// // WM_SETFOCUS message will be ignored by the element.
// bool success = AttachThreadInput(this_id, other_id, true);
// Make the Win32 call
IntPtr previous = SetForegroundWindow(other);
return !IntPtr.Zero.Equals(previous);
}
}
"@ -ReferencedAssemblies UIAutomationClient, UIAutomationTypes
## TODO: Write Get-SupportedPatterns or rather ...
## Get-SupportedFunctions (to return the names of the functions for the supported patterns)
## TODO: Support all the "Properties" too
## TODO: Figure out why Notepad doesn't support SetValue
## TODO: Figure out where the menus support went
ForEach($pattern in $patterns){
$pattern | Add-Accelerator
$PatternFullName = $pattern.FullName
$PatternName = $Pattern.Name -Replace "Pattern","."
$newline = "`n`t`t"
New-Item "Function:ConvertTo-$($Pattern.Name)" -Value "
param(
[Parameter(ValueFromPipeline=`$true)][Alias('Element','AutomationElement')][AutomationElement]`$InputObject
)
process {
trap {
if(`$_.Exception.Message -like '*Unsupported Pattern.*') {
Write-Error `"Cannot get ```"$($Pattern.Name)```" from that AutomationElement, `$(`$_)` You should try one of: `$(`$InputObject.GetSupportedPatterns()|%{```"'```" + (`$_.ProgrammaticName.Replace(```"PatternIdentifiers.Pattern```",```"```")) + ```"Pattern'```"})`"; continue;
}
}
Write-Output `$InputObject.GetCurrentPattern([$PatternFullName]::Pattern).Current
}"
$pattern.GetMethods() |
Where { $_.DeclaringType -eq $_.ReflectedType -and !$_.IsSpecialName } |
ForEach {
$FunctionName = "Function:Invoke-$PatternName$($_.Name)"
$Position = 1
if (test-path $FunctionName) { remove-item $FunctionName }
$Parameters = @("$newline[Parameter(ValueFromPipeline=`$true)]"+
"$newline[Alias('Parent','Element','Root','AutomationElement')]"+
"$newline[AutomationElement]`$InputObject"
) +
@(
"[Parameter()]$newline[Switch]`$Passthru"
) +
@($_.GetParameters() | % { "[Parameter(Position=$($Position; $Position++))]$newline[$($_.ParameterType.FullName)]`$$($_.Name)" })
$Parameters = $Parameters -Join "$newline,$newline"
$ParameterValues = '$' + (@($_.GetParameters() | Select-Object -Expand Name ) -Join ', $')
$definition = @"
param(
$Parameters
)
process {
## trap { Write-Warning "`$(`$_)"; break }
`$pattern = `$InputObject.GetCurrentPattern([$PatternFullName]::Pattern)
if(`$pattern) {
`$Pattern.$($_.Name)($(if($ParameterValues.Length -gt 1){ $ParameterValues }))
}
if(`$passthru) {
`$InputObject
}
}
"@
trap {
Write-Warning $_
Write-Host $definition -fore cyan
}
New-Item $FunctionName -value $definition
}
$pattern.GetProperties() |
Where { $_.DeclaringType -eq $_.ReflectedType -and $_.Name -notmatch "Cached|Current"} |
ForEach {
$FunctionName = "Function:Get-$PatternName$($_.Name)".Trim('.')
if (test-path $FunctionName) { remove-item $FunctionName }
New-Item $FunctionName -value "
param(
[Parameter(ValueFromPipeline=`$true)]
[AutomationElement]`$AutomationElement
)
process {
trap { Write-Warning `"$PatternFullName `$_`"; continue }
`$pattern = `$AutomationElement.GetCurrentPattern([$PatternFullName]::Pattern)
if(`$pattern) {
`$pattern.'$($_.Name)'
}
}"
}
## So far this seems to be restricted to Text (DocumentRange) elements
$pattern.GetFields() |
Where { $_.FieldType.Name -like "*TextAttribute"} |
ForEach {
$FunctionName = "Function:Get-Text$($_.Name -replace 'Attribute')"
if (test-path $FunctionName) { remove-item $FunctionName }
New-Item $FunctionName -value "
param(
[Parameter(ValueFromPipeline=`$true)]
[AutomationElement]`$AutomationElement
)
process {
trap { Write-Warning `"$PatternFullName `$_`"; continue }
`$AutomationElement.GetAttributeValue([$PatternFullName]::$($_.Name))
}"
}
$pattern.GetFields() | Where { $_.FieldType -eq [System.Windows.Automation.AutomationEvent] } |
ForEach {
$Name = $_.Name -replace 'Event$'
$FunctionName = "Function:Register-$($PatternName.Trim('.'))$Name"
if (test-path $FunctionName) { remove-item $FunctionName }
New-Item $FunctionName -value "
param(
[Parameter(ValueFromPipeline=`$true)]
[AutomationElement]`$AutomationElement
,
[System.Windows.Automation.TreeScope]`$TreeScope = 'Element'
,
[ScriptBlock]`$EventHandler
)
process {
trap { Write-Warning `"$PatternFullName `$_`"; continue }
[Automation]::AddAutomationEventHandler( [$PatternFullName]::$Name, `$AutomationElement, `$TreeScope, `$EventHandler )
}"
}
}
$FalseCondition = [Condition]::FalseCondition
$TrueCondition = [Condition]::TrueCondition
Add-Type -AssemblyName System.Windows.Forms
Add-Accelerator SendKeys System.Windows.Forms.SendKeys -EA SilentlyContinue
$AutomationProperties = [system.windows.automation.automationelement+automationelementinformation].GetProperties()
Set-Alias Invoke-UIElement Invoke-Invoke.Invoke
function formatter { END {
$input | Format-Table @{l="Text";e={$_.Text.SubString(0,25)}}, ClassName, FrameworkId -Auto
}}
function Get-ClickablePoint {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
[Alias("Parent","Element","Root")]
[AutomationElement]$InputObject
)
process {
$InputObject.GetClickablePoint()
}
}
function Show-Window {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
[Alias("Parent","Element","Root")]
[AutomationElement]$InputObject
,
[Parameter()]
[Switch]$Passthru
)
process {
Set-UIFocus $InputObject
if($passthru) {
$InputObject
}
}
}
function Set-UIFocus {
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
[Alias("Parent","Element","Root")]
[AutomationElement]$InputObject
,
[Parameter()]
[Switch]$Passthru
)
process {
try {
[UIAutomationHelper]::SetForeground( $InputObject )
$InputObject.SetFocus()
} catch {
Write-Verbose "SetFocus fail, trying SetForeground"
}
if($passthru) {
$InputObject
}
}
}
function Send-UIKeys {
[CmdletBinding()]
param(
[Parameter(Position=0)]
[string]$Keys
,
[Parameter(ValueFromPipeline=$true)]
[Alias("Parent","Element","Root")]
[AutomationElement]$InputObject
,
[Parameter()]
[Switch]$Passthru
,
[Parameter()]
[Switch]$Async
)
process {
if(!$InputObject.Current.IsEnabled)
{
Write-Warning "The Control is not enabled!"
}
if(!$InputObject.Current.IsKeyboardFocusable)
{
Write-Warning "The Control is not focusable!"
}
Set-UIFocus $InputObject
if($Async) {
[SendKeys]::Send( $Keys )
} else {
[SendKeys]::SendWait( $Keys )
}
if($passthru) {
$InputObject
}
}
}
function Set-UIText {
[CmdletBinding()]
param(
[Parameter(Position=0)]
[string]$Text
,
[Parameter(ValueFromPipeline=$true)]
[Alias("Parent","Element","Root")]
[AutomationElement]$InputObject
,
[Parameter()]
[Switch]$Passthru
)
process {
if(!$InputObject.Current.IsEnabled)
{
Write-Warning "The Control is not enabled!"
}
if(!$InputObject.Current.IsKeyboardFocusable)
{
Write-Warning "The Control is not focusable!"
}
$valuePattern = $null
if($InputObject.TryGetCurrentPattern([ValuePattern]::Pattern,[ref]$valuePattern)) {
Write-Verbose "Set via ValuePattern!"
$valuePattern.SetValue( $Text )
}
elseif($InputObject.Current.IsKeyboardFocusable)
{
Set-UIFocus $InputObject
[SendKeys]::SendWait("^{HOME}");
[SendKeys]::SendWait("^+{END}");
[SendKeys]::SendWait("{DEL}");
[SendKeys]::SendWait( $Text )
}
if($passthru) {
$InputObject
}
}
}
function Select-UIElement {
[CmdletBinding(DefaultParameterSetName="FromParent")]
PARAM (
[Parameter(ParameterSetName="FromWindowHandle", Position="0", Mandatory=$true)]
[Alias("MainWindowHandle","hWnd","Handle","Wh")]
[IntPtr[]]$WindowHandle=[IntPtr]::Zero
,
[Parameter(ParameterSetName="FromPoint", Position="0", Mandatory=$true)]
[System.Windows.Point[]]$Point
,
[Parameter(ParameterSetName="FromParent", ValueFromPipeline=$true, Position=100)]
[System.Windows.Automation.AutomationElement]$Parent = [UIAutomationHelper]::RootElement
,
[Parameter(ParameterSetName="FromParent", Position="0")]
[Alias("WindowName")]
[String[]]$Name
,
[Parameter(ParameterSetName="FromParent", Position="1")]
[Alias("Type","Ct")]
[System.Windows.Automation.ControlType]
[StaticField(([System.Windows.Automation.ControlType]))]$ControlType
,
[Parameter(ParameterSetName="FromParent")]
[Alias("UId")]
[String[]]$AutomationId
,
## Removed "Id" alias to allow get-process | Select-Window pipeline to find just MainWindowHandle
[Parameter(ParameterSetName="FromParent", ValueFromPipelineByPropertyName=$true )]
[Alias("Id")]
[Int[]]$PID
,
[Parameter(ParameterSetName="FromParent")]
[Alias("Pn")]
[String[]]$ProcessName
,
[Parameter(ParameterSetName="FromParent")]
[Alias("Cn")]
[String[]]$ClassName
,
[switch]$Recurse
,
[switch]$Bare
)
process {
Write-Debug "Parameters Found"
Write-Debug ($PSBoundParameters | Format-Table | Out-String)
$search = "Children"
if($Recurse) { $search = "Descendants" }
$condition = [System.Windows.Automation.Condition]::TrueCondition
Write-Verbose $PSCmdlet.ParameterSetName
switch -regex ($PSCmdlet.ParameterSetName) {
"FromWindowHandle" {
Write-Verbose "Finding from Window Handle $HWnd"
$Element = $(
foreach($hWnd in $WindowHandle) {
[System.Windows.Automation.AutomationElement]::FromHandle( $hWnd )
}
)
continue
}
"FromPoint" {
Write-Verbose "Finding from Point $Point"
$Element = $(
foreach($pt in $Point) {
[System.Windows.Automation.AutomationElement]::FromPoint( $pt )
}
)
continue
}
"FromParent" {
Write-Verbose "Finding from Parent!"
