full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_28_57.ps1
sample_28_57.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ServiceBus.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYFx3ieu9jwrUR # bkjODYPxXNZnEmyJYU/VNgwkKl7oo6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICqn # FPHRpTF+GGgx+zL80OwXxVEuTHf7RDlAS+6elQQdMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAc1FuMDZhkM7E2iCfTz4xsDqbryRPuFdnB0SF # kRkSDAGnHS12JzpVszXiIU5wv7FegOhmmd0kplJTehaCOPtu3mBrwfAkod+K9/X3 # ALEAzH/XARf6sbZkWvNESscs5Y6KqUfYwNLxRzListMRnSEEJV8xaOQ++Pa003g6 # zh2kawRSouW1XJhFOpWWlPblHlqGyB49iuL+CvYNMG6usUzjP85WCd/ZvewirHA8 # kqWN0oH8h/jvrmmc1EapxL9c+3d3YycISmD3dSHfj4gFYrr3Z3ZGAKQMgQ9GjKNt # kQkme4e/T8UpGvShkDzgX94g6Z0F38VPg9WdTItUYs2b3DrRe6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDpaFCH8d5eC1Hp5k2EyS/4VcGBZEMk/iRa # +0bkjnIHIQIGZjK/djfJGBMyMDI0MDUxNjA2NDIxMy4wNjlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+yFzAi # GA8yMDI0MDUxNTIyMTM0M1oYDzIwMjQwNTE2MjIxMzQzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDp77IXAgEAMAcCAQACAhGgMAcCAQACAhOEMAoCBQDp8QOXAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF44a9QWeg+Id3E41o5OjaE8ULcI # 8vkJsSmXGxbc8sOzU9n7UL8M6RXvpAkdZayoysJAjFrjUwJaXba+hM5cgAaRSvoW # u84aQwo6rOwIEY0PZuYcVvHj0tlXVKEg+or8ccIHarYCY6ff/V3LcPNFbZWa8KwD # yq+/nhjNVW7hF95PNLJhWgxK+Lw5738SOaD9mi44E5a4jFa7asoJXMbPvdOKqa5N # dIZLHGoIBVacxjW+qUIwlyys3Q31KOSOjKr26BOnAvKBZBP9xkGvhDu+AY/eUgl0 # MqOCp6+gq1yvArDj/S+94D263+l8WNjPIYI8NCRnrn1eT4CafQCe5vXnhDMxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCL2MzU/ej/I/Dm4pgC8l8snCC7 # ul7ADPeCKQzEF9WdDzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgAGwI1c5z # snT9VKpcsRCD4yUbFLrv5RCjtdMGM/z1PFswDQYJKoZIhvcNAQELBQAEggIASnoA # nWlDVDZgCBQ4NoIjZSMh6OxP40WTMkfpLhYXDrmRPzWQYiVRgLaNb0rzv+FFSmGl # FHl6DkknfZnZrWUtUx/iqDS3SxGodrGQ4c72opjfrnW1W7ONBfn0Opz37AowlHBK # c7L91dwtLJWYrH52qkRj12USeZx7FJG9nAjOXl5slM0+HDTdsNNEn/RogNzARgAZ # DVOWl1V8g7g4E3/C3DRX4cDLT9JARGK8/TDMVC2T5LtEYeH7Hu1r/2VFqyTe63Jl # WMve7FQYyo7unLxj1GZrgHieMHcpxauk6NMKp6EEDf/bvnWYsqWztJg/dEtBrc9Z # N4PvN35dTnHd833ZMt4HjP7nr7kHe3cQ4Hu6x6MyJjf4o7VMZa+3Omzst/CkRCL/ # cAUD2qE7pN/u1HZ8d4mImRY+0qsraZyY5o3vmiRkdXeUQbTSTOqRBwL8dx2Abr/O # SyZ0XDFbqz6Fce1agED7WAEH3j1/7zadrgc8LURsM3ZQOhXyXtuAmZD+xCjQ0UGA # tCqY0PD0eZV9o6Bm9MQdPOVIwB759syne6M7fuRj0/Jrgz1PfIKDg7YoE74r17/l # 4ELoGzz9FJ9x/CyCiEf++ZLpvkRFzKq0qWNcKVqJIwdaeGHKYBiOTMzMSEKCRAOx # mBsKBn/K5W8Iglaztqw8d1byar1Yrrx1lNk+3RY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_97.ps1
sample_6_97.ps1
ConvertFrom-StringData @' id_surfacepro3detectconnectedstandbyhibernationconfig=Detect Surface Pro 3 Connected Standby Hibernation Configuration Issue id_surfacepro3detectconnectedstandbyhibernationconfigdesc=Detected Surface Pro 3 Connected Standby Hibernation Configuration Issue. '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAoqlVDeULpqd2z # +EO2bR+yZBWgJQUwhBpD3jOFrFP1XqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID/K # iIeW+IQOigcNkN511LcbvM97isco9B4f71FCtOkeMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEATKeVRD1Sz3OOLvwL6pXdfQxdZXy5WrEhWero # yAU76X+mcErNcsVxzC3zBYUWK0oJIMtjSmo86z+6bK3/7E2YwQ2VsMGwWYHcoM8C # s480w6ebLLfKmwzsD1CwPC+ZPaHrlA2G1xVENd20C81Zesnz6WWgkDSWswSzaeXA # loI8R1Pvmm8AwXzRcmX3CSSMJ3r8YHLTN+sRSHgL2iMsfGSJt/+OJ6jUG4+WOqcf # otbG4mPa83UadLxf50tN2M7AZ+5sY6e+Ck509BQ3OM0HwIniguZ82ADfWl7ojtnc # 0ueQQRnZojjOMYyJLT/RAJurq3rOdPnYON57GwKLH/+MGPVw/qGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC4y95FS9O3tXx0P8bEPazYJsMKq6pIuGdD # pmq4upvTxAIGZutLSAOcGBMyMDI0MTAyODExNDA0MC45OTNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4 # fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d # U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh # hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn # ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM # KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L # 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr # 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf # RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi # aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA # 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49 # tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA # p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf # OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG # Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3 # kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU # 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T # y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd # gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt # uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3 # XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS # Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl # cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0 # MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA # AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH # yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq # WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW # cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a # Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4 # swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgEbZtlCXrLSVXhymAxQ00un3h20uyAunjO0y57gnjZjUwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj # SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk # D9cXZckbMA0GCSqGSIb3DQEBCwUABIICACqtsFF8UGOlSwdaCZn/GdIqk7tVw2sl # d10Td2zSq+9zVs0E165g7vwqiOs8SSyCF7KnFI2G7bkc76XxJ7onjuLSx1oDjK/+ # UGECJZ1l2Zz9U4U0/c78OenGa4Ips+IcgROUr3+vGwDvXX7ApxkPovBAaKGal7NX # 4RNnZkx2U7PNQ5xKRnK+76T8ro7YkjSZ+b/OPEDmjgdiLOjK2+Bfe/7IX1j/QQXj # /7mOIwcCgglLOQVuyUfKp/PMJUZrv44ODvThEnPwxNRF5RRnmqrJ7o2HOMJ4jxu4 # VIHOGdjZBfZzaoCDH4m6JFZOJRGlQ7ym1jBhReRJZiELEWQndBOXMt2hiLgCLUUv # rIE10afVYqacjFXmLAs/WtKoyBV4U82PhW934TZ3nFOVme8tqHM5FwuryAKIeRHN # fesTPMKiJAkgusAgGCtUQfyi7RAbGaYmZTvxAMKAKS2VFI/e2DEBIoCdzUpnDN69 # bu+bw/pO4vcv2hJQrwwqfSLo/L0Ue5G10u/sO9Kqj9irTqpn6sUJ8E/HpZ/9n0DD # 6+zPJtA2h3cm3z4XbOXEpxTc2aN2XWJyfkdogRp7dE8bMeGgPBVqKY7+eXQkW2lw # 7ecuYhPqV/WGMs/XSegKNb2WQLi5fbGFd864a5N7WYQG3XIOG9tvJ9StDbuBR1fF # 1LAosnGXA73l # SIG # End signature block
combined_dataset/train/non-malicious/1225.ps1
1225.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) Describe 'Get-SslCertificateBinding.when getting all bindings' { It 'should match netsh output' { $output = netsh http show sslcert $output | ForEach-Object { if( $_ -notmatch '^ (.*)\s+: (.*)$' ) { return } Write-Debug -Message $_ $name = $matches[1].Trim() $value = $matches[2].Trim() if( $value -eq '(null)' ) { $value = '' } elseif( $value -eq 'Enabled' ) { $value = $true } elseif( $value -eq 'Disabled' ) { $value = $false } if( $name -eq 'IP:port' ) { if( $value -notmatch '^(.*):(\d+)$' ) { Write-Error ('Invalid IP address/port: {0}' -f $value) } else { $ipAddress = $matches[1] $port = $matches[2] $binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port $binding.IPAddress | Should -Be ([IPAddress]$ipAddress) $binding.Port | Should -Be $port } } elseif( $name -eq 'Certificate Hash' ) { $binding.CertificateHash | Should -Be $value } elseif( $name -eq 'Application ID' ) { $binding.ApplicationID | Should -Be ([Guid]$value) } elseif( $name -eq 'Certificate Store Name' ) { if( $value -eq '' ) { $value = $null } $binding.CertificateStoreName | Should -Be $value } elseif( $name -eq 'Verify Client Certificate Revocation' ) { $binding.VerifyClientCertificateRevocation | Should -Be $value } elseif( $name -eq 'Verify Revocation Using Cached Client Certificate Only' ) { $binding.VerifyRevocationUsingCachedClientCertificatesOnly | Should -Be $value } elseif( $name -eq 'Revocation Freshness Time' ) { $binding.RevocationFreshnessTime | Should -Be $value } elseif( $name -eq 'URL Retrieval Timeout' ) { $binding.UrlRetrievalTimeout | Should -Be $value } elseif( $name -eq 'Ctl Identifier' ) { $binding.CtlIdentifier | Should -Be $value } elseif( $name -eq 'Ctl Store Name' ) { $binding.CtlStoreName | Should -Be $value } elseif( $name -eq 'DS Mapper Usage' ) { $binding.DSMapperUsageEnabled | Should -Be $value } elseif( $name -eq 'Negotiate Client Certificate' ) { $binding.NegotiateClientCertificate | Should -Be $value } } } } Describe 'Get-SslCertificateBinding' { It 'should get all bindings' { $numBindings = netsh http show sslcert | Where-Object { $_ -match '^[ \t]+IP:port[ \t]+: (.*)$' } | Measure-Object | Select-Object -ExpandProperty Count $bindings = @( Get-SslCertificateBinding ) $bindings.Length | Should -Be $numBindings } It 'should filter by IP address and port' { $foundOne = $false $output = netsh http show sslcert $output | Where-Object { $_ -match '^ IP:port\s+: (.*)$' } | ForEach-Object { if( $foundOne ) { return } $ipPort = $matches[1].Trim() if( $ipPort -notmatch '^(.*):(\d+)$' ) { Write-Error ('Invalid IP address/port in netsh output: ''{0}''' -f $ipPort ) return } $ipAddress = $matches[1] $port = $matches[2] $foundOne = $false Get-SslCertificateBinding -IPAddress $ipAddress | ForEach-Object { $_ | Should -Not -BeNullOrEmpty $_.IPAddress | Should -Be ([IPAddress]$ipAddress) $foundOne = $true } $foundOne | Should -Be $true $foundOne = $false Get-SslCertificateBinding -Port $port | ForEach-Object { $_ | Should -Not -BeNullOrEmpty $_.Port | Should -Be $port.Trim() $foundOne = $true } $foundOne | Should -Be $true } } It 'should get IPv6 binding' { $certPath = Join-Path -Path $PSScriptRoot -ChildPath 'Certificates\CarbonTestCertificate.cer' -Resolve $cert = Install-Certificate $certPath -StoreLocation LocalMachine -StoreName My $appID = '12ec3276-0689-42b0-ad39-c1fe23d25721' Set-SslCertificateBinding -IPAddress '[::]' -Port 443 -ApplicationID $appID -Thumbprint $cert.Thumbprint try { $binding = Get-SslCertificateBinding -IPAddress '[::]' | Where-Object { $_.ApplicationID -eq $appID } $binding | Should -Not -BeNullOrEmpty } finally { Remove-SslCertificateBinding -IPAddress '[::]' -Port 443 } } }
combined_dataset/train/non-malicious/finddupe_2.ps1
finddupe_2.ps1
write-host "Usage: finddupe.ps1 <directory1> <directory2> ... <directoryN>" function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } $matches = 0 # initialize number of matches for summary. $files = (dir $args -recurse | ? {$_.psiscontainer -ne $true}) for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files { if ($files[$i] -eq $null) {continue} $md5 = $null $filecheck = $files[$i] $files[$i] = $null for ($c=0;$c -ne $files.count; $c++) { if ($files[$c] -eq $null) {continue} # write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline if ($filecheck.length -eq $files[$c].length) { #write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline if ($md5 -eq $null) {$md5 = (get-md5 $filecheck)} if ($md5 -eq (get-md5 $files[$c])) { write-host "Size and MD5 match: " -fore red -nonewline "{0} and {1}" -f $filecheck.fullname, $files[$c].fullname $matches++ $files[$c] = $null } } } } write-host "" write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found. write-host "Number of matches found: $($matches)." write-host ""
combined_dataset/train/non-malicious/sample_0_10.ps1
sample_0_10.ps1
# diag_uex.psm1 # Created by tdimli # March 2020 # # Diagnostic functions for UEX area # version $UEX_version = "1.0.240717.0" # Area and Area/Component arrays $UEX = @("xray_uex_wmi", "xray_uex_eventlog") #Component/Diagnostic Function arrays $xray_uex_wmi = @("uex_wmi_KB2020286") $xray_uex_eventlog = @("uex_eventlog_KB5042230") # begin: diagnostic functions #region wmi #region uex_wmi_KB2020286 <# Component: WMI Checks for: WMI repository size which can cause issues if grown over 500MB/1GB Created by: tdimli #> function uex_wmi_KB2020286 { param( [Parameter(Mandatory=$true, Position=0)] [Boolean] $offline ) $issueMsg = @" Larger WMI repository sizes in %windir%\system32\wbem\repository can cause logon delays and performance issues. When the WMI repository size exceeds 500MB, you may encounter such performance issues. When the size exceeds 1GB, then you will likely encounter performance issues. The WMI repository size on this machine is {0} For further information on this issue and how to resolve it: https://learn.microsoft.com/en-us/troubleshoot/windows-server/performance/large-wmi-repository-cause-slow-logon "@ if($offline) { LogWrite "Cannot run offline, skipping" return $RETURNCODE_SKIPPED } # Look for the issue try { $issueFound = $false $repSize = 0 $repFile = Get-Item $env:windir\System32\wbem\Repository\OBJECTS.DATA -ErrorAction Ignore $repSize = $repFile.Length if ($repSize -eq 0) { # no repository? LogWrite "WMI repository file missing or empty!" } elseif ($repSize -gt 500*1024*1024) { $issueFound = $true if ($repSize -gt 1024*1024*1024) { # >1GB $issueType = $ISSUETYPE_ERROR $repSize = "$(([int](1000 * $repSize/(1024*1024*1024))/1000)) GB" } else { # >500MB $issueType = $ISSUETYPE_INFO $repSize = "$([int]($repSize/(1024*1024))) MB" } } if ($issueFound) { # issue present $issueMsg = [string]::Format($issueMsg, $repSize) ReportIssue $issueMsg $issueType } } catch { LogWrite "Failed - exiting! (Error: $_)" return $RETURNCODE_FAILED } return $RETURNCODE_SUCCESS } #endregion uex_wmi_KB2020286 #endregion wmi #region eventlog #region uex_eventlog_KB5042230 <# Component: EventLog Checks for: Number of entries under event log registry, which can cause issues if too many #> function uex_eventlog_KB5042230 { param( [Parameter(Mandatory=$true, Position=0)] [Boolean] $offline ) $issueMsg = @" There are high number of event sources ({0}) registered under the Event Log registry key: "HKLM\SYSTEM\CurrentControlSet\Services\EventLog" The Event Log service relies on this registry structure to register all event sources and channels. Too many entries here may cause issues with Event Log and may lead to problems such as events being written in the wrong log etc. Note: This might not be directly related to the issue you are troubleshooting. If you are troubleshooting an issue related Event Log service and/or events being written incorrectly, this is likely related. Resolution: Inspect the registry keys and subkeys in the path HKLM\SYSTEM\CurrentControlSet\Services\EventLog Remove the duplicated/unwanted entries. Then restart the machine. For further information on the Event Log event sources and registry structure: https://learn.microsoft.com/en-us/windows/win32/eventlog/event-sources?redirectedfrom=MSDN "@ if($offline) { LogWrite "Cannot run offline, skipping" return $RETURNCODE_SKIPPED } # Look for the issue try { $issueFound = $false $issueType = $ISSUETYPE_INFO $numEntries = (Get-ChildItem -Path "HKLM:\SYSTEM\CurrentControlSet\Services\EventLog" -Recurse -ErrorAction Ignore).Count if ($numEntries -gt 2000) { # high number of entries $issueFound = $true if ($numEntries -gt 10000) { $issueType = $ISSUETYPE_ERROR } } if ($issueFound) { # issue present $issueMsg = [string]::Format($issueMsg, $numEntries) ReportIssue $issueMsg $issueType } } catch { LogWrite "Failed - exiting! (Error: $_)" return $RETURNCODE_FAILED } return $RETURNCODE_SUCCESS } #endregion uex_eventlog_KB5042230 #endregion eventlog # end: diagnostic functions Export-ModuleMember -Function * -Variable * # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCZ8vQMlwiwy1IU # m3ZU0kht7hPaYLEmsZ41nGgyH+DKH6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICTy # MDczNzSYO3zeSekvbpkboAX/dfapu9kEqAVTG/pbMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMm1rIizszb7rmPiw0tLvTRdYppXnsb0J6suL # xZxeufNG4hfeOXrXOzTAt/IMiMTaMmRxOKdFp8ysJ6dE7sHvpRkCcZiPHpsmMGWu # 8O8oWpx42b4yEgHHMUNNaPeR4aYGdOrrt33AxyqgwbdvT4OUzPuiUAK9wUMR1H3g # FTRvIBLovTU+7lDQR2xpPKCLIktJN7BfLmP9PFlzL/r44IWWTHXobW9GAm+eylxM # IQC6d4hyHTWVdqcvR/QD2o3moghRvJyF21s6jp8P3WE5mLYM19BYQ8tOCUYyjji+ # iAj+98ek1XHRYvhZummzG8pIzpupyJUlKpg8cIXWGdivlPDeQKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAVPhlEHvRKlJhSLYv9noMOHG7i2qQ6Qoro # 9Yqv83dWLAIGZutTTcj4GBMyMDI0MTAyODExMzMyMi43OTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+vs7 # RNN3M8bTAAEAAAH6MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExMVoXDTI1MTAyMjE4MzExMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjQzMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # yhZVBM3PZcBfEpAf7fIIhygwYVVP64USeZbSlRR3pvJebva0LQCDW45yOrtpwIpG # yDGX+EbCbHhS5Td4J0Ylc83ztLEbbQD7M6kqR0Xj+n82cGse/QnMH0WRZLnwggJd # enpQ6UciM4nMYZvdQjybA4qejOe9Y073JlXv3VIbdkQH2JGyT8oB/LsvPL/kAnJ4 # 5oQIp7Sx57RPQ/0O6qayJ2SJrwcjA8auMdAnZKOixFlzoooh7SyycI7BENHTpkVK # rRV5YelRvWNTg1pH4EC2KO2bxsBN23btMeTvZFieGIr+D8mf1lQQs0Ht/tMOVdah # 14t7Yk+xl5P4Tw3xfAGgHsvsa6ugrxwmKTTX1kqXH5XCdw3TVeKCax6JV+ygM5i1 # NroJKwBCW11Pwi0z/ki90ZeO6XfEE9mCnJm76Qcxi3tnW/Y/3ZumKQ6X/iVIJo7L # k0Z/pATRwAINqwdvzpdtX2hOJib4GR8is2bpKks04GurfweWPn9z6jY7GBC+js8p # SwGewrffwgAbNKm82ZDFvqBGQQVJwIHSXpjkS+G39eyYOG2rcILBIDlzUzMFFJbN # h5tDv3GeJ3EKvC4vNSAxtGfaG/mQhK43YjevsB72LouU78rxtNhuMXSzaHq5fFiG # 3zcsYHaa4+w+YmMrhTEzD4SAish35BjoXP1P1Ct4Va0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRjjHKbL5WV6kd06KocQHphK9U/vzAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAuFbCorFrvodG+ZNJH3Y+Nz5QpUytQVObOyYFrgcGrxq6MUa4yLmxN4xW # dL1kygaW5BOZ3xBlPY7Vpuf5b5eaXP7qRq61xeOrX3f64kGiSWoRi9EJawJWCzJf # UQRThDL4zxI2pYc1wnPp7Q695bHqwZ02eaOBudh/IfEkGe0Ofj6IS3oyZsJP1yat # cm4kBqIH6db1+weM4q46NhAfAf070zF6F+IpUHyhtMbQg5+QHfOuyBzrt67CiMJS # KcJ3nMVyfNlnv6yvttYzLK3wS+0QwJUibLYJMI6FGcSuRxKlq6RjOhK9L3QOjh0V # CM11rHM11ZmN0euJbbBCVfQEufOLNkG88MFCUNE10SSbM/Og/CbTko0M5wbVvQJ6 # CqLKjtHSoeoAGPeeX24f5cPYyTcKlbM6LoUdO2P5JSdI5s1JF/On6LiUT50adpRs # tZajbYEeX/N7RvSbkn0djD3BvT2Of3Wf9gIeaQIHbv1J2O/P5QOPQiVo8+0AKm6M # 0TKOduihhKxAt/6Yyk17Fv3RIdjT6wiL2qRIEsgOJp3fILw4mQRPu3spRfakSoQe # 5N0e4HWFf8WW2ZL0+c83Qzh3VtEPI6Y2e2BO/eWhTYbIbHpqYDfAtAYtaYIde87Z # ymXG3MO2wUjhL9HvSQzjoquq+OoUmvfBUcB2e5L6QCHO6qTO7WowggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0MzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA94Z+bUJn+nKw # BvII6sg0Ny7aPDaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4mkwIhgPMjAyNDEwMjgxMDE0MDFaGA8yMDI0 # MTAyOTEwMTQwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sniaQIBADAHAgEA # AgIa4zAHAgEAAgITSTAKAgUA6ssz6QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBDp2k9IO7lePSuN2vi99dNhT8Ur9aidO320rDGDIcPcyFVri4JRa6egypO # a+QZHboICRCPw0/gWqlrvDCRZTwyGk5Y42nI/Ilu2wyxfwKHIFRNzSJmuD5IbQNL # Ml1wOoWE3WfiBV23XWqiqgVMrvudjR2zBKTDWoEDcFPa7iv5CUd7sAQW3tiMdpKL # Qri7U/CWGo0EhKQQh5XEqgC01E+FTTCm/kZmwXTQqMRAMGfm2Z83vJzQFqlNaOUj # 7KSuuVKsMWeLMNH4sRgs1pvlc78R+eR2b3qHl4HaW2yz+dSUmble365gLjUpgDBc # udKw24qBm3gFHJ2uSv/oCRYyzAghMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH6+ztE03czxtMAAQAAAfowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgK+qrH8H0Dr832eWqlRhBFRbkw/JHanFYFmyCiqi6dNowgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCB98n8tya8+B2jjU/dpJRIwHwHHpco5ogNStYoc # bkOeVjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +vs7RNN3M8bTAAEAAAH6MCIEILhY9vnDG3hQBjfXzsPIyEAOxeeRFPicwYS+g7hW # GYq3MA0GCSqGSIb3DQEBCwUABIICAF2Qooxx6P7AVy8aNkaM62v91Fkx5iwXIhDs # OwJnL6a3TeO9dxJ1nGWjzUKF75W3V9SItwjtk6/Sib1YawxxCpMV973Xm6QPXneY # EbZCNGZRERQB3s1Cfk1R32P7EL1uxkFIqCGJWne9m0QlXjp3rFMIEdKeXNejuL0Z # 4Rj+v205+ZnvU5keGXfdD+V1AgUbnOv5ezOgwGAebfqXajeuO5mb/1IvzBny6FwG # anUW5A2OtX5uBDl2dgiTwCXvj31WqLuzRNcoFEFkL0cJsm/fVS8Hy6j4BJWhpl39 # sQuCUjSvVvDCMf8aCoiL67A9lsbeY5/FjR9NnBF2Sd06EB7isJTesWSu4zKzqjfd # HYPaqCoYzu9UoDntXJmMKgNhRAG/21aASCbh1qKiO7dSrvIcXnNkLD6pcdzA9fP0 # 5hIjEKWYx4ItXg/v6YwxlBbVWULkq5NJ/vyOQHtc4ieEleEy3cU5h1B3ov8vQZId # su9bxFPd+7zLQzmH+WlfD8xx9il5D0AKx0i/jiPi2N/3dBkK1uZlio5BiwdYCjxF # 67xanyx+QP1i/bAFF7/hT4aLQ/my9clnVlE6RbTTGy2cYfNJzKkymyrpaHlWQaRw # qloAjjPzZL3+isOkgUv3VciqxjoHDvQRMgV4Ydp06wHqmdHhujooC4hyev+4krYT # NH5r8J7B # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_41.ps1
sample_49_41.ps1