## [System.Windows.Automation.Condition[]]$conditions = [System.Windows.Automation.Condition]::TrueCondition
[ScriptBlock[]]$filters = @()
if($AutomationId) {
[System.Windows.Automation.Condition[]]$current = $(
foreach($aid in $AutomationId) {
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::AutomationIdProperty), $aid
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
if($PID) {
[System.Windows.Automation.Condition[]]$current = $(
foreach($p in $PID) {
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ProcessIdProperty), $p
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
if($ProcessName) {
if($ProcessName -match "\\?|\\*|\\[") {
[ScriptBlock[]]$filters += { $(foreach($p in $ProcessName){ (Get-Process -id $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ProcessIdProperty)).ProcessName -like $p }) -contains $true }
} else {
[System.Windows.Automation.Condition[]]$current = $(
foreach($p in Get-Process -Name $ProcessName) {
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ProcessIdProperty), $p.id, "IgnoreCase"
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
}
if($Name) {
Write-Verbose "Name: $Name"
if($Name -match "\\?|\\*|\\[") {
[ScriptBlock[]]$filters += { $(foreach($n in $Name){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::NameProperty) -like $n }) -contains $true }
} else {
[System.Windows.Automation.Condition[]]$current = $(
foreach($n in $Name){
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::NameProperty), $n, "IgnoreCase"
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
}
if($ClassName) {
if($ClassName -match "\\?|\\*|\\[") {
[ScriptBlock[]]$filters += { $(foreach($c in $ClassName){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ClassNameProperty) -like $c }) -contains $true }
} else {
[System.Windows.Automation.Condition[]]$current = $(
foreach($c in $ClassName){
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ClassNameProperty), $c, "IgnoreCase"
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
}
if($ControlType) {
if($ControlType -match "\\?|\\*|\\[") {
[ScriptBlock[]]$filters += { $(foreach($c in $ControlType){ $_.GetCurrentPropertyValue([System.Windows.Automation.AutomationElement]::ControlTypeProperty) -like $c }) -contains $true }
} else {
[System.Windows.Automation.Condition[]]$current = $(
foreach($c in $ControlType){
new-object System.Windows.Automation.PropertyCondition ([System.Windows.Automation.AutomationElement]::ControlTypeProperty), $c
}
)
if($current.Length -gt 1) {
[System.Windows.Automation.Condition[]]$conditions += New-Object System.Windows.Automation.OrCondition $current
} elseif($current.Length -eq 1) {
[System.Windows.Automation.Condition[]]$conditions += $current[0]
}
}
}
if($conditions.Length -gt 1) {
[System.Windows.Automation.Condition]$condition = New-Object System.Windows.Automation.AndCondition $conditions
} elseif($conditions) {
[System.Windows.Automation.Condition]$condition = $conditions[0]
} else {
[System.Windows.Automation.Condition]$condition = [System.Windows.Automation.Condition]::TrueCondition
}
If($VerbosePreference -gt "SilentlyContinue") {
function Write-Condition {
param([Parameter(ValueFromPipeline=$true)]$condition, $indent = 0)
process {
Write-Debug ($Condition | fl * | Out-String)
if($condition -is [System.Windows.Automation.AndCondition] -or $condition -is [System.Windows.Automation.OrCondition]) {
Write-Verbose ((" "*$indent) + $Condition.GetType().Name )
$condition.GetConditions().GetEnumerator() | Write-Condition -Indent ($Indent+4)
} elseif($condition -is [System.Windows.Automation.PropertyCondition]) {
Write-Verbose ((" "*$indent) + $Condition.Property.ProgrammaticName + " = '" + $Condition.Value + "' (" + $Condition.Flags + ")")
} else {
Write-Verbose ((" "*$indent) + $Condition.GetType().Name + " where '" + $Condition.Value + "' (" + $Condition.Flags + ")")
}
}
}
Write-Verbose "CONDITIONS ============="
$global:LastCondition = $condition
foreach($c in $condition) {
Write-Condition $c
}
Write-Verbose "============= CONDITIONS"
}
if($filters.Count -gt 0) {
$Element = $Parent.FindAll( $search, $condition ) | Where-Object { $item = $_; foreach($f in $filters) { $item = $item | Where $f }; $item }
} else {
$Element = $Parent.FindAll( $search, $condition )
}
}
}
Write-Verbose "Element Count: $(@($Element).Count)"
if($Element) {
foreach($el in $Element) {
if($Bare) {
Write-Output $el
} else {
$e = New-Object PSObject $el
foreach($prop in $e.GetSupportedProperties() | Sort ProgrammaticName)
{
## TODO: make sure all these show up: [System.Windows.Automation.AutomationElement] | gm -sta -type Property
$propName = [System.Windows.Automation.Automation]::PropertyName($prop)
Add-Member -InputObject $e -Type ScriptProperty -Name $propName -Value ([ScriptBlock]::Create( "`$this.GetCurrentPropertyValue( [System.Windows.Automation.AutomationProperty]::LookupById( $($prop.Id) ))" )) -EA 0
}
foreach($patt in $e.GetSupportedPatterns()| Sort ProgrammaticName)
{
Add-Member -InputObject $e -Type ScriptProperty -Name ($patt.ProgrammaticName.Replace("PatternIdentifiers.Pattern","") + "Pattern") -Value ([ScriptBlock]::Create( "`$this.GetCurrentPattern( [System.Windows.Automation.AutomationPattern]::LookupById( '$($patt.Id)' ) )" )) -EA 0
}
Write-Output $e
}
}
}
}
}
# [Cmdlet(VerbsCommon.Add, "UIAHandler")]
# public class AddUIAHandlerCommand : PSCmdlet
# {
# private AutomationElement _parent = AutomationElement.RootElement;
# private AutomationEvent _event = WindowPattern.WindowOpenedEvent;
# private TreeScope _scope = TreeScope.Children;
#
# [Parameter(ValueFromPipeline = true)]
# [Alias("Parent", "Element", "Root")]
# public AutomationElement InputObject { set { _parent = value; } get { return _parent; } }
#
# [Parameter()]
# public AutomationEvent Event { set { _event = value; } get { return _event; } }
#
# [Parameter()]
# public AutomationEventHandler ScriptBlock { set; get; }
#
# [Parameter()]
# public SwitchParameter Passthru { set; get; }
#
# [Parameter()]
# public TreeScope Scope { set { _scope = value; } get { return _scope; } }
#
# protected override void ProcessRecord()
# {
# Automation.AddAutomationEventHandler(Event, InputObject, Scope, ScriptBlock);
#
# if (Passthru.ToBool())
# {
# WriteObject(InputObject);
# }
#
# base.ProcessRecord();
# }
# }
Export-ModuleMember -cmdlet * -Function * -Alias *
|
combined_dataset/train/non-malicious/Lab Manager Demo.ps1 | Lab Manager Demo.ps1 | # Demo showing how to connect to VMware Lab Manager.
# Download LabManager.ps1 from http://www.poshcode.org/753.
. .\\LabManager.ps1
# Run this command if your Lab Manager's certificate is untrusted but you
# want to connect.
Ignore-SslErrors
# Connect to Lab Manager.
$labManager = Connect-LabManager -server "demo.eng.vmware.com" `
-credential (get-credential)
# Find out what operations there are.
$labManager | gm | where { $_.MemberType -eq "Method" }
# List all library configurations.
$labManager.ListConfigurations(1)
# Find all machines deployed from any library configuration.
$labManager.ListConfigurations(1) | foreach {
write-host ("For Configuration " + $_.id + ":")
$labManager.ListMachines($_.id)
}
# See http://www.vmware.com/pdf/lm30_soap_api_guide.pdf for help on arguments.
|
combined_dataset/train/non-malicious/690.ps1 | 690.ps1 |
function Backup-RsEncryptionKey
{
[CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')]
param
(
[Parameter(Mandatory = $True)]
[string]
$Password,
[Parameter(Mandatory = $True)]
[string]
$KeyPath,
[Alias('SqlServerInstance')]
[string]
$ReportServerInstance,
[Alias('SqlServerVersion')]
[Microsoft.ReportingServicesTools.SqlServerVersion]
$ReportServerVersion,
[string]
$ComputerName,
[System.Management.Automation.PSCredential]
$Credential
)
if ($PSCmdlet.ShouldProcess((Get-ShouldProcessTargetWmi -BoundParameters $PSBoundParameters), "Retrieve encryption key and create backup in $KeyPath"))
{
$rsWmiObject = New-RsConfigurationSettingObjectHelper -BoundParameters $PSBoundParameters
Write-Verbose "Retrieving encryption key..."
$encryptionKeyResult = $rsWmiObject.BackupEncryptionKey($Password)
if ($encryptionKeyResult.HRESULT -eq 0)
{
Write-Verbose "Retrieving encryption key... Success!"
}
else
{
throw "Failed to create backup of the encryption key. Errors: $($encryptionKeyResult.ExtendedErrors)"
}
try
{
Write-Verbose "Writing key to file..."
[System.IO.File]::WriteAllBytes($KeyPath, $encryptionKeyResult.KeyFile)
Write-Verbose "Writing key to file... Success!"
}
catch
{
throw
}
}
}
|
combined_dataset/train/non-malicious/3949.ps1 | 3949.ps1 |
function Check-CmdletReturnType
{
param($cmdletName, $cmdletReturn)
$cmdletData = Get-Command $cmdletName;
Assert-NotNull $cmdletData;
[array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") };
[array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") };
$realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.","";
return $cmdletReturnTypes -contains $realReturnType;
}
function Test-RouteFilterCRUDMinimalParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$location = Get-ProviderLocation "Microsoft.Network/routeFilters";
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "New-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
$vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$removeRouteFilter = Remove-AzRouteFilter -ResourceGroupName $rgname -Name $rname -PassThru -Force;
Assert-AreEqual $true $removeRouteFilter;
Assert-ThrowsContains { Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname } "not found";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-RouteFilterCRUDAllParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$location = Get-ProviderLocation "Microsoft.Network/routeFilters";
$Tag = @{tag1='test'};
$TagSet = @{tag2='testSet'};
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location -Tag $Tag;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "New-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
Assert-AreEqualObjectProperties $Tag $vRouteFilter.Tag;
$vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
Assert-AreEqualObjectProperties $Tag $vRouteFilter.Tag;
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$vRouteFilter.Tag = $TagSet;
$vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "Set-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
Assert-AreEqualObjectProperties $TagSet $vRouteFilter.Tag;
$vRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteFilter;
Assert-True { Check-CmdletReturnType "Get-AzRouteFilter" $vRouteFilter };
Assert-AreEqual $rname $vRouteFilter.Name;
Assert-AreEqualObjectProperties $TagSet $vRouteFilter.Tag;
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName $rgname;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter;
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteFilter = Get-AzRouteFilter -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteFilter | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$removeRouteFilter = Remove-AzRouteFilter -ResourceGroupName $rgname -Name $rname -PassThru -Force;
Assert-AreEqual $true $removeRouteFilter;
Assert-ThrowsContains { Get-AzRouteFilter -ResourceGroupName $rgname -Name $rname } "not found";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-RouteFilterRuleCRUDMinimalParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$rnameAdd = "${rname}Add";
$location = Get-ProviderLocation "Microsoft.Network/routeFilters";
$AccessSet = "Deny";
$RouteFilterRuleTypeSet = "Community";
$CommunityListSet = @("12076:5010","12076:5040");
$AccessAdd = "Allow";
$RouteFilterRuleTypeAdd = "Community";
$CommunityListAdd = @("12076:5040");
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$vRouteFilter = New-AzRouteFilter -ResourceGroupName $rgname -Name $rname -Location $location;
Assert-NotNull $vRouteFilter;
$vRouteFilter = Add-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessAdd -RouteFilterRuleType $RouteFilterRuleTypeAdd -CommunityList $CommunityListAdd -Force;
Assert-NotNull $vRouteFilter;
$vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force;
Assert-NotNull $vRouteFilter;
$vRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd;
Assert-NotNull $vRouteFilterRule;
Assert-True { Check-CmdletReturnType "Get-AzRouteFilterRuleConfig" $vRouteFilterRule };
Assert-AreEqual $rnameAdd $vRouteFilterRule.Name;
Assert-AreEqual $AccessAdd $vRouteFilterRule.Access;
Assert-AreEqualArray $CommunityListAdd $vRouteFilterRule.Communities;
$listRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter;
Assert-NotNull ($listRouteFilterRule | Where-Object { $_.Name -eq $rnameAdd });
Assert-ThrowsContains { Add-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessAdd -RouteFilterRuleType $RouteFilterRuleTypeAdd -CommunityList $CommunityListAdd -Force } "already exists";
$vRouteFilter = Set-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessSet -RouteFilterRuleType $RouteFilterRuleTypeSet -CommunityList $CommunityListSet -Force;
Assert-NotNull $vRouteFilter;
$vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force;
Assert-NotNull $vRouteFilter;
$vRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd;
Assert-NotNull $vRouteFilterRule;
Assert-True { Check-CmdletReturnType "Get-AzRouteFilterRuleConfig" $vRouteFilterRule };
Assert-AreEqual $rnameAdd $vRouteFilterRule.Name;
Assert-AreEqual $AccessSet $vRouteFilterRule.Access;
Assert-AreEqualArray $CommunityListSet $vRouteFilterRule.Communities;
$listRouteFilterRule = Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter;
Assert-NotNull ($listRouteFilterRule | Where-Object { $_.Name -eq $rnameAdd });
$vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd -Force;
$vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rname -Force;
$vRouteFilter = Remove-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rname -Force;
$vRouteFilter = Set-AzRouteFilter -RouteFilter $vRouteFilter -Force;
Assert-NotNull $vRouteFilter;
Assert-ThrowsContains { Get-AzRouteFilterRuleConfig -RouteFilter $vRouteFilter -Name $rnameAdd } "Sequence contains no matching element";
Assert-ThrowsContains { Set-AzRouteFilterRuleConfig -Name $rnameAdd -RouteFilter $vRouteFilter -Access $AccessSet -RouteFilterRuleType $RouteFilterRuleTypeSet -CommunityList $CommunityListSet -Force } "does not exist";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
|
combined_dataset/train/non-malicious/sample_50_94.ps1 | sample_50_94.ps1 | # Instructions: select the entire file and hit F8 to