# # Module manifest for module 'OCI.PSModules.Artifacts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Artifacts.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '1fe5e04b-2e80-402c-b279-8d3ea9eca7dc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Artifacts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Artifacts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIArtifactsContainerConfiguration', 'Get-OCIArtifactsContainerImage', 'Get-OCIArtifactsContainerImageSignature', 'Get-OCIArtifactsContainerImageSignaturesList', 'Get-OCIArtifactsContainerImagesList', 'Get-OCIArtifactsContainerRepositoriesList', 'Get-OCIArtifactsContainerRepository', 'Get-OCIArtifactsGenericArtifact', 'Get-OCIArtifactsGenericArtifactByPath', 'Get-OCIArtifactsGenericArtifactsList', 'Get-OCIArtifactsRepositoriesList', 'Get-OCIArtifactsRepository', 'Move-OCIArtifactsContainerRepositoryCompartment', 'Move-OCIArtifactsRepositoryCompartment', 'New-OCIArtifactsContainerImageSignature', 'New-OCIArtifactsContainerRepository', 'New-OCIArtifactsRepository', 'Remove-OCIArtifactsContainerImage', 'Remove-OCIArtifactsContainerImageSignature', 'Remove-OCIArtifactsContainerRepository', 'Remove-OCIArtifactsContainerVersion', 'Remove-OCIArtifactsGenericArtifact', 'Remove-OCIArtifactsGenericArtifactByPath', 'Remove-OCIArtifactsRepository', 'Restore-OCIArtifactsContainerImage', 'Update-OCIArtifactsContainerConfiguration', 'Update-OCIArtifactsContainerImage', 'Update-OCIArtifactsContainerImageSignature', 'Update-OCIArtifactsContainerRepository', 'Update-OCIArtifactsGenericArtifact', 'Update-OCIArtifactsGenericArtifactByPath', 'Update-OCIArtifactsRepository' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Artifacts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/37.ps1
37.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Add-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" Write-Verbose "Resource: $DCP_resource" try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON for the Android Policy..." -f Red } else { Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Test-JSON(){ param ( $JSON ) try { $TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop $validJson = $true } catch { $validJson = $false $_.Exception } if (!$validJson){ Write-Host "Provided JSON isn't in valid JSON format" -f Red break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $iOS = @" { "@odata.type": " "description": "iOS Device Restriction Policy", "displayName": "iOS Device Restriction Policy", "accountBlockModification": false, "activationLockAllowWhenSupervised": false, "airDropBlocked": false, "airDropForceUnmanagedDropTarget": false, "airPlayForcePairingPasswordForOutgoingRequests": false, "appleWatchBlockPairing": false, "appleWatchForceWristDetection": false, "appleNewsBlocked": false, "appsVisibilityList": [], "appsVisibilityListType": "none", "appStoreBlockAutomaticDownloads": false, "appStoreBlocked": false, "appStoreBlockInAppPurchases": false, "appStoreBlockUIAppInstallation": false, "appStoreRequirePassword": false, "bluetoothBlockModification": false, "cameraBlocked": false, "cellularBlockDataRoaming": false, "cellularBlockGlobalBackgroundFetchWhileRoaming": false, "cellularBlockPerAppDataModification": false, "cellularBlockVoiceRoaming": false, "certificatesBlockUntrustedTlsCertificates": false, "classroomAppBlockRemoteScreenObservation": false, "compliantAppsList": [], "compliantAppListType": "none", "configurationProfileBlockChanges": false, "definitionLookupBlocked": false, "deviceBlockEnableRestrictions": false, "deviceBlockEraseContentAndSettings": false, "deviceBlockNameModification": false, "diagnosticDataBlockSubmission": false, "diagnosticDataBlockSubmissionModification": false, "documentsBlockManagedDocumentsInUnmanagedApps": false, "documentsBlockUnmanagedDocumentsInManagedApps": false, "emailInDomainSuffixes": [], "enterpriseAppBlockTrust": false, "enterpriseAppBlockTrustModification": false, "faceTimeBlocked": false, "findMyFriendsBlocked": false, "gamingBlockGameCenterFriends": true, "gamingBlockMultiplayer": false, "gameCenterBlocked": false, "hostPairingBlocked": false, "iBooksStoreBlocked": false, "iBooksStoreBlockErotica": false, "iCloudBlockActivityContinuation": false, "iCloudBlockBackup": true, "iCloudBlockDocumentSync": true, "iCloudBlockManagedAppsSync": false, "iCloudBlockPhotoLibrary": false, "iCloudBlockPhotoStreamSync": true, "iCloudBlockSharedPhotoStream": false, "iCloudRequireEncryptedBackup": false, "iTunesBlockExplicitContent": false, "iTunesBlockMusicService": false, "iTunesBlockRadio": false, "keyboardBlockAutoCorrect": false, "keyboardBlockPredictive": false, "keyboardBlockShortcuts": false, "keyboardBlockSpellCheck": false, "kioskModeAllowAssistiveSpeak": false, "kioskModeAllowAssistiveTouchSettings": false, "kioskModeAllowAutoLock": false, "kioskModeAllowColorInversionSettings": false, "kioskModeAllowRingerSwitch": false, "kioskModeAllowScreenRotation": false, "kioskModeAllowSleepButton": false, "kioskModeAllowTouchscreen": false, "kioskModeAllowVoiceOverSettings": false, "kioskModeAllowVolumeButtons": false, "kioskModeAllowZoomSettings": false, "kioskModeAppStoreUrl": null, "kioskModeRequireAssistiveTouch": false, "kioskModeRequireColorInversion": false, "kioskModeRequireMonoAudio": false, "kioskModeRequireVoiceOver": false, "kioskModeRequireZoom": false, "kioskModeManagedAppId": null, "lockScreenBlockControlCenter": false, "lockScreenBlockNotificationView": false, "lockScreenBlockPassbook": false, "lockScreenBlockTodayView": false, "mediaContentRatingAustralia": null, "mediaContentRatingCanada": null, "mediaContentRatingFrance": null, "mediaContentRatingGermany": null, "mediaContentRatingIreland": null, "mediaContentRatingJapan": null, "mediaContentRatingNewZealand": null, "mediaContentRatingUnitedKingdom": null, "mediaContentRatingUnitedStates": null, "mediaContentRatingApps": "allAllowed", "messagesBlocked": false, "notificationsBlockSettingsModification": false, "passcodeBlockFingerprintUnlock": false, "passcodeBlockModification": false, "passcodeBlockSimple": true, "passcodeExpirationDays": null, "passcodeMinimumLength": 4, "passcodeMinutesOfInactivityBeforeLock": null, "passcodeMinutesOfInactivityBeforeScreenTimeout": null, "passcodeMinimumCharacterSetCount": null, "passcodePreviousPasscodeBlockCount": null, "passcodeSignInFailureCountBeforeWipe": null, "passcodeRequiredType": "deviceDefault", "passcodeRequired": true, "podcastsBlocked": false, "safariBlockAutofill": false, "safariBlockJavaScript": false, "safariBlockPopups": false, "safariBlocked": false, "safariCookieSettings": "browserDefault", "safariManagedDomains": [], "safariPasswordAutoFillDomains": [], "safariRequireFraudWarning": false, "screenCaptureBlocked": false, "siriBlocked": false, "siriBlockedWhenLocked": false, "siriBlockUserGeneratedContent": false, "siriRequireProfanityFilter": false, "spotlightBlockInternetResults": false, "voiceDialingBlocked": false, "wallpaperBlockModification": false } "@ $Android = @" { "@odata.type": " "description": "Android Device Restriction Policy", "displayName": "Android Device Restriction Policy", "appsBlockClipboardSharing": false, "appsBlockCopyPaste": false, "appsBlockYouTube": false, "bluetoothBlocked": false, "cameraBlocked": false, "cellularBlockDataRoaming": true, "cellularBlockMessaging": false, "cellularBlockVoiceRoaming": false, "cellularBlockWiFiTethering": false, "compliantAppsList": [], "compliantAppListType": "none", "diagnosticDataBlockSubmission": false, "locationServicesBlocked": false, "googleAccountBlockAutoSync": false, "googlePlayStoreBlocked": false, "kioskModeBlockSleepButton": false, "kioskModeBlockVolumeButtons": false, "kioskModeManagedAppId": null, "nfcBlocked": false, "passwordBlockFingerprintUnlock": true, "passwordBlockTrustAgents": false, "passwordExpirationDays": null, "passwordMinimumLength": 4, "passwordMinutesOfInactivityBeforeScreenTimeout": null, "passwordPreviousPasswordBlockCount": null, "passwordSignInFailureCountBeforeFactoryReset": null, "passwordRequiredType": "deviceDefault", "passwordRequired": true, "powerOffBlocked": false, "factoryResetBlocked": false, "screenCaptureBlocked": false, "deviceSharingBlocked": false, "storageBlockGoogleBackup": true, "storageBlockRemovableStorage": false, "storageRequireDeviceEncryption": true, "storageRequireRemovableStorageEncryption": true, "voiceAssistantBlocked": false, "voiceDialingBlocked": false, "webBrowserAllowPopups": false, "webBrowserBlockAutofill": false, "webBrowserBlockJavaScript": false, "webBrowserBlocked": false, "webBrowserCookieSettings": "browserDefault", "wiFiBlocked": false } "@ Add-DeviceConfigurationPolicy -Json $Android Add-DeviceConfigurationPolicy -Json $iOS
combined_dataset/train/non-malicious/1121.ps1
1121.ps1
$siteName = 'SslFlags' $sitePort = 4389 $webConfigPath = Join-Path $TestDir web.config function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Uninstall-IisWebsite $siteName Install-IisWebsite -Name $siteName -Path $TestDir -Bindings "http://*:$sitePort" if( Test-Path $webConfigPath -PathType Leaf ) { Remove-Item $webConfigPath } } function Stop-Test { Uninstall-IisWebsite $siteName } function Test-ShouldResetSslFlags { Enable-IisSsl -SiteName $siteName Assert-SslFlags -ExpectedValue 'None' } function Test-ShouldRequireSsl { Enable-IisSsl -SiteName $siteName -RequireSSL Assert-SSLFlags -ExpectedValue 'Ssl' } function Test-ShouldAcceptClientCertificates { Enable-IisSsl -SiteName $siteName -AcceptClientCertificates Assert-SSLFlags -ExpectedValue 'SslNegotiateCert' } function Test-ShouldRequireClientCertificates { Enable-IisSsl -SiteName $siteName -RequireSsl -RequireClientCertificates Assert-SSLFlags -ExpectedValue 'Ssl, SslNegotiateCert, SslRequireCert' } function Test-ShouldAllow128BitSsl { Enable-IisSsl -SiteName $siteName -Require128BitSsl Assert-SSLFlags -ExpectedValue 'Ssl128' } function Test-ShouldSetAllFlags { Enable-IisSsl -SiteName $siteName -RequireSsl -AcceptClientCertificates -Require128BitSsl Assert-SslFlags -ExpectedValue 'Ssl, SslNegotiatecert, Ssl128' } function Test-ShouldSupportWhatIf { Enable-IisSsl -SiteName $siteName -RequireSsl Assert-SslFlags -ExpectedValue 'Ssl' Enable-IisSsl -SiteName $siteName -AcceptClientCertificates -WhatIf Assert-SslFlags -ExpectedValue 'Ssl' } function Test-ShouldSetFlagsOnSubFolder { Enable-IisSsl -SiteName $siteName -Path SubFolder -RequireSsl Assert-SslFlags -ExpectedValue 'Ssl' -VirtualPath "SubFolder" Assert-SslFlags -ExpectedValue 'None' } function Assert-SslFlags($ExpectedValue, $VirtualPath) { $Path = Join-IisVirtualPath $SiteName $VirtualPath $authSettings = [xml] (& (Join-Path -Path $env:SystemRoot -ChildPath 'system32\inetsrv\appcmd.exe' -Resolve) list config $Path '-section:system.webServer/security/access') $sslFlags = $authSettings['system.webServer'].security.access.sslFlags $section = Get-IisConfigurationSection -SiteName $SiteName -VirtualPath $VirtualPath -SectionPath 'system.webServer/security/access' $sslIntFlags = $section['sslFlags'] Write-Verbose ('{0} ({1})' -f $sslIntFlags,$sslFlags) Assert-Equal $ExpectedValue $sslFlags }