# load the extensions. To see the list of registered
# extensions and run them, hit Ctrl+Shift+P, type 'addi'
# and run the "Show additional commands from PowerShell modules"
# command. A quick pick list will appear with all 3
# extensions registered. Selecting one of them will launch it.
function Invoke-MyCommand {
Write-Output "My command's function was executed!"
}
# Registering a command for an existing function
Register-EditorCommand -Verbose `
-Name "MyModule.MyCommandWithFunction" `
-DisplayName "My command with function" `
-Function Invoke-MyCommand
# Registering a command to run a ScriptBlock
Register-EditorCommand -Verbose `
-Name "MyModule.MyCommandWithScriptBlock" `
-DisplayName "My command with script block" `
-ScriptBlock { Write-Output "My command's script block was executed!" }
# A real command example:
function Invoke-MyEdit([Microsoft.PowerShell.EditorServices.Extensions.EditorContext]$context) {
# Insert text at pre-defined position
$context.CurrentFile.InsertText(
"`r`n# I was inserted by PowerShell code!`r`nGet-Process -Name chrome`r`n",
35, 1);
# TRY THIS ALSO, comment out the above 4 lines and uncomment the below
# # Insert text at cursor position
# $context.CurrentFile.InsertText(
# "Get-Process -Name chrome",
# $context.CursorPosition);
}
# After registering this command, you only need to re-evaluate the
# Invoke-MyEdit command when you've made changes to its code. The
# registration of the command persists.
Register-EditorCommand -Verbose `
-Name "MyModule.MyEditCommand" `
-DisplayName "Apply my edit!" `
-Function Invoke-MyEdit `
-SuppressOutput
# SIG # Begin signature block
# MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKCVuBpz/9fSz2
# LkJkxdMUtP5fMDok/d1ZAAsMYDBC16CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB03zVg1EZOFP9qimPsOXecJBmmRa+ue
# o6iDn29NyPTGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# vLabdK3Ngn6j8gC3+2GSQ4XVPp+iylF8Ik91hQnOyHXob2xwubQme7oqBYcuYLQ+
# fdRcecNWiXAIWU7oRFK5H2JDxqvo+8SL+hLJFxqF3OKosGHB/HsABc32mYUR7yHU
# 0rspK2Vf89PkVHEEF1GOomBxd64cCTYfugGhAYghnjTp0zP6/APpKWZCK5do3hOm
# JfAbjk+ZMVZG6aG+VuLz3j11Bnxxe3baDK7kT+7VuCG/0mYQ6gMbdn8XkmjjbzmX
# h+xeM3zOj4tFt3ZeBZdbyUoh08+Sr53GvqdRj4/AaOAdcJsZ5o4hPge3R7qOt8uF
# 8R2fqrPnFqwMdm/Ms/kXk6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG
# SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCB04tT+ryqpT0PkjNiZsLcsG5fZeMua9SaAGmUbUEp36AIGZfLh38qNGBMyMDI0
# MDQwMzIyNTgxNi41ODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH
# IDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0y
# NTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn
# +8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1
# QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r0
# 1TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XI
# jiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/M
# sXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoq
# BYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx
# 6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCe
# tluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK
# 9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW
# 7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPh
# wGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopkl
# beGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5Q
# cLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w11
# 9b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUG
# MCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gH
# VSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KO
# EZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHO
# iOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRse
# dSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivd
# tnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6V
# NzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9
# EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6be7PjAiGA8yMDI0MDQwMzExMjU1MFoYDzIw
# MjQwNDA0MTEyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt7s+AgEAMAcC
# AQACAgCFMAcCAQACAhPwMAoCBQDpuQy+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG
# CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL
# BQADggEBAGOEGg2aN3xyURELmw+L+GX8p2GLWI15sn26L5zZ1RCMYvrrEPzbIkBT
# j1NL0yFvaXLZb68bd179ylRdRB49JdGqFq0JlXlDpduzp+W9aX4OsZcimqvnX/aV
# v8vpwR0bkwQiF36Wlw3TXbw2aZdv/KnRY/COKkaoKxQxC9rgkNw5MLAx+GJfJFYx
# lMwxRj+jQkox5WIar2zQ+etv9rPjBrUmC2eDaY7gc8q8+3N/aVk/bE/j6LWpX5d5
# zJSjmZLTCPvHFakF75DP7NBXDK6u3RQgxwqvcQBdP3SXpw0P72aW5NEI3EAbdjiL
# caVi+qcCb/mHcVEsE/IQWfbRiTzLslgxggQNMIIECQIBATCBkzB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgB
# ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3
# DQEJBDEiBCDNCWGCzfIrA9N+zcL27cwrudw3OcTleAwfuoLHeAm1QzCB+gYLKoZI
# hvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWUL
# ejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAHs4CukgtCRUoAAAQAAAewwIgQgKz3kSreOLui1ENgzHV9zHDupRYY2KLepgApY
# ryRPCEkwDQYJKoZIhvcNAQELBQAEggIACGwAAWohkjXDa4Bk5l94d/ydvTbRzZAL
# mKtXmzmTYuMNNKdgr4Rqb1cx7IdZONqr5X/QCoeZXuIM7/HJPvpY2PhIht1PFaL5
# eV9K9LUslCqk7T1s5zqlnvwgsn20UBTMFTHMFXYmP3pSuo8aWcFAyteLAlaBV5V4
# ImA5bburJPlJC7DbMpMGaSOWBvZFUgek+mJZu44XfUC9K/HKLPwPhoKXZ3hCuzfX
# ZWctgwtkjZ6J1qGM3o3QUb38hBduvqTuje56HppoKQxHZ+gN0l30uwhMWGWDgxLO
# 0DhSXaqxm/Eu49S8DY2F8jRbW1WOzW0LveCbeUzdd5MJ1ftClmnQdwELWPtKDkkP
# MpmMg2l5rGPIErntb4ObeRk1Q4EEnOvk8jVSwsD4Wi6+ThbNoyNwJrxDdUC3e252
# oVG8n3/cqgKb9FhH1+PiuTcgaXVIPCueAJP+7185C2kWAANzKr+cBUVCNnKDEvRw
# FB1sISxojAbc8ioUnmXgSe0N+rLCM29x+PqKMSmIxJtKtv8761hTMBrWFssmkn+l
# SJQt2fTUJcjdtXtRdHaKwMsgdcicfXdrqExm9FZ2s9WDmRHUJpSAV9zFrKn88M4g
# x2yjnmiiszntlwOD5T4urblxzorRN3agJQumDh09qUXEqQqRRmgO3dsNusjJLt+L
# 3ajyFGHGK3Q=
# SIG # End signature block
|
combined_dataset/train/non-malicious/221.ps1 | 221.ps1 | function Get-SCSMWorkItemParent
{
[CmdletBinding()]
PARAM (
[Parameter(ParameterSetName = 'GUID', Mandatory)]
[Alias('ID')]
$WorkItemGUID,
[Parameter(ParameterSetName = 'Object', Mandatory)]
$WorkItemObject
)
BEGIN
{
IF (-not (Get-Module -Name Smlets))
{
TRY
{
Import-Module -Name smlets -ErrorAction Stop
}
CATCH
{
Write-Error -Message "[BEGIN] Error importing smlets"
$Error[0].Exception.Message
}
}
ELSE {Write-Verbose -Message "[BEGIN] Smlets module already loaded"}
}
PROCESS
{
TRY
{
IF ($PSBoundParameters['WorkItemGUID'])
{
Write-Verbose -Message "[PROCESS] Retrieving WorkItem with GUID"
$ActivityObject = Get-SCSMObject -id $WorkItemGUID
}
IF ($PSBoundParameters['WorkItemObject'])
{
Write-Verbose -Message "[PROCESS] Retrieving WorkItem with SM Object"
$ActivityObject = Get-SCSMObject -id $WorkItemObject.get_id()
}
Write-Verbose -Message "[PROCESS] Activity: $($ActivityObject.name)"
Write-Verbose -Message "[PROCESS] Retrieving WorkItem Parent"
$ParentRelationshipID = '2da498be-0485-b2b2-d520-6ebd1698e61b'
$ParentRelatedObject = Get-SCSMRelationshipObject -ByTarget $ActivityObject | Where-Object{ $_.RelationshipId -eq $ParentRelationshipID }
$ParentObject = $ParentRelatedObject.SourceObject
Write-Verbose -Message "[PROCESS] Activity: $($ActivityObject.name) - Parent: $($ParentObject.name)"
If ($ParentObject.ClassName -eq 'System.WorkItem.ServiceRequest' -OR $ParentObject.ClassName -eq 'System.WorkItem.ChangeRequest' -OR $ParentObject.ClassName -eq 'System.WorkItem.ReleaseRecord' -OR $ParentObject.ClassName -eq 'System.WorkItem.Incident')
{
Write-Verbose -Message "[PROCESS] This is the top level parent"
Write-Output $ParentObject
}
Else
{
Write-Verbose -Message "[PROCESS] Not the top level parent. Running Get-SCSMWorkItemParent against this object"
Get-SCSMWorkItemParent -WorkItemGUID $ParentObject.id.guid
}
}
CATCH
{
Write-Error -Message $Error[0].Exception.Message
}
}
END
{
remove-module -Name smlets -ErrorAction SilentlyContinue
}
} |
combined_dataset/train/non-malicious/sample_25_27.ps1 | sample_25_27.ps1 | Get-Module | ForEach-Object { Remove-Module -Name $_.Name -Force }
$PSModuleAutoloadingPreference = 'none'
Import-Module Microsoft.PowerShell.Utility
#Enforcing default PSModulePath to avoid getting unexpected modules to run instead of built-in modules
$env:PSModulePath = "C:\Program Files\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules"
$resultOutputDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDEClientAnalyzerResult"
function CheckAuthenticodeSignature($pathToCheck) {
if (test-path $resultOutputDir -ErrorAction SilentlyContinue) {
$issuerInfo = "$resultOutputDir\issuerInfo.txt"
} else {
$issuerInfo = "$PSScriptRoot\issuerInfo.txt"
}
if ($pathToCheck) {
if (Test-Path -path $pathToCheck -ErrorAction SilentlyContinue) {
$AuthenticodeSig = (Get-AuthenticodeSignature -FilePath $pathToCheck)
$cert = $AuthenticodeSig.SignerCertificate
$FileInfo = (get-command $pathToCheck).FileVersionInfo
$issuer = $cert.Issuer
#OS is older than 2016 and some built-in processes will not be signed
if (($OSBuild -lt 14393) -and (!$AuthenticodeSig.SignerCertificate)) {
if (($FileInfo.CompanyName -eq "Microsoft Corporation")) {
return
}
else {
Write-Error "Script execution terminated because a process or script that does not have any signature was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
}
#check if valid
if ($AuthenticodeSig.Status -ne "Valid") {
Write-Error "Script execution terminated because a process or script that does not have a valid Signature was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
#check issuer
if (($issuer -ne "CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US") -and ($issuer -ne "CN=Microsoft Development PCA 2014, O=Microsoft Corporation, L=Redmond, S=Washington, C=US")) {
Write-Error "Script execution terminated because a process or script that is not Microsoft signed was detected" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
if ($AuthenticodeSig.IsOSBinary -ne "True") {
#If revocation is offline then test below will fail
if (!$LegacyOS) {
$IsOnline = (Get-NetConnectionProfile).IPv4Connectivity -like "*Internet*"
}
$EKUArray = @('1.3.6.1.5.5.7.3.3', '1.3.6.1.4.1.311.76.47.1')
if ($IsOnline) {
$IsWindowsSystemComponent = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.10.3.6" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable OsCertWarnVar -ErrorVariable OsCertErrVar)
$IsMicrosoftPublisher = (Test-Certificate -Cert $cert -EKU "1.3.6.1.4.1.311.76.8.1" -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable MsPublisherWarnVar -ErrorVariable MsPublisherErrVar)
$TrustedEKU = (Test-Certificate -Cert $cert -EKU $EKUArray -ErrorAction SilentlyContinue -WarningAction SilentlyContinue -WarningVariable EKUWarnVar -ErrorVariable EKUErrVar)
if (($IsWindowsSystemComponent -eq $False) -and ($IsMicrosoftPublisher -eq $False) -and ($TrustedEKU -eq $False)) {
#Defender AV and some OS processes will have an old signature if older version is installed
#Ignore if cert is OK and only signature is old