combined_dataset/train/non-malicious/Check Modules path_1..ps1
Check Modules path_1..ps1
function Update-ModulePath { <# .Synopsis Command insures that path and the name of psm1 file are alike. .Description This function should help to troubleshoot modules. It loooks up path that should contain modules. For each .psm1 file found it checks if parent folder containing this file has same name. I created this function after I was banging my head for few hours why my module won't show up. After several approaches it came out clear that it was simple TYPO in file.psm1 name... .Example Update-ModulePath -Fix Files Will look all files and rename .psm1 files to match parent folder .Example Update-ModulePath -Fix Folder Will look all files and rename parent folder to match file names .Parameter Fix Switch to decide if we prefer to name folders or files to get all matches. #> [CmdletBinding()] param( [Parameter(Mandatory=$true)] [ValidateSet("Files","Folders")] [string]$Fix ) <# Steps to be taken: * enumerate all .psm1 files * check which one is misconfigured * rename file/ folder to fix this issue #> ForEach ($ModuleFile in @(Get-ChildItem -Recurse @($($env:PSModulePath).Split(";")) -filter *.psm1)) { if (($file = $ModuleFile.BaseName) -eq ($folder = $ModuleFile.Directory.ToString().Split('\\')[-1])) { Write-Verbose "$Modulefile.Name is fine" } else { Write-Verbose "$ModuleFile.Name is BAD" switch ($Fix) { "Files" { Write-Verbose "We rename file $file" $OldName = $ModuleFile.FullName $NewName = $OldName -replace "$file.psm1$", "$folder.psm1" } "Folders" { Write-Verbose "We rename folder $folder" $OldName = $ModuleFile.FullName -replace "\\\\$file.psm1", "" $NewName = $OldName -replace "$folder$", $file } } Write-Host "Renaming $OldName to $NewName" Rename-Item -Force $OldName $NewName } } }
combined_dataset/train/non-malicious/2356.ps1
2356.ps1
$samaccount_to_copy = 'abertram' $new_samaccountname = 'aaaa' $new_displayname = 'displayname' $new_firstname = 'firstname' $new_lastname = 'lastname' $new_name = 'namehere' $new_user_logon_name = 'logonname' $new_password = 'password' $new_description = 'description' $new_ou_DN = '' $enable_user_after_creation = $true $password_never_expires = $false $cannot_change_password = $false $ad_account_to_copy = Get-Aduser $samaccount_to_copy -Properties memberOf $params = @{'SamAccountName' = $new_samaccountname; 'Instance' = $ad_account_to_copy; 'DisplayName' = $new_displayname; 'GivenName' = $new_firstname; 'SurName' = $new_lastname; 'PasswordNeverExpires' = $password_never_expires; 'CannotChangePassword' = $cannot_change_password; 'Description' = $new_description; 'Enabled' = $enable_user_after_creation; 'UserPrincipalName' = $new_user_logon_name; 'AccountPassword' = (ConvertTo-SecureString -AsPlainText $new_password -Force); } New-ADUser -Name $new_name @params $ad_account_to_copy.Memberof | % {Add-ADGroupMember $_ $new_samaccountname } Get-ADUser $new_samaccountname| Move-ADObject -TargetPath $new_ou_DN
combined_dataset/train/non-malicious/sample_65_3.ps1
sample_65_3.ps1
# # Module manifest for module 'OCI.PSModules.Loggingingestion' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll' # Version number of this module. ModuleVersion = '89.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loggingingestion Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Write-OCILoggingingestionLogs' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1879.ps1
1879.ps1
Describe "Update-TypeData basic functionality" -Tags "CI" { BeforeAll { $testfilename = "testfile.ps1xml" $testfile = Join-Path -Path $TestDrive -ChildPath $testfilename $invalidFileExtensionFile = Join-Path -Path $TestDrive -ChildPath "notmshxml" $xmlContent=@" <Types> <Type> <Name>AnyName</Name> <MembersTypo> <PropertySet> <Name>PropertySetName</Name> <ReferencedProperties> <Name>FirstName</Name> <Name>LastName</Name> </ReferencedProperties> </PropertySet> </MembersTypo> <MembersTypo2> <PropertySet> <Name>PropertySetName</Name> <ReferencedProperties> <Name>FirstName</Name> <Name>LastName</Name> </ReferencedProperties> </PropertySet> </MembersTypo2> </Type> </Types> "@ $xmlContent>$testfile } BeforeEach { $ps = [powershell]::Create() $iss = [system.management.automation.runspaces.initialsessionstate]::CreateDefault2() $rs = [system.management.automation.runspaces.runspacefactory]::CreateRunspace($iss) $rs.Open() $ps.Runspace = $rs } AfterEach { $rs.Close() $ps.Dispose() } It "Update-TypeData with attributes on root node should succeed" { $xmlContent = @" <Types xmlns:foo="bar"> <Type> <Name>Test</Name> <Members> <AliasProperty> <Name>Yada</Name> <ReferencedMemberName>Length</ReferencedMemberName> </AliasProperty> </Members> </Type> </Types> "@ $path = "$testdrive\test.types.ps1xml" Set-Content -Value $xmlContent -Path $path $null = $ps.AddScript("Update-TypeData -AppendPath $path") $ps.Invoke() $ps.HadErrors | Should -BeFalse $ps.Commands.Clear() $null = $ps.AddScript("Get-TypeData test") $typeData = $ps.Invoke() $typeData | Should -HaveCount 1 $typeData.TypeName | Should -BeExactly "Test" } It "Update-TypeData with Invalid TypesXml should throw Exception" { $null = $ps.AddScript("Update-TypeData -PrependPath $testfile") $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "TypesXmlUpdateException,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Invalid File Extension should throw Exception"{ $xmlContent="not really an xml file, but we will not use it" $xmlContent>$invalidFileExtensionFile $null = $ps.AddScript("Update-TypeData -PrependPath $invalidFileExtensionFile") $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "WrongExtension,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Valid Dynamic Type NoteProperty with Force should work"{ $null = $ps.AddScript("Update-TypeData -MemberType NoteProperty -MemberName TestNote -Value 2 -TypeName System.String") $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestNote") $ps.Invoke() | Should -Be 2 $ps.Commands.Clear() $null = $ps.AddScript("Update-TypeData -MemberType NoteProperty -MemberName TestNote -Value 'test' -TypeName System.String -Force") $ps.Invoke() $ps.commands.clear() $null = $ps.AddScript("'string'.TestNote") $ps.Invoke() | Should -BeExactly "test" $ps.commands.clear() $null = $ps.AddScript('Update-TypeData -MemberType NoteProperty -MemberName TestNote -Value $null -TypeName System.String -Force') $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestNote") $ps.Invoke() | Should -BeNullOrEmpty } It "Update-TypeData with Valid Dynamic Type AliasProperty with Force should work"{ $null = $ps.AddScript("Update-TypeData -MemberType AliasProperty -MemberName TestAlias -Value Length -TypeName System.String") $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestAlias.GetType().Name") $ps.Invoke() | Should -BeExactly "Int32" $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestAlias") $ps.Invoke() | Should -Be 6 $ps.Commands.Clear() $null = $ps.AddScript("Update-TypeData -MemberType AliasProperty -MemberName TestAlias -Value 'Length' -SecondValue 'string' -TypeName System.String -Force") $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestAlias.GetType().Name") $ps.Invoke() | Should -BeExactly "String" $ps.Commands.Clear() $null = $ps.AddScript("'string'.TestAlias") $ps.Invoke() | Should -Be 6 } It "Update-TypeData with Valid Dynamic Type ScriptMethod with Force should work"{ $script1="script method" $null = $ps.AddScript("Update-TypeData -MemberType ScriptMethod -MemberName TestScriptMethod -Value {'$script1'} -TypeName System.String") $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript('"string".TestScriptMethod()') $ps.Invoke() | Should -BeExactly "script method" $ps.Commands.Clear() $script2="new script method" $null = $ps.AddScript("Update-TypeData -MemberType ScriptMethod -MemberName TestScriptMethod -Value {'$script2'} -TypeName System.String -Force") $ps.Invoke() $ps.Commands.Clear() $null = $ps.AddScript('"string".TestScriptMethod()') $ps.Invoke() | Should -BeExactly "new script method" } It "Update-TypeData with Valid Dynamic Type Accept TypeData Object should work"{ $ps.Commands.AddScript('Add-Type -TypeDefinition "public class TypeDataTest{}"') $ps.Commands.AddStatement() $ps.Commands.AddScript('Update-TypeData -TypeName TypeDataTest -MemberType NoteProperty -MemberName TestNote1 -Value "Hello"') $ps.Commands.AddStatement() $ps.Commands.AddScript('Update-TypeData -MemberType NoteProperty -MemberName TestNote -Value 2 -TypeName TypeDataTest') $ps.Commands.AddStatement() $ps.Commands.AddScript('$result=new-object TypeDataTest') $ps.Invoke() $ps.Commands.Clear() $ps.AddScript('$result.TestNote1').Invoke() | Should -BeExactly "Hello" $ps.Commands.Clear() $ps.AddScript('$result.TestNote').Invoke() | Should -Be 2 } It "Update-TypeData with Invalid DynamicType Null Value For AliasProperty should throw Exception"{ $null = $ps.AddScript('Update-TypeData -MemberType AliasProperty -MemberName TestAlias -Value $null -TypeName System.String') $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "ValueShouldBeSpecified,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Invalid DynamicType with No MemberName should throw Exception"{ $null = $ps.AddScript('Update-TypeData -MemberType NoteProperty -Value "Error" -TypeName