if (($OsCertWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($MsPublisherWarnVar -like "*CERT_TRUST_IS_NOT_TIME_VALID*") -or ($OsCertWarnVar -like "*CERT_TRUST_IS_OFFLINE_REVOCATION*") -or ($MsPublisherWarnVar -like "CERT_TRUST_IS_OFFLINE_REVOCATION")) {
return
}
Write-Error "Script execution terminated because the process or script certificate failed trust check" | Out-File $issuerInfo -append
$pathToCheck | Out-File $issuerInfo -append
$AuthenticodeSig | Format-List * | Out-File $issuerInfo -append
$cert | Format-List * | Out-File $issuerInfo -append
[Environment]::Exit(1)
}
}
}
}
else {
Write-Error ("Path " + $pathToCheck + " was not found") | Out-File $issuerInfo -append
}
}
}
function Download-WebFile($ClientAnalyzer) {
Write-host -ForegroundColor Green "Downloading MDEClientAnalyzer from: " $ClientAnalyzer
Import-Module BitsTransfer
$BitsJob = Start-BitsTransfer -source $ClientAnalyzer -Destination "$DlZipFile" -Description "Downloading additional files" -RetryTimeout 60 -RetryInterval 60 -ErrorAction SilentlyContinue
}
[int]$OSBuild = [system.environment]::OSVersion.Version.Build
if ($OSBuild -le "7601") {
$LegacyOS = "True"
}
$DownloadDir = "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads"
$DlZipFile = Join-Path $DownloadDir "MDEClientAnalyzerPreview.zip"
$MDECADir = Join-Path $DownloadDir "MDECA"
CheckAuthenticodeSignature $MyInvocation.MyCommand.Path
if (!(test-path -path "$DlZipFile")) {
Download-WebFile "https://aka.ms/betamdeanalyzer"
}
if (test-path -path "$DlZipFile") {
if (Test-Path -LiteralPath $MDECADir -PathType Container) {
Remove-Item -LiteralPath $MDECADir -Recurse -Force -ErrorAction SilentlyContinue
}
[System.Reflection.Assembly]::LoadWithPartialName("system.IO.Compression.FileSystem") | Out-Null
[System.IO.Compression.ZipFile]::ExtractToDirectory($DlZipFile, $MDECADir) | Out-Null
CheckAuthenticodeSignature "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1"
&powershell -ExecutionPolicy Bypass "& 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzer.ps1' -outputDir 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA' -r -l -m 1"
}
# SIG # Begin signature block
# MIIn4AYJKoZIhvcNAQcCoIIn0TCCJ80CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3nJhXJGgP85p+
# OmbJH5rke7yGsf4fz/Egp/q9wQG2xKCCDZcwggYVMIID/aADAgECAhMzAAADz7d0
# vUQxddCTAAAAAAPPMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwMjIyMTkwNzUzWhcNMjUwMjE5MTkwNzUzWjCBlDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj
# cm9zb2Z0IFdpbmRvd3MgRGVmZW5kZXIgQWR2YW5jZWQgVGhyZWF0IFByb3RlY3Rp
# b24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwAPmxMmR9a92NX/Lv
# 2PmaySDZqZUANxu28n+GqAuhMRrC8/v5HrKeebKt+6wqnp28fO1jvJ5OlBIrirN7
# KUiSUH86mvByCFnIwIkKcusZbgEF+v15S0jRExa5C9lC+kDVYtlSCnPEdx/tkKLN
# QQMmSroC3baj7y0WIvBfZ1l4x2qyDhFC/5plmMfD8TSfl3sN4twBiXAcpJ/SES50
# QbLahl/MTsVA2UEo7ygPJIrmci8wvD0Kt1pfkwbB3eiK4Vatr0VoJujRucjGT322
# m/9vH6p4Y5suUJMo9196/ze8hA8bqH+5NdU+DeRLrV/UzVat1Xs/Wm6kPK8GgTPL
# H+M9AgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBggrBgEFBQcDAwYKKwYBBAGCN0wv
# ATAdBgNVHQ4EFgQU10vjUl0bvgJvpCFtGT8ECb23+CAwRQYDVR0RBD4wPKQ6MDgx
# HjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMNNDUxODk0
# KzUwMjA2OTAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8E
# TTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9N
# aWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBR
# BggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAw
# DQYJKoZIhvcNAQELBQADggIBAHcmfqgz/boPmZhEOAtYI5wj3mRicbSQwDQcGZfK
# 8I1WdILE80dhNGqgtVvxO5v5/PyjBJY5HV9HxxCzdVVj60PYAwzoyfTIZF+0hPrh
# l6JkjfckCiy9qsONVkL6SDJH6a+Xf4penA2ge9WM3XLR5BUQH538wx4w+VswV1QX
# hKsAMGAvxBG8EzIFTMRXMoKy/RYZ1FSig96mdJRb9Zh4o37XcyAgSxlbiv50vu3X
# MGNXRZJY0/PdB6Du55mI0WfJDaKBJuDShBMLOjDRX8UEWjy3rqGTjVVLYhK4mWq6
# I/1bIZlgkKBFnUMFbVvtSWDP13FgyGIVDk5YB5s2XmSC6hTfXAHakSpLfFeZ1VK5
# /pRMdhxEenleDdsgksd9idt+U7YxgjZ6gfdGuWgj9ZNi8Ef4ILoA5fkUGIIP14a7
# j2SUsaYvJKw/5aiVHRza+Q9gbDpNcsR5WbhhcSAnkFmi7ZkmJKHVlkUqAUDbP8WB
# yz/bq6m/HCHELfFfsG4HMvOfLSTVhKfXPptRzN4N5m2AZX423KM2zhqzPjCWNWce
# /jqhUKtbyMuPPqqo+eaoYi+ZzaEqirxAmPF6Nz3VIncZppzm451L2Uu05NwN1T5m
# ZbiGW2WW1Iz50ofUKACCqThHMtSh4fOdq0OiKaqQz3S5BGdoXdPPOKgXxOtfaMpr
# C3SrMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj
# cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4
# MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBD
# QSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3Y
# bqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUB
# FDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnbo
# MlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT
# +OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuy
# e4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEh
# NSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2
# z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3
# s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78Ic
# V9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E
# 11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5P
# M4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcV
# AQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3
# FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf
# BgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBL
# hklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS
# b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggr
# BgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsG
# AQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwA
# ZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0G
# CSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDB
# ZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc
# 8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYq
# wooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu
# 5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWI
# UUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXh
# j38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yH
# PgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtI
# EJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4Guzq
# N5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgR
# MiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQ
# zTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEC
# EzMAAAPPt3S9RDF10JMAAAAAA88wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcN
# AQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUw
# LwYJKoZIhvcNAQkEMSIEIGV7NBTufEUl5Ru9UIwKnoHjV3qRHoKO+4j4bZaGGHV+
# MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEArnigk1ZK5oNv
# EeXKK4NMSvGcWqO7aPrZgPj1EuqyJgM/y48h2Ev8OPBHJn0A90BSsFdFAewf2kEi
# rypl6hYzT7V/5bh3QqJTnQ/boMYefrl6whwGLm+IordBgXkOw69Bbc8QTVAjpbH+
# YrS2bw+9jsHS175LMzq8Lsbpb+aPhZeW1AOQ367GOzJ9HXfvLVeQAenAEZyIlR4R
# m3D9gADqFBAZk0HY3kfFjboZJgkFjAum/dBL4fMbef5OZhs08EjxHkmjeIJ//Rwj
# j2wSQmi1DjMW1LvmWQUOKOuYy1Z4msyh16j+VNsZmvyOrwtPziRLKi/nctVX9D9v
# i6Xy6tK4tKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCC
# FwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgE
# ggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBHbWzexa2x
# lwQXmKcEmvbvOHOJ/y0efKt3MT0h6XsLaQIGZjOpdOv6GBMyMDI0MDUxMjExMDcz
# NS45ODZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z
# IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3
# MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycw
# ggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUw
# MTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk
# MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWe
# EokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dV
# ZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9
# p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32F
# suQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru
# 2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q
# 2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSn
# ocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny
# 53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz60
# 4BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0
# jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BF
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs
# 4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5
# /lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzb
# iliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9
# NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiI
# QzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6
# vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqU
# rVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp
# +FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdE
# Di5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4a
# kawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/he
# MWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQw
# ggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM
# aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzEl
# MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO
# AwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnqrUgwIhgPMjAyNDA1
# MTIxMDUxNTJaGA8yMDI0MDUxMzEwNTE1MlowdDA6BgorBgEEAYRZCgQBMSwwKjAK
# AgUA6eqtSAIBADAHAgEAAgIaRzAHAgEAAgIRlTAKAgUA6ev+yAIBADA2BgorBgEE
# AYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYag
# MA0GCSqGSIb3DQEBBQUAA4GBAJoUb9BVoeUB8yxqNHf6CZJPKGtAmsvJZOyWh75c
# tT/LeVZLu0LIn4UAtFw6SBNFvkNTffHIFtaRrGT8Rjo+5UoS3SkyRJBPViWXIxjz
# vQrRA+y2yo7wCrO0PollTLwMvUW0lucnQWCE8GgkpAI9DILxdC7raE03e6ThAl9f
# owdVMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3
# DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgc+/g3O2iq8B25ife
# rWdfFVxzb109yIz0U0kbQDDrGrUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9
# BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMCIE
# IPXdjtHIt5Eymq/iyJBvTL9wg4f2puij54jMtpXRjDDLMA0GCSqGSIb3DQEBCwUA
# BIICAGQMmh9y0ENxKOfDESiRlJ2jmf0fDj0cZhKi+ZQjs2nY4yUpCUoovLy6BUyx
# N2yhEqC8J488YLdygHFcSVmT+PdmOJ176X3/Wha1xLsZGuNShWRoV2qWn+ZmCaYd
# p6fZZusxvbF//k/N1mU6m+BaC1K/QNSw4aldfg6lZsE1NQOX1jKqmi94evej2tLh
# GlN/wcj8QqcsFyGbwEw78VZrUgRoxQrKb0MmZo3kQsJZfCcksGEIUjgAdNPdbnOV
# 8DJL2pFtNU5RA8cIEAhIMMoIcbFNgN36v8b4vBtHY3WCJgvaVLGosz50Wh1MBO60
# 8cVYWbgmfy7WxW1WKYVGHWfQW/MiCIgRVNNm3fhjTkyzB4dX8Kf6vAscsSZ+U/6c
# emis5CFml/ipzDe1o1tKdsquRXUrEsJEbE83hHncxVQgFRb34RXAtn6mqvZgsO8V
# O8lAK97X8qkyUpyHsClsIqqYlE6n7NnpoxSQtuuyBahgA2y0oEKO7o19JiS/94fe
# BP4LTtrqguAfEKOB/wfFhjEIQA+DT6n9rLrJqy7xw0TygipKO0/6hkWSeJXL5wHr
# HEOj10FYLROigDz/5UetRa6kliDJlQyny9ZEciyiVPDTU1SgY2U2uSLgmztWKCR9
# rLEVnuMDL+r/4+GjNmcnzSr1EOkBJiFa8HDOj7/dVtr/puJn
# SIG # End signature block
|
combined_dataset/train/non-malicious/2733.ps1 | 2733.ps1 |
[CmdletBinding()]
Param (
[Parameter(Mandatory=$false)]
[switch]$AllEvents
)
if ($AllEvents)
{
Write-Warning "Running this script in 'AllEvents' mode is not recommended as it returns a significant amount of unnecessary data."
Start-Sleep -Seconds 1
Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational" | `
Select-Object -Property TimeCreated, LogName, Id, Version, ProcessId, ThreadId, MachineName, UserId, Message
}
else
{
$RawEvents = Get-WinEvent -LogName "Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational" | `
Where-Object { $_.Id -eq 1149 }
$RawEvents | ForEach-Object `
{
if ($_.Properties.Count -lt 3)
{
Write-Warning "Event record missing expected fields. Skipping extended processing."
$_ | Select-Object -Property TimeCreated, LogName, Id, Version, ProcessId, ThreadId, MachineName, UserId
continue
}
$User = $_.Properties[0].Value
$Domain = $_.Properties[1].Value
$SourceIp = $_.Properties[2].Value
$NormalizedUser = ("{1}\{0}" -f $User, $Domain)
$Message = $_.Message.Split("`n")[0]
$PropertyBag = @{
TimeCreated = $_.TimeCreated;
LogName = $_.LogName;
Id = $_.Id;
Version = $_.Version;
ProcessId = $_.ProcessId;
ThreadId = $_.ThreadId;
MachineNae = $_.MachineName;
UserId = $_.UserId;
UserName = $NormalizedUser;
SourceIp = $SourceIp;
Message = $Message
}
$o = New-Object -TypeName PSCustomObject -Property $PropertyBag
$o
}
} |
combined_dataset/train/non-malicious/961.ps1 | 961.ps1 |
$rgName='MyResourceGroup'
$location='eastus'
$cred = Get-Credential -Message 'Enter a username and password for the virtual machine.'
New-AzResourceGroup -Name $rgName -Location $location
$fesubnet = New-AzVirtualNetworkSubnetConfig -Name 'MySubnet-FrontEnd' -AddressPrefix '10.0.1.0/24'
$besubnet = New-AzVirtualNetworkSubnetConfig -Name 'MySubnet-BackEnd' -AddressPrefix '10.0.2.0/24'
$vnet = New-AzVirtualNetwork -ResourceGroupName $rgName -Name 'MyVnet' -AddressPrefix '10.0.0.0/16' `
-Location $location -Subnet $fesubnet, $besubnet
$rule1 = New-AzNetworkSecurityRuleConfig -Name 'Allow-HTTP-ALL' -Description 'Allow HTTP' `
-Access Allow -Protocol Tcp -Direction Inbound -Priority 100 `
-SourceAddressPrefix Internet -SourcePortRange * `
-DestinationAddressPrefix * -DestinationPortRange 80
$rule2 = New-AzNetworkSecurityRuleConfig -Name 'Allow-HTTPS-All' -Description 'Allow HTTPS' `
-Access Allow -Protocol Tcp -Direction Inbound -Priority 200 `
-SourceAddressPrefix Internet -SourcePortRange * `
-DestinationAddressPrefix * -DestinationPortRange 443
$rule3 = New-AzNetworkSecurityRuleConfig -Name 'Allow-RDP-All' -Description 'Allow RDP' `
-Access Allow -Protocol Tcp -Direction Inbound -Priority 300 `
-SourceAddressPrefix Internet -SourcePortRange * `
-DestinationAddressPrefix * -DestinationPortRange 3389
$nsg = New-AzNetworkSecurityGroup -ResourceGroupName $RgName -Location $location `
-Name "MyNsg-FrontEnd" -SecurityRules $rule1,$rule2,$rule3
Set-AzVirtualNetworkSubnetConfig -VirtualNetwork $vnet -Name 'MySubnet-FrontEnd' `
-AddressPrefix 10.0.1.0/24 -NetworkSecurityGroup $nsg
$rule1 = New-AzNetworkSecurityRuleConfig -Name 'Deny-Internet-All' -Description "Deny all Internet" `
-Access Allow -Protocol Tcp -Direction Outbound -Priority 100 `
-SourceAddressPrefix * -SourcePortRange * `
-DestinationAddressPrefix Internet -DestinationPortRange *
$nsg = New-AzNetworkSecurityGroup -ResourceGroupName $RgName -Location $location `
-Name "MyNsg-BackEnd" -SecurityRules $rule1
Set-AzVirtualNetworkSubnetConfig -VirtualNetwork $vnet -Name 'MySubnet-backEnd' `
-AddressPrefix 10.0.2.0/24 -NetworkSecurityGroup $nsg
$publicipvm = New-AzPublicIpAddress -ResourceGroupName $rgName -Name 'MyPublicIp-FrontEnd' `
-location $location -AllocationMethod Dynamic
$nicVMfe = New-AzNetworkInterface -ResourceGroupName $rgName -Location $location `
-Name MyNic-FrontEnd -PublicIpAddress $publicipvm -Subnet $vnet.Subnets[0]
$nicVMbe = New-AzNetworkInterface -ResourceGroupName $rgName -Location $location `
-Name MyNic-BackEnd -Subnet $vnet.Subnets[1]
$vmConfig = New-AzVMConfig -VMName 'myVM' -VMSize Standard_DS2 | `
Set-AzVMOperatingSystem -Windows -ComputerName 'myVM' -Credential $cred | `
Set-AzVMSourceImage -PublisherName 'MicrosoftWindowsServer' -Offer 'WindowsServer' `
-Skus '2016-Datacenter' -Version 'latest'
$vmconfig = Add-AzVMNetworkInterface -VM $vmConfig -id $nicVMfe.Id -Primary
$vmconfig = Add-AzVMNetworkInterface -VM $vmConfig -id $nicVMbe.Id
$vm = New-AzVM -ResourceGroupName $rgName -Location $location -VM $vmConfig
|
combined_dataset/train/non-malicious/1422.ps1 | 1422.ps1 |
function Install-CMsi
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[Alias('FullName')]
[string[]]
$Path,
[Parameter(DontShow=$true)]
[Switch]
$Quiet,
[Switch]
$Force
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( $PSBoundParameters.ContainsKey( 'Quiet' ) )
{
Write-Warning ('Install-CMsi''s `Quiet` switch is obsolete and will be removed in a future major version of Carbon. Installers are run in quiet mode by default. Please remove usages of the `Quiet` switch.')