System.String') $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "MemberNameShouldBeSpecified,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Invalid DynamicType with No Value should throw Exception"{ $null = $ps.AddScript('Update-TypeData -MemberType NoteProperty -MemberName TestNote -TypeName System.String') $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "ValueShouldBeSpecified,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Invalid DynamicType with Empty TypeData should throw Exception"{ $null = $ps.AddScript("Update-TypeData -TypeName System.String") $ps.Invoke() $ps.HadErrors | Should -BeTrue $ps.Streams.Error[0].FullyQualifiedErrorId | Should -BeExactly "TypeDataEmpty,Microsoft.PowerShell.Commands.UpdateTypeDataCommand" } It "Update-TypeData with Valid Standard Members Serialization Method String should work"{ $null = $ps.AddScript('Update-TypeData -SerializationMethod string -StringSerializationSource Length -TargetTypeForDeserialization string -TypeName System.String') $ps.Invoke() $ps.Commands.Clear(); $null = $ps.AddScript('"string".PSStandardMembers.SerializationMethod') $ps.Invoke() | Should -BeExactly "String" $ps.Commands.Clear(); $null = $ps.AddScript('"string".PSStandardMembers.StringSerializationSource') $ps.Invoke() | Should -Be 6 $ps.Commands.Clear(); $null = $ps.AddScript('"string".PSStandardMembers.TargetTypeForDeserialization') $ps.Invoke() | Should -BeExactly "string" } It "Update-TypeData with Valid Standard Members Serialization Method SpecificProperties should work"{ $null = $ps.AddScript('Update-TypeData -SerializationMethod SpecificProperties -StringSerializationSource Length -PropertySerializationSet Length -InheritPropertySerializationSet $true -SerializationDepth 2 -TypeName System.String') $ps.Invoke() $ps.Commands.Clear();$null=$ps.AddScript('"string".PSStandardMembers.SerializationMethod') $ps.Invoke() | Should -BeExactly "SpecificProperties" $ps.Commands.Clear();$null=$ps.AddScript('"string".PSStandardMembers.StringSerializationSource') $ps.Invoke() | Should -Be 6 $ps.Commands.Clear();$null=$ps.AddScript('"string".PSStandardMembers.SerializationDepth') $ps.Invoke() | Should -Be 2 $ps.Commands.Clear();$null=$ps.AddScript('"string".PSStandardMembers.InheritPropertySerializationSet') $ps.Invoke() | Should -BeExactly "True" } It "Update-TypeData with Valid Standard Members Serialization Method AllPublicProperties should work"{ $null = $ps.AddScript('Update-TypeData -SerializationMethod AllPublicProperties -StringSerializationSource Length -SerializationDepth 2 -TypeName System.String') $ps.Invoke() $ps.Commands.Clear();$ps.AddScript('"string".PSStandardMembers.SerializationMethod') $ps.Invoke() | Should -BeExactly "AllPublicProperties" $ps.Commands.Clear();$ps.AddScript('"string".PSStandardMembers.StringSerializationSource') $ps.Invoke() | Should -Be 6 $ps.Commands.Clear();$ps.AddScript('"string".PSStandardMembers.SerializationDepth') $ps.Invoke() | Should -Be 2 } It "Update-TypeData with Valid ISS UpdateType Command Test With DynamicType Set should work"{ $ps.AddScript('Update-TypeData -MemberType NoteProperty -MemberName "TestNote" -Value "test the note" -SerializationMethod SpecificProperties -SerializationDepth 5 -PropertySerializationSet Length -DefaultDisplayPropertySet Length -TypeName System.String') $ps.Invoke() $ps.Commands.Clear();$null = $ps.AddScript('"string".TestNote') $ps.Invoke() | Should -BeExactly "test the note" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.SerializationMethod') $ps.Invoke() | Should -BeExactly "SpecificProperties" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.SerializationDepth') $ps.Invoke() | Should -Be 5 $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.PropertySerializationSet.ReferencedPropertyNames[0]') $ps.Invoke() | Should -BeExactly "Length" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.DefaultDisplayPropertySet.ReferencedPropertyNames[0]') $ps.Invoke() | Should -BeExactly "Length" $ps.Commands.Clear();$null = $ps.AddScript('Update-TypeData -MemberType NoteProperty -MemberName TestNote -Value "test the note again" -TargetTypeForDeserialization string -Force -TypeName System.String') $ps.Invoke() $ps.Commands.Clear();$null = $ps.AddScript('"string".TestNote') $ps.Invoke() | Should -BeExactly "test the note again" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.SerializationMethod') $ps.Invoke() | Should -BeExactly "SpecificProperties" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.SerializationDepth') $ps.Invoke() | Should -Be 5 $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.PropertySerializationSet.ReferencedPropertyNames[0]') $ps.Invoke() | Should -BeExactly "Length" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.DefaultDisplayPropertySet.ReferencedPropertyNames[0]') $ps.Invoke() | Should -BeExactly "Length" $ps.Commands.Clear();$null = $ps.AddScript('"string".PSStandardMembers.TargetTypeForDeserialization') $ps.Invoke() | Should -BeExactly "string" } It "Update-TypeData with Valid ISS UpdateType Command Test With StrongType Set should work"{ $ps.AddScript('Update-TypeData -TypeName System.Array -MemberType NoteProperty -MemberName TestNote -Value "TestNote"') $ps.Commands.AddStatement() $ps.AddScript('Update-TypeData -TypeName System.Array -MemberType AliasProperty -MemberName TestAlias -Value "Length"') $script1="script method" $ps.Commands.AddStatement() $ps.AddScript("Update-TypeData -TypeName System.Array -MemberType ScriptMethod -MemberName TestScriptMethod -Value {'$script1'}") $script2='$this.Length' $ps.Commands.AddStatement() $ps.AddScript("Update-TypeData -TypeName System.Array -MemberType ScriptProperty -MemberName TestScriptProperty -Value {$script2}") $ps.Commands.AddStatement() $ps.AddScript('Update-TypeData -TypeName System.Array -SerializationMethod AllPublicProperties -SerializationDepth 2 -StringSerializationSource Length -TargetTypeForDeserialization string') $ps.Invoke() $ps.Commands.Clear();$ps.AddScript('(1, 3).TestNote').Invoke() | Should -BeExactly "TestNote" $ps.Commands.Clear();$ps.AddScript('(1, 3).TestAlias').Invoke() | Should -Be 2 $ps.Commands.Clear();$ps.AddScript('(1, 3).TestScriptMethod()').Invoke() | Should -BeExactly "script method" $ps.Commands.Clear();$ps.AddScript('(1, 3).TestScriptProperty').Invoke() | Should -Be 2 $ps.Commands.Clear();$ps.AddScript('(1, 3).PSStandardMembers.SerializationMethod').Invoke() | Should -BeExactly "AllPublicProperties" $ps.Commands.Clear();$ps.AddScript('(1, 3).PSStandardMembers.SerializationDepth').Invoke() | Should -Be 2 $ps.Commands.Clear();$ps.AddScript('(1, 3).PSStandardMembers.StringSerializationSource').Invoke() | Should -Be 2 $ps.Commands.Clear();$ps.AddScript('(1, 3).PSStandardMembers.TargetTypeForDeserialization').Invoke() | Should -BeExactly "string" } It "Update-TypeData with ISS Type Table API Test Add And Remove TypeData should work" -pending { try{ Update-TypeData -TypeName System.Object[] -MemberType NoteProperty -MemberName TestNote -Value "TestNote" Update-TypeData -TypeName System.Object[] -MemberType AliasProperty -MemberName TestAlias -Value "Length" $script1={"script method"} Update-TypeData -TypeName System.Object[] -MemberType ScriptMethod -MemberName TestScriptMethod -Value $script1 $script2={$this.Length} Update-TypeData -TypeName System.Object[] -MemberType ScriptProperty -MemberName TestScriptProperty -Value $script2 Update-TypeData -TypeName System.Object[] -SerializationMethod AllPublicProperties -SerializationDepth 2 -StringSerializationSource Length -TargetTypeForDeserialization string (1, 3).TestNote | Should -BeExactly "TestNote" (1, 3).TestAlias | Should -Be 2 (1, 3).TestScriptMethod() | Should -BeExactly "script method" (1, 3).TestScriptProperty | Should -Be 2 (1, 3).PSStandardMembers.SerializationMethod | Should -BeExactly "AllPublicProperties" (1, 3).PSStandardMembers.SerializationDepth | Should -Be 2 (1, 3).PSStandardMembers.StringSerializationSource | Should -Be 2 (1, 3).PSStandardMembers.TargetTypeForDeserialization | Should -BeExactly "string" } finally { Remove-TypeData System.Object[] } } Context "Duplicate XML files" { BeforeAll { $xmlContent=@" <Types> <Type> <Name>System.Array</Name> <Members> <AliasProperty> <Name>Yada</Name> <ReferencedMemberName>Length</ReferencedMemberName> </AliasProperty> </Members> </Type> </Types> "@ $xmlContent>$testfile } It "Update-TypeData with Duplicate XML Files should work"{ $null = $ps.AddScript("Update-TypeData -AppendPath $testfile") $ps.Invoke() $ps.Commands.Clear() $ps.AddScript('$a=1..3').Invoke() $ps.Commands.Clear() $ps.AddScript('$a.Yada').Invoke() | Should -Be 3 $ps.AddScript("Remove-TypeData -Path $testfile").Invoke() $ps.HadErrors | Should -BeFalse } } }
combined_dataset/train/non-malicious/2166.ps1