}
Get-CMsi -Path $Path |
Where-Object {
if( $Force )
{
return $true
}
$installInfo = Get-CProgramInstallInfo -Name $_.ProductName -ErrorAction Ignore
if( -not $installInfo )
{
return $true
}
$result = ($installInfo.ProductCode -ne $_.ProductCode)
if( -not $result )
{
Write-Verbose -Message ('[MSI] [{0}] Installed {1}.' -f $installInfo.DisplayName,$installInfo.InstallDate)
}
return $result
} |
ForEach-Object {
$msi = $_
if( $PSCmdlet.ShouldProcess( $msi.Path, "install" ) )
{
Write-Verbose -Message ('[MSI] [{0}] Installing from {1}.' -f $msi.ProductName,$msi.Path)
$msiProcess = Start-Process -FilePath "msiexec.exe" -ArgumentList "/quiet","/i",('"{0}"' -f $msi.Path) -NoNewWindow -Wait -PassThru
if( $msiProcess.ExitCode -ne $null -and $msiProcess.ExitCode -ne 0 )
{
Write-Error ("{0} {1} installation failed. (Exit code: {2}; MSI: {3})" -f $msi.ProductName,$msi.ProductVersion,$msiProcess.ExitCode,$msi.Path)
}
}
}
}
Set-Alias -Name 'Invoke-WindowsInstaller' -Value 'Install-CMsi'
|
combined_dataset/train/non-malicious/sample_65_88.ps1 | sample_65_88.ps1 | ]Ограничението PrintAllTranslations не може да се използва с ограничението IgnoreTranslations. Не можете да добавите изчислената колона „%{oii_column/}“ към хибридната таблица „%{oii_table/}“. Моля, премахнете изчислената колона.Не можете да добавяте колона „alternateOf“, използвана за агрегации, към хибридната таблица „%{oii_table/}“. Моля, премахнете колоната „alternateOf“.ýНе можете да създадете колона „alternateOf“, използвана за агрегации, която се позовава на хибридната таблица „%{oii_baseTable/}“ като своя BaseTable. Или направете препратка към базова таблица в режим DirectQuery, или премахнете колоната „alternateOf“.|Не можете да създадете няколко дяла в режим DirectQuery за таблицата „%{oii_table/}“. Поддържа се само един DirectQuery дял.åНе можете да създадете дял върху хибридна таблица „%{oii_table/}“ от тип entity, която се позовава на друг набор от данни на Power BI, SAP или Azure Analysis services (AAS) като източник на DirectQuery. Моля, премахнете този дял.ǮНе можете да конфигурирате таблица „%{oii_table/}“ като таблица с инкрементално обновяване и с разделение в реално време, тъй като изразът на заявката за данни се позовава на източници на данни „%d{datasourceNumber/}“. Една таблица с инкрементално обновяване и разделение в реално време може да използва само един източник на данни. Моля, модифицирайте израза на таблицата, за да използва само един източник на данни. Вижте https://go.microsoft.com/fwlink/?linkid=2172127, за да научите повече.^Свойството на "%{property/}" в обект ChangedProperty за тип родител "%{type/}" е несъвместимо.jArtifactType на "%{ArtifactType/}" в обект ExcludedArtifact за тип родител "%{parentType/}" е несъвместим.ZВече има обект FormatString changedProperty в колекцията, а дубликатите вече са разрешени.UВече има обект Caption changedProperty в колекцията, а дубликатите вече са разрешени.YВече има обект Description changedProperty в колекцията, а дубликатите вече са разрешени.[Вече има обект DisplayFolder changedProperty в колекцията, а дубликатите вече са разрешени.Таблицата с подробни данни „%{oii_table/}“ на alternateOf, която не е groupby (например Sum/Min/Max), трябва да е таблица на DirectQuery.Таблицата за агрегация „%{oii_table/}“ не може да бъде в режим DirectQuery, когато таблицата с подробни данни „%{oii_basetable/}“ е в двоен режим. |
combined_dataset/train/non-malicious/sample_47_62.ps1 | sample_47_62.ps1 | #
# Module manifest for module 'OCI.PSModules.Analytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Analytics.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '88b806b7-e2b4-4102-95eb-65f27d654438'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Analytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Analytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAnalyticsInstance', 'Get-OCIAnalyticsInstancesList',
'Get-OCIAnalyticsPrivateAccessChannel',
'Get-OCIAnalyticsWorkRequest',
'Get-OCIAnalyticsWorkRequestErrorsList',
'Get-OCIAnalyticsWorkRequestLogsList',
'Get-OCIAnalyticsWorkRequestsList',
'Invoke-OCIAnalyticsScaleAnalyticsInstance',
'Invoke-OCIAnalyticsSetKmsKey',
'Move-OCIAnalyticsInstanceCompartment',
'Move-OCIAnalyticsInstanceNetworkEndpoint',
'New-OCIAnalyticsInstance', 'New-OCIAnalyticsPrivateAccessChannel',
'New-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsInstance',
'Remove-OCIAnalyticsPrivateAccessChannel',
'Remove-OCIAnalyticsVanityUrl', 'Remove-OCIAnalyticsWorkRequest',
'Start-OCIAnalyticsInstance', 'Stop-OCIAnalyticsInstance',
'Update-OCIAnalyticsInstance',
'Update-OCIAnalyticsPrivateAccessChannel',
'Update-OCIAnalyticsVanityUrl'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Analytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_51_42.ps1 | sample_51_42.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Lists the login credentials for the specified container registry.
.Description
Lists the login credentials for the specified container registry.
.Example
$Cred = Get-AzContainerRegistryCredential -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample"
$Cred.Password
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistryListCredentialsResult
.Link
https://learn.microsoft.com/powershell/module/az.containerregistry/get-azcontainerregistrycredential
#>
function Get-AzContainerRegistryCredential {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.PSContainerRegistryCredential])]
[CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(ParameterSetName='List', Mandatory)]
[Alias('Name')]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')]
[System.String]
# The name of the container registry.
${RegistryName},
[Parameter(ParameterSetName='List', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='GetByRegistry', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistry]
# The Registry Object.
${Registry},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
# The value must be an UUID.
${SubscriptionId},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if ($PSBoundParameters.ContainsKey('Registry')){
$Registry = $PSBoundParameters["Registry"]
$null = $PSBoundParameters.Remove('Registry')
$RegistryName = $Registry.Name
$ResourceGroupName = $Registry.ResourceGroupName
$null = $PSBoundParameters.Add("RegistryName", $RegistryName)
$null = $PSBoundParameters.Add("ResourceGroupName", $ResourceGroupName)
}
$Credential = Az.ContainerRegistry.internal\Get-AzContainerRegistryCredential @PSBoundParameters
$Result = New-Object Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.PSContainerRegistryCredential($Credential)
return $Result
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQKV2VQNdc6QZq
# WAYYieSn8muvQsybj/XAXId1n6iPEKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC+7TxIfbq64tvXsZ4Fdd7lb
# XoaTX1T0pDQSEoIpNBmBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAa471WhRX3OMbTAiNz3xmnsbVn2KsF1l84ggziwzBj+79X6Nh75YUDwC+
# QsOo8ifI/xIsVceDJiMP6/dqMhLuu6EyUWjZ9VMIcya13UJ+ZgOaDI3JRFdbwLxD
# czb1CoJu4hN7CzDU9UpPjbyc6/rz1bTvC9h2Inu3unJBWlRMGYyHbyvufBBj+AYU
# IfxbWXd5mBw++s5989ljXNNLicXqH/SSjfeUm97xTKpHjUJE6G6TmItvAc2RorjE
# J7dtWHEU5/L9m0DQk+KNcfdazxgU506rl68lmvXJAoGoQrZyfy+xrRE34hC0pUdo
# 1y4ovn8DN4VWUciQOpvtzaSgoR2yB6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBSEzcg/1Virsxc4OGNfCrHX+Mh5idqckzuLXQZsfoQdwIGZh+2Ye9P
# GBMyMDI0MDQyMzEzMTYxMy45MjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQyNDE5NDIxOFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgINKjAHAgEAAgIRtjAKAgUA
# 6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAPWsZdCCWsEmxg1OXos
# 5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjAdTjbpz0afi31snq11zCb
# JoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6TpANJGZ4XBHaaFo4pYqZnf
# +r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg8jbTG+9c8DNQqcyDB1zU5OAgUPkd07O8Bmtaqt/HPoIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d
# ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I
# npafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW34zSiELA9VMZ+e/k6ckSa
# MA0GCSqGSIb3DQEBCwUABIICADsQO2TFF5VVdVhn4c8D5yoRNrsMvUVyOfsOusGs
# Q0ZEZuZQ4Sf3oMU17voeNN1H+ejh0EqykEFRDpHjV5vmeWLQkDD9qnRgZNx0gOmH
# tFpIFD9Zc4nsIoe14pPZ+R7TV9viuN4GUp/cREmrFohwHHqTfPWFyC3NXb5fXKoM
# pI73xeGr8t8aqGfNuF5LaQr/gKvcAV8mh3S2aLzLBRMApbiTRF+uJR3dXEKgZZ/g
# 120+hgRRFURcKn0GjvYA0mMHJrZnSeYhnCJEKj8qa+gZ0g7ajwPouEZ3HyGfGwqs
# FRgsejS3m61s5hOFTMoPYCDi+Xvlhilqpn41CnOLz8fqwzfjbYrb6Q3M5MjGHk5p
# 55xvul5AnMd5SKkA47S2A5knJokZWka5aP1NtZjraesqT6iC06Br0NfrG54MyGsU
# +hy6a8CUsF/7HAFAsG10+tNz0z3XL4SADA59iSIqan98PUxhgKWxCjnHHBZXALOO
# kURECAnGPyQlDtR6h8PjTtRinuQN5r6cl3n2tKvXIn4dEH/FKK9Rhdp2Af4xSi81
# 8PO5Aq92oS4N0/TyBuguoAIwphHF0eX0upA8yrUaMzlZQczIu3Y2oWAKNZwcWOhA
# XVxE/kyCxQsxwJBm40/pB+Eh1+QkA+8PluIipnv0xYmdFnvF8uK+PEpVRtnbGYWW
# LdsZ
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_46_92.ps1 | sample_46_92.ps1 | #
# Module manifest for module 'GCArcService'
#
# Generated by: Microsoft
#
# Generated on: 08/09/2020
#
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'GCArcService.psm1'
# Version number of this module.
ModuleVersion = '1.0'
# ID used to uniquely identify this module
GUID = 'c5d905c4-c9a5-4a0a-8115-9216509a36f5'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module is used to install/uninstall Guest Configuration Service.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '2.0'
# Functions to export from this module
FunctionsToExport = @('Install-GCArcService', 'Enable-GCArcService', 'Uninstall-GCArcService', 'Update-GCArcService')
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBECPA5J5/o6uzP
# EAC976FTzZ20v0rLlWThfMKjQi2k+6CCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC55
# tAOOpy5cwx25UWLszMQ4l4N/S9Dkf8RTi9D1E8wwMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAJ4dnW47j82S3qssSsNTfSye8lfAtD+juK9bL
# Iwdt2EMO/JrRjqUbcZapyHJ9GDISNFGjzI7k3LJOubAxEIB/z5DnhpuClQVDJkrL
# lh7AYt/0/jAU7ajmpXpVo66s503Xakcpg79r2zZeoKxLYKjoPUliZQTBY6R/lMsT
# 3n9xKyRjl+P9WJTL73qO2NUTYKNmAKO9HwxYeLtbo91yn8k55FtZdBqcg1icp2Pf
# 1xAG1U2lb3hoOg9wqxHrJ0Gzn/gJGUo7YQeCiER7kNcQYKCORUymRHR56FvkwUqA
# 6m1zOMAt/UrtdIFs4QtU6bEmmPynfDl5S62uxn2AJFvAeV5fYqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBxOjIhQ72mG9pNVZW4DhPGJjHzMdEG/kAW
# UG+p76zRHQIGZhfVc3hdGBMyMDI0MDQxNzE0NDMyNS45OTJaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB
# AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM
# v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO
# GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE
# 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh
# 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj
# UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr
# /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI
# GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP
# kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68
# UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf
# itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74
# BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4
# dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c
# C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk
# 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN
# nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5
# FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun
# bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6
# +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL
# BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj
# ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le
# hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um
# r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5
# 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6co7nDAi
# GA8yMDI0MDQxNzEyMTQyMFoYDzIwMjQwNDE4MTIxNDIwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDpyjucAgEAMAcCAQACAgNnMAcCAQACAhOyMAoCBQDpy40cAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF7SDe/TQWwiwJwefuJ1MvxjtJvJ
# 3vgMIzyR9yGptyKZ6NitqL9XbD90jNQOksndIxTFaOrM/6crO8FurjKlnebgj/w3
# 5LNgSiUD1qUmqmn4QrjSez6CYZNFlOHUaBkwcqADO7QDPsRusJ2VtJCvX15Q4Nh7
# /pJ3ii30WfZmy9x+de7aH3HCwjcril3qXmiDfNvkALV+UQQcmw4bL4XQAjBB50g8
# 0IxI7m0qFEIBzRp3URPIDnvugbeq7Pomd3lk52fWjHdQNYESL/+OIy9U/vC2SfRB
# nEKlkIo8L+hRPe7QTvXal7zYyPDaOyMz96p+155dke0ZJZVRPxgElJpk7c0xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu
# jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCD2gYsH76GrSsvBymlsrGMLdDxV
# a20w81psOQZtTjfzeTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12
# aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgZ+AvDXuL
# UatHjYteJe6L9fJgIwRUMQF6ocnrSbQ+tywwDQYJKoZIhvcNAQELBQAEggIASc/N
# p35O6h4UU+1xHBy11Pz0VQ1X4I7QAD0kgf1tUF3ygun4yFXpkkmxmSMPMNytiU+h
# NEWKPyP5oFfHc2cqvWa0yrFzSGKMn/0eKDXSw2gKhYcIBy8+RuufwcG4s3/FErt4
# ONnLqeN/BUM0vKi7rR21MC7g2AfVL3HCllRdqXy8r2KoKEsxBZnKJkPU2bN12f43
# cmw4gfdnMLpAh2pHLzu2/9AynQcXjNRrHBE8bw/apPKAOUi7OYxWJ1N+ZswZvfFu
# 1ATA/zrynSqRk3nm9Kx3PMB6AdtdGn0HZOsmPsn7l33HSkEgx9SulzCvK6Qp8NjL
# G723NZL56W1bm1bXda5jnUINsxNqobjPtp3T7oZu2/Vj0EUhUoUEyOyk4Oj1a+8C
# S2tzTM1/Ai0b8NIqAJ4OFAF0b9p+T0GT9NRoozzlEBccVwZz1E01oYX4Vc9p20BM
# EvSwkjNUNIKAO8jLEgzHei2xNXQUQwlpnY48DxKcNENQRkxa6sU+M8cvCsRLNuGC
# imsHb01qo0cgW2pPPCCcgjsESIIeh6gUstXFEZ6RsrlVUqDIPvRZ+Y9oqoePJgcx
# VIwcuX4z1Km9byKV2+tBSsO8f3cVqRpaEywASwW81NivE06ZkfJenM/M8zzuq4nR
# G8YvK5OLezpi1GeuJCdMHDv/qblH9LELDAgu2sk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Invoke-RemoteCommand_2.ps1 | Invoke-RemoteCommand_2.ps1 | <#
# Script FileName: func_Invoke-RemoteCommand.ps1
# Current Version: A03
# Description: Run command on a remote computer as the currently logged on user.
# Created By: Adam Listek
# Version Notes
# A01 - Initial Release
# A02 - Conversion to Function
# A03 - Abstracted to generic purpose
#>
Function Global:Invoke-RemoteCommand {
[CmdletBinding(
SupportsShouldProcess=$true,
ConfirmImpact="Low"
)] # Terminate CmdletBinding
Param (
[Parameter(
ValueFromPipeline=$true,
Position=0)]
[String]$computerName = "localhost",
[Parameter(Position=1)][String]$inputCode,
[Parameter(Position=2)][String]$outputFile = "C:\\Temp\\Output.ps1",
[Switch]$passthru
) # Terminate Param
Begin {
If ($MyInvocation.BoundParameters.Verbose -match $true) {
$local:VerbosePreference = "Continue"
$local:ErrorActionPreference = "Continue"
$local:verbose = $true
} Else {
$local:VerbosePreference = "SilentlyContinue"
$local:ErrorActionPreference = "SilentlyContinue"
$local:verbose = $false
} # Terminate If - Verbose Parameter Check
# Define Internal Functions
Function local:Test-AdministratorPrivileges {
Write-Verbose "Get user that script context is being run in."
$identity = [Security.Principal.WindowsIdentity]::GetCurrent()
Write-Verbose "Create a new Security Principal object to retrieve rights."
$principal = new-object Security.Principal.WindowsPrincipal $identity
Write-Verbose "Retrieve if user is currently in an Administrator role."
$result = $principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
If ($result) {
Write-Output $true
} Else {
Write-Output $false
} # Terminate If - Result
} # Terminate Function
# Verify whether the current user context for the function is an Administrator
If (Test-AdministratorPrivileges -Verbose:$verbose) {
Write-Verbose "Function is being run as an Administrator."
} Else {
Write-Host "Current user, {0}, is not an Administrator." `
-F ([Security.Principal.WindowsIdentity]::GetCurrent()) `
-ForegroundColor Red
Break
} # Terminate Test for Administrative Privileges
# Global Variables
$servicePath = "C:\\Temp"
$serviceName = "ps_service"
} # Terminate Begin
Process {
# Required if running in Powershell ISE, will set for the shell also.
If ($MyInvocation.BoundParameters.Debug -match $true) {
# Must be set per pipeline run
$local:DebugPreference = "Continue"
} Else {
$local:DebugPreference = "SilentlyContinue"
} # Terminate If - Debug
$scriptblock = {
Param(
$inputCode,
$outputFile,
$servicePath,
$serviceName
)
# Parse the results of the current sessions using the built-in executable, Query.exe.
$results = c:\\windows\\system32\\query.exe session
# Create object array of Query results
$active = $results | %{
$line = $_.ToString().Split(" ")
$array = $line | Where { $_ -ne "" }
Switch ($array.count) {
3 {
$sessionname = $array[0]
$username = $null
$id = $array[1]
$state = $array[2]
$type = $null
Break
}
4 {
$sessionname = $array[0]
$username = $array[1]
$id = $array[2]
$state = $array[3]
$type = $null
Break
}
5 {
$sessionname = $array[0]
$username = $array[1]
$id = $array[2]
$state = $array[3]
$type = $array[4]
Break
}
} # Terminate Switch
$object = New-Object PSObject -Property @{
sessionname = $sessionname
username = $username
ID = $id
state = $state
type = $type
}
Write-Output $object
} | Where { $_.State -eq "Active" }
If ($active) {
# The data is the local Powershell script that you want to run on the remote system
# Using a HereString @'' (does not parse variables within), @"" (will parse variables)
Write-Verbose $outputFile
Write-Verbose $inputCode
# Generate the script file on the fly on the remote computer
Out-File -FilePath $outputFile -InputObject $inputCode -Encoding ascii
# We want to hide the powershell window and override the execution policy to make sure it runs
$command = "powershell.exe -NonInteractive -WindowStyle hidden -NoLogo -File $outputFile -ExecutionPolicy RemoteSigned"
$serviceDisplayName = "PS Emulate Session"
Write-Verbose $command
Write-Verbose $serviceDisplayName
# The code to actually generate the service
$source = @"
using System;
using System.Text;
using System.Runtime.InteropServices;
using System.ServiceProcess;
using System.Diagnostics;
namespace PS
{
public class Emulate : System.ServiceProcess.ServiceBase {
public Emulate() {
this.ServiceName = "$serviceDisplayName";
}
static void Main(string[] args) {
System.ServiceProcess.ServiceBase.Run(new Emulate());
}
protected override void OnStart(string[] args) {
base.OnStart(args);
EmulateSession.StartProcessInSession($($active.Id), @"$command");
}
protected override void OnStop() {
base.OnStop();
}
public static void WriteToEventLog(string message) {
string cs = "PS_Emulate_Service";
EventLog elog = new EventLog();
if (!EventLog.SourceExists(cs))
{
EventLog.CreateEventSource(cs, "Application");
}
elog.Source = cs;
elog.EnableRaisingEvents = true;
EventLog.WriteEntry(cs, message, EventLogEntryType.Information);
}
}
static public class EmulateSession
{
/* structs, enums, and external functions defined at end of code */
public static System.Diagnostics.Process StartProcessInSession(int sessionID, String commandLine)
{
Emulate.WriteToEventLog("Inside StartProcessInSession");
Emulate.WriteToEventLog("Session ID: " + sessionID.ToString());
IntPtr userToken;
if (WTSQueryUserToken(sessionID, out userToken))
{
//note that WTSQueryUserToken only works when in context of local system account with SE_TCB_NAME
IntPtr lpEnvironment;
Emulate.WriteToEventLog("Token: " + userToken.ToString());
if (CreateEnvironmentBlock(out lpEnvironment, userToken, false))
{
Emulate.WriteToEventLog("User Env: " + lpEnvironment.ToString());
StartupInfo si = new StartupInfo();
si.cb = Marshal.SizeOf(si);
si.lpDesktop = "winsta0\\\\default";
si.dwFlags = STARTF.STARTF_USESHOWWINDOW;
// Using the SW_HIDE will make the window hidden, see in the bottom section for more commands
si.wShowWindow = ShowWindow.SW_HIDE;
ProcessInformation pi;
// Note the CreationFlags, they make this work as it must have both the CREATE_NEW_CONSOLE and CREATE_UNICODE_ENVIRONMENT
if (CreateProcessAsUser(userToken, null, new StringBuilder(commandLine), IntPtr.Zero, IntPtr.Zero, false, CreationFlags.CREATE_NEW_CONSOLE | CreationFlags.CREATE_UNICODE_ENVIRONMENT, lpEnvironment, null, ref si, out pi))
{
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
//context.Undo();
try
{
return System.Diagnostics.Process.GetProcessById(pi.dwProcessId);
}
catch (ArgumentException)
{
// I had to remove the ArgumentException e (I removed the e), it threw up a compiler warning
//The process ID couldn't be found - which is what always happens because it has closed
return null;
}
}
else
{
Emulate.WriteToEventLog("Could Not Create Process.");
int err = Marshal.GetLastWin32Error();
throw new System.ComponentModel.Win32Exception(err, "Could not create process.\\nWin32 error: " + err.ToString());
}
}
else
{
Emulate.WriteToEventLog("Could not create environment block.");
int err = Marshal.GetLastWin32Error();
throw new System.ComponentModel.Win32Exception(err, "Could not create environment block.\\nWin32 error: " + err.ToString());
}
}
else
{
Emulate.WriteToEventLog("No Token");
int err = System.Runtime.InteropServices.Marshal.GetLastWin32Error();
if (err == 1008) return null; //There is no token
throw new System.ComponentModel.Win32Exception(err, "Could not get the user token from session " + sessionID.ToString() + " - Error: " + err.ToString());
}
}
[DllImport("wtsapi32.dll", SetLastError = true)]
static extern bool WTSQueryUserToken(Int32 sessionId, out IntPtr Token);
[DllImport("userenv.dll", SetLastError = true)]
static extern bool CreateEnvironmentBlock(out IntPtr lpEnvironment, IntPtr hToken, bool bInherit);
[DllImport("advapi32.dll", SetLastError = true, CharSet = CharSet.Auto)]
static extern bool CreateProcessAsUser(IntPtr hToken, String lpApplicationName, [In] StringBuilder lpCommandLine, IntPtr /*to a SecurityAttributes struct or null*/ lpProcessAttributes, IntPtr /*to a SecurityAttributes struct or null*/ lpThreadAttributes, bool bInheritHandles, CreationFlags creationFlags, IntPtr lpEnvironment, String lpCurrentDirectory, ref StartupInfo lpStartupInfo, out ProcessInformation lpProcessInformation);
[DllImport("kernel32.dll", SetLastError = true)]
static extern bool CloseHandle(IntPtr hHandle);
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
struct StartupInfo
{
public Int32 cb;
public String lpReserved;
public String lpDesktop;
public String lpTitle;
public Int32 dwX;
public Int32 dwY;
public Int32 dwXSize;
public Int32 dwYSize;
public Int32 dwXCountChars;
public Int32 dwYCountChars;
public Int32 dwFillAttribute;
public STARTF dwFlags;
public ShowWindow wShowWindow;
public Int16 cbReserved2;
public IntPtr lpReserved2;
public IntPtr hStdInput;
public IntPtr hStdOutput;
public IntPtr hStdError;
}
[StructLayout(LayoutKind.Sequential)]
internal struct ProcessInformation
{
public IntPtr hProcess;
public IntPtr hThread;
public int dwProcessId;
public int dwThreadId;
}
/// <summary>
/// The following process creation flags are used by the CreateProcess, CreateProcessAsUser, CreateProcessWithLogonW, and CreateProcessWithTokenW functions. They can be specified in any combination, except as noted.
/// </summary>
[Flags]
enum CreationFlags : int
{
/// <summary>
/// Not specified by MSDN???
/// </summary>
NONE = 0,
/// <summary>
/// The calling thread starts and debugs the new process and all child processes created by the new process. It can receive all related debug events using the WaitForDebugEvent function.