2166.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Name of a Distribution Point Group where all non-distributed packages will be added to")] [ValidateNotNullOrEmpty()] [string]$DPGroupName ) Begin { try { Write-Verbose -Message "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug -Message "SiteCode: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } try { $SiteDrive = $SiteCode + ":" Import-Module -Name ConfigurationManager -ErrorAction Stop -Verbose:$false } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { try { Import-Module (Join-Path -Path (($env:SMS_ADMIN_UI_PATH).Substring(0,$env:SMS_ADMIN_UI_PATH.Length-5)) -ChildPath "\ConfigurationManager.psd1") -Force -ErrorAction Stop -Verbose:$false if ((Get-PSDrive $SiteCode -ErrorAction SilentlyContinue | Measure-Object).Count -ne 1) { New-PSDrive -Name $SiteCode -PSProvider "AdminUI.PS.Provider\CMSite" -Root $SiteServer -ErrorAction Stop -Verbose:$false } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "$($_.Exception.Message). Line: $($_.InvocationInfo.ScriptLineNumber)" ; break } } $CurrentLocation = $PSScriptRoot Set-Location -Path $SiteDrive -ErrorAction Stop -Verbose:$false } Process { try { $DPGroupID = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_DPGroupInfo -ComputerName $SiteServer -Filter "Name like '$($DPGroupName)'" -ErrorAction Stop | Select-Object -ExpandProperty GroupID } catch [System.Exception] { Write-Warning -Message "Unable to determine DPGroupID from specified DPGroupName" ; break Set-Location -Path $CurrentLocation } try { $DPGroupDistributedPackages = New-Object -TypeName System.Collections.ArrayList $DPGroupPackages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_DPGroupPackages -ComputerName $SiteServer -Filter "GroupID like '$($DPGroupID)'" if ($DPGroupPackages -ne $null) { foreach ($DPGroupPackage in $DPGroupPackages) { $DPGroupDistributedPackages.Add($DPGroupPackage.PkgID) | Out-Null } } } catch [System.Exception] { Write-Warning -Message "An error occurred while enumerating packages distributed to specified Distribution Point Group" ; break Set-Location -Path $CurrentLocation } try { $Packages = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_Package -ComputerName $SiteServer -ErrorAction Stop if ($Packages -ne $null) { foreach ($Package in $Packages) { if ($Package.PackageID -notin $DPGroupDistributedPackages) { if ($PSCmdlet.ShouldProcess($Package.Name,"Distribute")) { try { Start-CMContentDistribution -PackageName $Package.Name -DistributionPointGroupName $DPGroupName -ErrorAction Stop -Verbose:$false | Out-Null Write-Verbose -Message "Successfully distributed '$($Package.Name)' to Distribution Point Group '$($DPGroupName)'" Write-Verbose -Message "Allowing some time for Distribution Manager to process request" Start-Sleep -Seconds 5 } catch [System.Exception] { Write-Warning -Message $_.Exception.Message } } } } } else { Write-Warning -Message "No package where found on the specified Site Server" ; break Set-Location -Path $CurrentLocation } } catch [System.Exception] { Write-Warning -Message "$($_.Exception.Message). Line: $($_.InvocationInfo.ScriptLineNumber)" ; break Set-Location -Path $CurrentLocation } } End { Set-Location -Path $CurrentLocation }
combined_dataset/train/non-malicious/3892.ps1
3892.ps1
function Test-PoolCrud { $resourceGroup = Get-ResourceGroupName $accName = Get-ResourceName $poolName1 = Get-ResourceName $poolName2 = Get-ResourceName $resourceLocation = Get-ProviderLocation "Microsoft.NetApp" $poolSize = 4398046511104 $serviceLevel = "Premium" try { New-AzResourceGroup -Name $resourceGroup -Location $resourceLocation $retrievedAcc = New-AzNetAppFilesAccount -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName $newTagName = "tag1" $newTagValue = "tagValue1" $retrievedPool = New-AzNetAppFilesPool -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName -PoolName $poolName1 -PoolSize $poolSize -ServiceLevel $serviceLevel -Tag @{$newTagName = $newTagValue} Assert-AreEqual "$accName/$poolName1" $retrievedPool.Name Assert-AreEqual $serviceLevel $retrievedPool.ServiceLevel Assert-AreEqual True $retrievedPool.Tags.ContainsKey($newTagName) Assert-AreEqual "tagValue1" $retrievedPool.Tags[$newTagName].ToString() $retrievedPool = New-AzNetAppFilesPool -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName -PoolName $poolName2 -PoolSize $poolSize -ServiceLevel $serviceLevel -Confirm:$false Assert-AreEqual "$accName/$poolName2" $retrievedPool.Name $retrievedPool = New-AzNetAppFilesPool -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName -PoolName $poolName2 -PoolSize $poolSize -ServiceLevel $serviceLevel -WhatIf $retrievedPool = Get-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName Assert-True {"$accName/$poolName1" -eq $retrievedPool[0].Name -or "$accName/$poolName2" -eq $retrievedPool[0].Name} Assert-True {"$accName/$poolName1" -eq $retrievedPool[1].Name -or "$accName/$poolName2" -eq $retrievedPool[1].Name} Assert-AreEqual 2 $retrievedPool.Length $retrievedPool = Get-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName -PoolName $poolName1 Assert-AreEqual "$accName/$poolName1" $retrievedPool.Name $retrievedPoolById = Get-AzNetAppFilesPool -ResourceId $retrievedPool.Id Assert-AreEqual "$accName/$poolName1" $retrievedPoolById.Name $retrievedPool = Update-AzNetAppFilesPool -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName -PoolName $poolName1 -ServiceLevel "Standard" Assert-AreEqual "$accName/$poolName1" $retrievedPool.Name Assert-AreEqual "Standard" $retrievedPool.ServiceLevel $retrievedPool = Update-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName -PoolName $poolName1 Assert-AreEqual "$accName/$poolName1" $retrievedPool.Name Assert-AreEqual "Standard" $retrievedPool.ServiceLevel Remove-AzNetAppFilesPool -ResourceId $retrievedPoolById.Id Remove-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName -PoolName $poolName2 -WhatIf $retrievedPool = Get-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName Assert-AreEqual 1 $retrievedPool.Length Remove-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName -PoolName $poolName2 $retrievedPool = Get-AzNetAppFilesPool -ResourceGroupName $resourceGroup -AccountName $accName Assert-AreEqual 0 $retrievedPool.Length } finally { Clean-ResourceGroup $resourceGroup } } function Test-PoolPipelines { $resourceGroup = Get-ResourceGroupName $accName = Get-ResourceName $poolName1 = Get-ResourceName $poolName2 = Get-ResourceName $resourceLocation = Get-ProviderLocation "Microsoft.NetApp" $poolSize = 4398046511104 $serviceLevel = "Premium" try { New-AzResourceGroup -Name $resourceGroup -Location $resourceLocation New-AnfAccount -ResourceGroupName $resourceGroup -Location $resourceLocation -Name $accName | New-AnfPool -Name $poolName1 -PoolSize $poolSize -ServiceLevel $serviceLevel $retrievedPool = Get-AnfPool -ResourceGroupName $resourceGroup -AccountName $accName -Name $poolName1 | Update-AnfPool -ServiceLevel "Standard" Assert-AreEqual "Standard" $retrievedPool.ServiceLevel $retrievedPool = Get-AnfAccount -ResourceGroupName $resourceGroup -Name $accName | Update-AnfPool -Name $poolName1 -PoolSize $poolSize -ServiceLevel "Premium" Assert-AreEqual "Premium" $retrievedPool.ServiceLevel Get-AnfAccount -ResourceGroupName $resourceGroup -Name $accName | Remove-AnfPool -Name $poolName1 New-AnfPool -ResourceGroupName $resourceGroup -Location $resourceLocation -AccountName $accName -Name $PoolName1 -PoolSize $poolSize -ServiceLevel $serviceLevel Get-AnfAccount -ResourceGroupName $resourceGroup -Name $accName | New-AnfPool -PoolName $poolName2 -PoolSize $poolSize -ServiceLevel $serviceLevel Get-AnfPool -ResourceGroupName $resourceGroup -AccountName $accName -Name $poolName1 | Remove-AzNetAppFilesPool $retrievedPool = Get-AnfAccount -ResourceGroupName $resourceGroup -AccountName $accName | Get-AnfPool Assert-AreEqual 1 $retrievedPool.Length } finally { Clean-ResourceGroup $resourceGroup } }
combined_dataset/train/non-malicious/4022.ps1
4022.ps1
function Test-MoveAzureResource { $sourceResourceGroupName = "testResourceGroup1" $destinationResourceGroupName = "testResourceGroup2" $testResourceName1 = "testResource1" $testResourceName2 = "testResource2" $location = "West US" $apiversion = "2014-04-01" $providerNamespace = "Providers.Test" $resourceType = $providerNamespace + "/statefulResources" Register-AzResourceProvider -ProviderNamespace $providerNamespace -Force New-AzResourceGroup -Name $sourceResourceGroupName -Location $location -Force New-AzResourceGroup -Name $destinationResourceGroupName -Location $location -Force $resource1 = New-AzResource -Name $testResourceName1 -Location $location -Tags @{testtag = "testval"} -ResourceGroupName $sourceResourceGroupName -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -ApiVersion $apiversion -Force $resource2 = New-AzResource -Name $testResourceName2 -Location $location -Tags @{testtag = "testval"} -ResourceGroupName $sourceResourceGroupName -ResourceType $resourceType -PropertyObject @{"administratorLogin" = "adminuser"; "administratorLoginPassword" = "P@ssword1"} -ApiVersion $apiversion -Force Get-AzResource -ResourceGroupName $sourceResourceGroupName | Move-AzResource -DestinationResourceGroupName $destinationResourceGroupName -Force $endTime = [DateTime]::UtcNow.AddMinutes(10) while ([DateTime]::UtcNow -lt $endTime -and (@(Get-AzResource -ResourceGroupName $sourceResourceGroupName).Length -gt 0)) { [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(1000) } Assert-True { @(Get-AzResource -ResourceGroupName $sourceResourceGroupName).Length -eq 0 } Assert-True { @(Get-AzResource -ResourceGroupName $destinationResourceGroupName).Length -eq 2 } }
combined_dataset/train/non-malicious/sample_14_12.ps1
sample_14_12.ps1
# Copyright (C) 2020,2023 VMware, Inc. All rights reserved. . ".\utils.ps1" try { # IIS 7 and above $applicationHostConfigPath = Join-Path $env:windir "system32\inetsrv\config\applicationHost.config" if (Test-Path $applicationHostConfigPath) { $result = ((Get-Content $applicationHostConfigPath) | Select-String -Pattern "bindingInformation" -Context 0,1).Line Write-Host ($result -replace "/>", "/>`n") if ($result -ne $null) { $installPath = Join-Path $env:windir "system32\inetsrv\" Write-Host "IIS InstallPath="$installPath } } # IIS 6 and below $metaBaseXmlPath = Join-Path $env:windir "system32\inetsrv\MetaBase.xml" if (Test-Path $metaBaseXmlPath) { $result = ((Get-Content $metaBaseXmlPath) | Select-String -Pattern "Bindings" -Context 0,1).Line Write-Host ($result -replace "/>", "/>`n") if ($result -ne $null) { $installPath = Join-Path $env:windir "system32\inetsrv\" Write-Host "IIS InstallPath="$installPath } } } catch [System.Exception] { logError -function "get-iis-ports-info" -command "$_.message" -message "$_.TargetSite" }
combined_dataset/train/non-malicious/Get-ScriptPerformancePro.ps1
Get-ScriptPerformancePro.ps1