/// A process that uses DEBUG_PROCESS becomes the root of a debugging chain. This continues until another process in the chain is created with DEBUG_PROCESS.
/// If this flag is combined with DEBUG_ONLY_THIS_PROCESS, the caller debugs only the new process, not any child processes.
/// </summary>
DEBUG_PROCESS = 0x00000001,
/// <summary>
/// The calling thread starts and debugs the new process. It can receive all related debug events using the WaitForDebugEvent function.
/// </summary>
DEBUG_ONLY_THIS_PROCESS = 0x00000002,
/// <summary>
/// The primary thread of the new process is created in a suspended state, and does not run until the ResumeThread function is called.
/// </summary>
CREATE_SUSPENDED = 0x00000004,
/// <summary>
/// For console processes, the new process does not inherit its parent's console (the default). The new process can call the AllocConsole function at a later time to create a console. For more information, see Creation of a Console.
/// This value cannot be used with CREATE_NEW_CONSOLE.
/// </summary>
DETACHED_PROCESS = 0x00000008,
/// <summary>
/// The new process has a new console, instead of inheriting its parent's console (the default). For more information, see Creation of a Console.
/// This flag cannot be used with DETACHED_PROCESS.
/// </summary>
CREATE_NEW_CONSOLE = 0x00000010,
/// <summary>
/// The new process is the root process of a new process group. The process group includes all processes that are descendants of this root process. The process identifier of the new process group is the same as the process identifier, which is returned in the lpProcessInformation parameter. Process groups are used by the GenerateConsoleCtrlEvent function to enable sending a CTRL+BREAK signal to a group of console processes.
/// If this flag is specified, CTRL+C signals will be disabled for all processes within the new process group.
/// This flag is ignored if specified with CREATE_NEW_CONSOLE.
/// </summary>
CREATE_NEW_PROCESS_GROUP = 0x00000200,
/// <summary>
/// If this flag is set, the environment block pointed to by lpEnvironment uses Unicode characters. Otherwise, the environment block uses ANSI characters.
/// </summary>
CREATE_UNICODE_ENVIRONMENT = 0x00000400,
/// <summary>
/// This flag is valid only when starting a 16-bit Windows-based application. If set, the new process runs in a private Virtual DOS Machine (VDM). By default, all 16-bit Windows-based applications run as threads in a single, shared VDM. The advantage of running separately is that a crash only terminates the single VDM; any other programs running in distinct VDMs continue to function normally. Also, 16-bit Windows-based applications that are run in separate VDMs have separate input queues. That means that if one application stops responding momentarily, applications in separate VDMs continue to receive input. The disadvantage of running separately is that it takes significantly more memory to do so. You should use this flag only if the user requests that 16-bit applications should run in their own VDM.
/// </summary>
CREATE_SEPARATE_WOW_VDM = 0x00000800,
/// <summary>
/// The flag is valid only when starting a 16-bit Windows-based application. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag overrides the switch. The new process is run in the shared Virtual DOS Machine.
/// </summary>
CREATE_SHARED_WOW_VDM = 0x00001000,
/// <summary>
/// The process is to be run as a protected process. The system restricts access to protected processes and the threads of protected processes. For more information on how processes can interact with protected processes, see Process Security and Access Rights.
/// To activate a protected process, the binary must have a special signature. This signature is provided by Microsoft but not currently available for non-Microsoft binaries. There are currently four protected processes: media foundation, audio engine, Windows error reporting, and system. Components that load into these binaries must also be signed. Multimedia companies can leverage the first two protected processes. For more information, see Overview of the Protected Media Path.
/// Windows Server 2003 and Windows XP/2000: This value is not supported.
/// </summary>
CREATE_PROTECTED_PROCESS = 0x00040000,
/// <summary>
/// The process is created with extended startup information; the lpStartupInfo parameter specifies a STARTUPINFOEX structure.
/// Windows Server 2003 and Windows XP/2000: This value is not supported.
/// </summary>
EXTENDED_STARTUPINFO_PRESENT = 0x00080000,
/// <summary>
/// The child processes of a process associated with a job are not associated with the job.
/// If the calling process is not associated with a job, this constant has no effect. If the calling process is associated with a job, the job must set the JOB_OBJECT_LIMIT_BREAKAWAY_OK limit.
/// </summary>
CREATE_BREAKAWAY_FROM_JOB = 0x01000000,
/// <summary>
/// Allows the caller to execute a child process that bypasses the process restrictions that would normally be applied automatically to the process.
/// Windows 2000: This value is not supported.
/// </summary>
CREATE_PRESERVE_CODE_AUTHZ_LEVEL = 0x02000000,
/// <summary>
/// The new process does not inherit the error mode of the calling process. Instead, the new process gets the default error mode.
/// This feature is particularly useful for multi-threaded shell applications that run with hard errors disabled.
/// The default behavior is for the new process to inherit the error mode of the caller. Setting this flag changes that default behavior.
/// </summary>
CREATE_DEFAULT_ERROR_MODE = 0x04000000,
/// <summary>
/// The process is a console application that is being run without a console window. Therefore, the console handle for the application is not set.
/// This flag is ignored if the application is not a console application, or if it is used with either CREATE_NEW_CONSOLE or DETACHED_PROCESS.
/// </summary>
CREATE_NO_WINDOW = 0x08000000,
}
[Flags]
public enum STARTF : uint
{
STARTF_USESHOWWINDOW = 0x00000001,
STARTF_USESIZE = 0x00000002,
STARTF_USEPOSITION = 0x00000004,
STARTF_USECOUNTCHARS = 0x00000008,
STARTF_USEFILLATTRIBUTE = 0x00000010,
STARTF_RUNFULLSCREEN = 0x00000020, // ignored for non-x86 platforms
STARTF_FORCEONFEEDBACK = 0x00000040,
STARTF_FORCEOFFFEEDBACK = 0x00000080,
STARTF_USESTDHANDLES = 0x00000100,
}
public enum ShowWindow : short
{
SW_HIDE = 0,
SW_SHOWNORMAL = 1,
SW_NORMAL = 1,
SW_SHOWMINIMIZED = 2,
SW_SHOWMAXIMIZED = 3,
SW_MAXIMIZE = 3,
SW_SHOWNOACTIVATE = 4,
SW_SHOW = 5,
SW_MINIMIZE = 6,
SW_SHOWMINNOACTIVE = 7,
SW_SHOWNA = 8,
SW_RESTORE = 9,
SW_SHOWDEFAULT = 10,
SW_FORCEMINIMIZE = 11,
SW_MAX = 11
}
}
}
"@
Write-Verbose $source
# Using the OutputAssembly and OutputType we can make an executable out of this. It requires the System.ServiceProcess assembly also to inherit the ServiceBase class.
Add-Type -TypeDefinition $source -Language CSharpVersion3 -OutputAssembly ("$servicePath$serviceName.exe") -OutputType ConsoleApplication -ReferencedAssemblies "System.ServiceProcess"
# Use WMI to create the service, it does not require DesktopInteract
# The computer is the localhost cause this code will be run on the remote computer locally.
$computer = "."
$class = "Win32_Service"
$method = "Create"
$mc = [wmiclass]"\\\\$computer\\ROOT\\CIMV2:$class"
$inparams = $mc.PSBase.GetMethodParameters($method)
$inparams.DesktopInteract = $false
$inparams.DisplayName = $serviceDisplayName
$inparams.ErrorControl = 0
$inparams.LoadOrderGroup = $null
$inparams.LoadOrderGroupDependencies = $null
$inparams.Name = $serviceDisplayName.Replace(" " ,"_")
$inparams.PathName = ("$servicePath$serviceName.exe")
$inparams.ServiceDependencies = $null
$inparams.ServiceType = 16
$inparams.StartMode = "Automatic"
# Will start as localsystem builtin if null
$inparams.StartName = $null
$inparams.StartPassword = $null
# Invoke the WMI method to create a service
$result = $mc.PSBase.InvokeMethod($method,$inparams,$null)
Start-Service -DisplayName $serviceDisplayName
# Loop until the child process of Powershell.exe is gone.
$baseproc = Get-WMIObject Win32_Process | Where { $_.Name -eq $serviceName }
While (Get-WMIObject Win32_Process | Where { $_.ParentProcessId -eq $baseproc.ProcessId }) {
Sleep 1
} # Terminate While
Stop-Service -DisplayName $serviceDisplayName
# Use sc.exe to delete the service, if you only use WMI to do this, it will not disappear until next restart, this deletes it immediately
C:\\Windows\\System32\\sc.exe delete $serviceDisplayName.Replace(" " ,"_") | Out-Null
# Clean up created files
Remove-Item -Path ("$servicePath$serviceName.exe") -Force
Remove-Item -Path ("$servicePath$serviceName.pdb") -Force
Remove-Item -Path $outputFile -Force
} Else {
Write-Host "No active sessions"
} # Terminate If - Active User
} # Terminate Scriptblock
If (Test-Connection $computerName -Quiet) {
Try {
Invoke-Command `
-ComputerName $computerName `
-ScriptBlock $scriptblock `
-ArgumentList $inputCode,$outputFile,$servicePath,$serviceName
}
Catch {
Write-Warning "Unable to create remote session: $($_.Exception.Message)"
Break
} # Terminate Try-Catch
} # Terminate If - Test Connection
} # Terminate Process
<#
.SYNOPSIS
Invoke remote code impersonating the currently logged on user.
.PARAMETER computername
Computer to run the remote code on.
.PARAMETER inputCode
The code to run on the remote computer.
.PARAMETER outputFile
The output data from a file.
.INPUTS
The input is a computer.
.OUTPUTS
The output is the returned data from
.EXAMPLE
C:\\PS> $code = "Out-File -FilePath c:\\temp\\output.txt -InputObject ([Security.Principal.WindowsIdentity]::GetCurrent())"
C:\\PS> Invoke-RemoteCommand -inputCode $code
#>
} # Terminate Function
|
combined_dataset/train/non-malicious/Generate Random Data.ps1 | Generate Random Data.ps1 | $dictionaryWords = gc $dictionaryFile
$azLower = 'abcdefghijklmnopqrstuvwxyz'.ToCharArray()
$azUpper = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'.ToCharArray()
$hex = '012345679ABCDEF'.ToCharArray()
$digit = '0123456789'.ToCharArray()
$alphanumeric = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'.ToCharArray()
function RandomVIN
{
$url = 'http://randomvin.com/getAjax.php?qry=random&str=random&p9=0'
$client = New-Object System.Net.WebClient
$client.DownloadString($url).SubString(4,17)
}
function RandomWord
{
$dictionaryWords | Get-Random
}
function RandomString([int] $len, [Array] $charSet = $azLower)
{
[String]::Join('', (1..$len | % { $charSet | Get-Random }))
}
function RandomPlate
{
(RandomString -len 3 -charset $azUpper) + "-" + (Get-Random -min 100 -max 999)
}
function RandomIPv4 {
[IPAddress]::Parse([String] (Get-Random) )
}
function RandomHexByte {
"{0:X2}" -f (Get-Random -Minimum 0 -Maximum 255)
}
function RandomMAC {
[String]::Join(":", (1..8 | % { RandomHexByte }))
}
function RandomDateTime {
([DateTime]::Now).AddYears((Get-Random -min -1 -max 1)).AddMonths((Get-Random -min -11 -max 11)).AddDays((Get-Random -min -30 -max 30)).AddHours((Get-Random -min -23 -max 23)).AddMinutes((Get-Random -min -59 -max 59)).AddSeconds((Get-Random -min -59 -max 59))
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.