#############################################################################\n##\n## Get-ScriptPerformanceProfile\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nComputes the performance characteristics of a script, based on the transcript\nof it running at trace level 1.\n\n.DESCRIPTION\n\nTo profile a script:\n\n 1) Turn on script tracing in the window that will run the script:\n Set-PsDebug -trace 1\n 2) Turn on the transcript for the window that will run the script:\n Start-Transcript\n (Note the filename that PowerShell provides as the logging destination.)\n 3) Type in the script name, but don't actually start it.\n 4) Open another PowerShell window, and navigate to the directory holding\n this script. Type in '.\\Get-ScriptPerformanceProfile <transcript>',\n replacing <transcript> with the path given in step 2. Don't\n press <Enter> yet.\n 5) Switch to the profiled script window, and start the script.\n Switch to the window containing this script, and press <Enter>\n 6) Wait until your profiled script exits, or has run long enough to be\n representative of its work. To be statistically accurate, your script\n should run for at least ten seconds.\n 7) Switch to the window running this script, and press a key.\n 8) Switch to the window holding your profiled script, and type:\n Stop-Transcript\n 9) Delete the transcript.\n\n.NOTES\n\nYou can profile regions of code (ie: functions) rather than just lines\nby placing the following call at the start of the region:\n Write-Debug "ENTER <region_name>"\nand the following call and the end of the region:\n Write-Debug "EXIT"\nThis is implemented to account exclusively for the time spent in that\nregion, and does not include time spent in regions contained within the\nregion. For example, if FunctionA calls FunctionB, and you've surrounded\neach by region markers, the statistics for FunctionA will not include the\nstatistics for FunctionB.\n\n#>\n\nparam(\n ## The path of the transcript log file\n [Parameter(Mandatory = $true)]\n $Path\n)\n\nSet-StrictMode -Version Latest\n\nfunction Main\n{\n ## Run the actual profiling of the script. $uniqueLines gets\n ## the mapping of line number to actual script content.\n ## $samples gets a hashtable mapping line number to the number of times\n ## we observed the script running that line.\n $uniqueLines = @{}\n $samples = GetSamples $uniqueLines\n\n "Breakdown by line:"\n "----------------------------"\n\n ## Create a new hash table that flips the $samples hashtable --\n ## one that maps the number of times sampled to the line sampled.\n ## Also, figure out how many samples we got altogether.\n $counts = @{}\n $totalSamples = 0;\n foreach($item in $samples.Keys)\n {\n $counts[$samples[$item]] = $item\n $totalSamples += $samples[$item]\n }\n\n ## Go through the flipped hashtable, in descending order of number of\n ## samples. As we do so, output the number of samples as a percentage of\n ## the total samples. This gives us the percentage of the time our\n ## script spent executing that line.\n foreach($count in ($counts.Keys | Sort-Object -Descending))\n {\n $line = $counts[$count]\n $percentage = "{0:#0}" -f ($count * 100 / $totalSamples)\n "{0,3}%: Line {1,4} -{2}" -f $percentage,$line,\n $uniqueLines[$line]\n }\n\n ## Go through the transcript log to figure out which lines are part of\n ## any marked regions. This returns a hashtable that maps region names\n ## to the lines they contain.\n ""\n "Breakdown by marked regions:"\n "----------------------------"\n $functionMembers = GenerateFunctionMembers\n\n ## For each region name, cycle through the lines in the region. As we\n ## cycle through the lines, sum up the time spent on those lines and\n ## output the total.\n foreach($key in $functionMembers.Keys)\n {\n $totalTime = 0\n foreach($line in $functionMembers[$key])\n {\n $totalTime += ($samples[$line] * 100 / $totalSamples)\n }\n\n $percentage = "{0:#0}" -f $totalTime\n "{0,3}%: {1}" -f $percentage,$key\n }\n}\n\n## Run the actual profiling of the script. $uniqueLines gets\n## the mapping of line number to actual script content.\n## Return a hashtable mapping line number to the number of times\n## we observed the script running that line.\nfunction GetSamples($uniqueLines)\n{\n ## Open the log file. We use the .Net file I/O, so that we keep\n ## monitoring just the end of the file. Otherwise, we would make our\n ## timing inaccurate as we scan the entire length of the file every time.\n $logStream = [System.IO.File]::Open($Path, "Open", "Read", "ReadWrite")\n $logReader = New-Object System.IO.StreamReader $logStream\n\n $random = New-Object Random\n $samples = @{}\n\n $lastCounted = $null\n\n ## Gather statistics until the user presses a key.\n while(-not $host.UI.RawUI.KeyAvailable)\n {\n ## We sleep a slightly random amount of time. If we sleep a constant\n ## amount of time, we run the very real risk of improperly sampling\n ## scripts that exhibit periodic behaviour.\n $sleepTime = [int] ($random.NextDouble() * 100.0)\n Start-Sleep -Milliseconds $sleepTime\n\n ## Get any content produced by the transcript since our last poll.\n ## From that poll, extract the last DEBUG statement (which is the last\n ## line executed.)\n $rest = $logReader.ReadToEnd()\n $lastEntryIndex = $rest.LastIndexOf("DEBUG: ")\n\n ## If we didn't get a new line, then the script is still working on\n ## the last line that we captured.\n if($lastEntryIndex -lt 0)\n {\n if($lastCounted) { $samples[$lastCounted] ++ }\n continue;\n }\n\n ## Extract the debug line.\n $lastEntryFinish = $rest.IndexOf("\\n", $lastEntryIndex)\n if($lastEntryFinish -eq -1) { $lastEntryFinish = $rest.length }\n\n $scriptLine = $rest.Substring(\n $lastEntryIndex, ($lastEntryFinish - $lastEntryIndex)).Trim()\n if($scriptLine -match 'DEBUG:[ \\t]*([0-9]*)\\+(.*)')\n {\n ## Pull out the line number from the line\n $last = $matches[1]\n\n $lastCounted = $last\n $samples[$last] ++\n\n ## Pull out the actual script line that matches the line number\n $uniqueLines[$last] = $matches[2]\n }\n\n ## Discard anything that's buffered during this poll, and start\n ## waiting again\n $logReader.DiscardBufferedData()\n }\n\n ## Clean up\n $logStream.Close()\n $logReader.Close()\n\n $samples\n}\n\n## Go through the transcript log to figure out which lines are part of any\n## marked regions. This returns a hashtable that maps region names to\n## the lines they contain.\nfunction GenerateFunctionMembers\n{\n ## Create a stack that represents the callstack. That way, if a marked\n ## region contains another marked region, we attribute the statistics\n ## appropriately.\n $callstack = New-Object System.Collections.Stack\n $currentFunction = "Unmarked"\n $callstack.Push($currentFunction)\n\n $functionMembers = @{}\n\n ## Go through each line in the transcript file, from the beginning\n foreach($line in (Get-Content $Path))\n {\n ## Check if we're entering a monitor block\n ## If so, store that we're in that function, and push it onto\n ## the callstack.\n if($line -match 'write-debug "ENTER (.*)"')\n {\n $currentFunction = $matches[1]\n $callstack.Push($currentFunction)\n }\n ## Check if we're exiting a monitor block\n ## If so, clear the "current function" from the callstack,\n ## and store the new "current function" onto the callstack.\n elseif($line -match 'write-debug "EXIT"')\n {\n [void] $callstack.Pop()\n $currentFunction = $callstack.Peek()\n }\n ## Otherwise, this is just a line with some code.\n ## Add the line number as a member of the "current function"\n else\n {\n if($line -match 'DEBUG:[ \\t]*([0-9]*)\\+')\n {\n ## Create the arraylist if it's not initialized\n if(-not $functionMembers[$currentFunction])\n {\n $functionMembers[$currentFunction] =\n New-Object System.Collections.ArrayList\n }\n\n ## Add the current line to the ArrayList\n $hitLines = $functionMembers[$currentFunction]\n if(-not $hitLines.Contains($matches[1]))\n {\n [void] $hitLines.Add($matches[1])\n }\n }\n }\n }\n\n $functionMembers\n}\n\n. Main
combined_dataset/train/non-malicious/231.ps1
231.ps1
function Get-SCSMServiceRequestComment { PARAM ( [Parameter(ParameterSetName = 'General', Mandatory = $true)] $DateTime = $((Get-Date).AddHours(-24)), [Parameter(ParameterSetName = 'GUID')] $GUID ) IF ($PSBoundParameters['GUID']) { $Tickets = Get-SCSMObject -id $GUID } ELSE { if ($DateTime -is [String]){ $DateTime = Get-Date $DateTime} $DateTime = $DateTime.ToString(“yyy-MM-dd HH:mm:ss”) $Tickets = Get-SCSMObject -Class (Get-SCSMClass System.WorkItem.servicerequest$) -Filter "CreatedDate -gt '$DateTime'" } $Tickets | ForEach-Object { $CurrentTicket = $_ $relatedObjects = Get-scsmrelatedobject -SMObject $CurrentTicket Foreach ($Comment in ($relatedObjects | Where-Object { $_.classname -eq 'System.WorkItem.TroubleTicket.UserCommentLog' -or $_.classname -eq 'System.WorkItem.TroubleTicket.AnalystCommentLog' -or $_.classname -eq 'System.WorkItem.TroubleTicket.AuditCommentLog'})) { [pscustomobject][ordered] @{ TicketName = $CurrentTicket.Name TicketClassName = $CurrentTicket.Classname TicketDisplayName = $CurrentTicket.DisplayName TicketID = $CurrentTicket.ID TicketGUID = $CurrentTicket.get_id() TicketSupportGroup = $CurrentTicket.SupportGroup.displayname TicketAssignedTo = $CurrentTicket.AssignedTo TicketCreatedDate = $CurrentTicket.CreatedDate Comment = $Comment.Comment CommentEnteredBy = $Comment.EnteredBy CommentEnteredDate = $Comment.EnteredDate CommentClassName = $Comment.ClassName } } } }
combined_dataset/train/non-malicious/sample_40_4.ps1
sample_40_4.ps1
# # Module manifest for module 'OCI.PSModules.Opensearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opensearch.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opensearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster', 'Get-OCIOpensearchClusterBackup', 'Get-OCIOpensearchClusterBackupsList', 'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList', 'Get-OCIOpensearchWorkRequest', 'Get-OCIOpensearchWorkRequestErrorsList', 'Get-OCIOpensearchWorkRequestLogsList', 'Get-OCIOpensearchWorkRequestsList', 'Invoke-OCIOpensearchOpensearchClusterRestore', 'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal', 'Invoke-OCIOpensearchResizeOpensearchClusterVertical', 'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster', 'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster', 'Update-OCIOpensearchClusterBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_16_15.ps1
sample_16_15.ps1
trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ continue } If (!$Is_SiteServer) { TraceOut "ConfigMgr Site Server not detected. This script gathers data only from a Site Server. Exiting." exit 0 } TraceOut "Started" Import-LocalizedData -BindingVariable ScriptStrings $sectiondescription = "Configuration Manager Server Information" # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_ServerInfo TraceOut " Getting Server Information" # ---------------------- # Current Time: # ---------------------- AddTo-CMServerSummary -Name "Current Time" -Value $CurrentTime # ------------- # Computer Name # ------------- AddTo-CMServerSummary -Name "Server Name" -Value $ComputerName # ---------- # Site Code # ---------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Site Code" AddTo-CMServerSummary -Name "Site Code" -Value $Temp # ---------- # Site Code # ---------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Identification") "Parent Site Code" AddTo-CMServerSummary -Name "Parent Site Code" -Value $Temp # ---------- # Site Type # ---------- # $SiteType = Get-RegValueWithError ($Reg_SMS + "\Setup") "Type" If ($SiteType -eq 8) { AddTo-CMServerSummary -Name "Site Type" -Value "Central Administration Site" } ElseIf ($SiteType -eq 1) { AddTo-CMServerSummary -Name "Site Type" -Value "Primary Site" } ElseIf ($SiteType -eq 2) { AddTo-CMServerSummary -Name "Site Type" -Value "Secondary Site" } else { AddTo-CMServerSummary -Name "Site Type" -Value $SiteType } # ------------- # Site Version # ------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "Full Version" AddTo-CMServerSummary -Name "Site Version" -Value $Temp # ---------------- # Monthly Version # ---------------- if ($global:SiteType -eq 2) { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available on a Secondary Site" } else { $Temp = Get-CimInstance -Computer $SMSProviderServer -Namespace $SMSProviderNamespace -Class SMS_Identification -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value $Temp.MonthlyReleaseVersion } else { AddTo-CMServerSummary -Name "MonthlyReleaseVersion" -Value "Not Available" } } # ------------- # CU Level # ------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\Setup") "CULevel" AddTo-CMServerSummary -Name "CU Level" -Value $Temp # ------------- # ADK Version # ------------- $global:ADKVersion = Get-ADKVersion AddTo-CMServerSummary -Name "ADK Version" -Value $global:ADKVersion # ---------------------------------------------------------- # Installation Directory - defined in utils_ConfigMgr12.ps1 # ---------------------------------------------------------- If ($null -ne $SMSInstallDir) { AddTo-CMServerSummary -Name "Installation Directory" -Value $SMSInstallDir } else { AddTo-CMServerSummary -Name "Installation Directory" -Value "Error obtaining value from Registry" } # ----------------- # Provider Location # ----------------- if ($global:SiteType -eq 2) { AddTo-CMServerSummary -Name "Provider Location" -Value "Not available on a Secondary Site" } else { If ($null -ne $global:SMSProviderServer) { AddTo-CMServerSummary -Name "Provider Location" -Value $SMSProviderServer } else { AddTo-CMServerSummary -Name "Provider Location" -Value "Error obtaining value from Registry" } } # ----------- # SQL Server # ----------- $Temp = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Server" AddTo-CMDatabaseSummary -Name "SQL Server" -Value $Temp -NoToSummaryQueries # -------------- # Database Name # -------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Database Name" AddTo-CMDatabaseSummary -Name "Database Name" -Value $Temp -NoToSummaryQueries # ---------------- # SQL Ports # ---------------- $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "Port" AddTo-CMDatabaseSummary -Name "SQL Port" -Value $Temp -NoToSummaryQueries $Temp = Get-RegValueWithError ($Reg_SMS + "\SQL Server\Site System SQL Account") "SSBPort" AddTo-CMDatabaseSummary -Name "SSB Port" -Value $Temp -NoToSummaryQueries # ----------------------- # SMSExec Service Status # ----------------------- $Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_Executive'} | Select-Object Status If ($null -ne $Temp) { if ($Temp.Status -eq 'Running') { $Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SMSExec'} | Select-Object StartTime AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "Running. StartTime = $($Temp2.StartTime)" } else { AddTo-CMServerSummary -Name "SMS_Executive Status" -Value $Temp.Status } } Else { AddTo-CMServerSummary -Name "SMS_Executive Status" -Value "ERROR: Service Not found" } # ----------------------- # SiteComp Service Status # ----------------------- $Temp = Get-Service | Where-Object {$_.Name -eq 'SMS_SITE_COMPONENT_MANAGER'} | Select-Object Status If ($null -ne $Temp) { if ($Temp.Status -eq 'Running') { $Temp2 = Get-Process | Where-Object {$_.ProcessName -eq 'SiteComp'} | Select-Object StartTime AddTo-CMServerSummary -Name "SiteComp Status" -Value "Running. StartTime = $($Temp2.StartTime)" } else { AddTo-CMServerSummary -Name "SiteComp Status" -Value $Temp.Status } } Else { AddTo-CMServerSummary -Name "SiteComp Status" -Value "ERROR: Service Not found" } # ---------------------- # SMSExec Thread States # ---------------------- $TempFileName = $ComputerName + "_CMServer_SMSExecThreads.TXT" $OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName) Get-ItemProperty HKLM:\Software\Microsoft\SMS\Components\SMS_Executive\Threads\* -ErrorAction SilentlyContinue -ErrorVariable DirError ` | Select-Object PSChildName, 'Current State', 'Startup Type', 'Requested Operation', DLL ` | Sort-Object @{Expression='Current State';Descending=$true}, @{Expression='PSChildName';Ascending=$true} ` | Format-Table -AutoSize | Out-String -Width 200 | Out-File -FilePath $OutputFile If ($DirError.Count -eq 0) { CollectFiles -filesToCollect $OutputFile -fileDescription "SMSExec Thread States" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "SMSExec Thread States" -Value "Review $TempFileName" -NoToSummaryReport Remove-Item $OutputFile -Force } else { AddTo-CMServerSummary -Name "SMSExec Thread States" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # ----------------- # SQL Server SPN's # ----------------- #TraceOut " Getting SQL SPNs" #$TempFileName = ($ComputerName + "_CMServer_SQLSPN.TXT") #$FileToCollect = join-path $pwd.Path $TempFileName #$CmdToRun = ".\psexec.exe /accepteula -s $pwd\ldifde2K3x86.exe -f $FileToCollect -l serviceprincipalname -r `"(serviceprincipalname=MSSQLSvc/$ConfigMgrDBServer*)`" -p subtree" #RunCmD -commandToRun $CmdToRun -collectFiles $false #If (Test-Path $FileToCollect) { # If ((Get-Content $FileToCollect) -ne $null) { # If ((Get-Content $FileToCollect) -ne "") { # CollectFiles -filesToCollect $FileToCollect -fileDescription "SQL SPNs" -sectionDescription $sectiondescription -noFileExtensionsOnDescription # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Review $TempFileName") -NoToSummaryReport # } # Else { # TraceOut " No SPN's found. Output file was null." # # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport # } # } # Else { # TraceOut " No SPN's found. Output file was empty." # # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. No SPNs found!") -NoToSummaryReport # } #} #Else { # TraceOut " No SPN's found. Output file was not found." # AddTo-CMServerSummary -Name "SQL Server SPNs" -Value ("Error. SPN Query Failed!") -NoToSummaryReport #} # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_Hierarchy TraceOut " Getting Site Hierarchy" # ------------------ # Hierarchy Details # ------------------ $TempFileName = $ComputerName + "_CMServer_Hierarchy.txt" $OutputFile = join-path $Env:windir ("TEMP\" + $TempFileName) Run-DiagExpression .\GetCM12Hierarchy.ps1 IF (Test-Path $OutputFile) { CollectFiles -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport Remove-Item $OutputFile -Force } <# $CommandLineToExecute = $Env:windir + "\system32\cscript.exe GetCM12Hierarchy.VBS" If (($RemoteStatus -eq 0) -or ($RemoteStatus -eq 1)) { # Local Execution If ($null -eq $global:DatabaseConnectionError) { RunCmD -commandToRun $CommandLineToExecute -sectionDescription $sectiondescription -filesToCollect $OutputFile -fileDescription "Hierarchy Details" -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "Hierarchy Details" -Value ("Review $TempFileName") -NoToSummaryReport Remove-Item $OutputFile -Force } Else { AddTo-CMServerSummary -Name "Hierarchy Details" -Value $DatabaseConnectionError -NoToSummaryReport } } #> # ---------------- # Write Progress # ---------------- Write-DiagProgress -Activity $ScriptStrings.ID_SCCM_ACTIVITY_CM07ServerInfo -Status $ScriptStrings.ID_SCCM_CM07ServerInfo_FileVer TraceOut " Getting File Versions" # --------------------- # Binary Versions List # --------------------- $TempFileName = ($ComputerName + "_CMServer_FileVersions.TXT") $OutputFile = join-path $pwd.path $TempFileName Get-ChildItem ($SMSInstallDir + "\bin") -recurse -include *.dll,*.exe -ErrorVariable DirError -ErrorAction SilentlyContinue | ` ForEach-Object {[System.Diagnostics.FileVersionInfo]::GetVersionInfo($_)} | ` Select-Object FileName, FileVersion, ProductVersion | Format-Table -AutoSize | ` Out-File $OutputFile -Width 1000 If ($DirError.Count -eq 0) { CollectFiles -filesToCollect $OutputFile -fileDescription "Server File Versions" -sectionDescription $sectiondescription -noFileExtensionsOnDescription AddTo-CMServerSummary -Name "File Versions" -Value ("Review $TempFileName") -NoToSummaryReport } else { AddTo-CMServerSummary -Name "File Versions" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # -------------------- # RCM Inbox File List # -------------------- TraceOut " Getting File List for RCM.box" $TempFileName = ($ComputerName + "_CMServer_RCMFileList.TXT") $OutputFile = join-path $pwd.path $TempFileName Get-ChildItem ($SMSInstallDir + "\inboxes\RCM.box") -Recurse -ErrorVariable DirError -ErrorAction SilentlyContinue | ` Select-Object CreationTime, LastAccessTime, FullName, Length, Mode | Sort-Object FullName | Format-Table -AutoSize | ` Out-File $OutputFile -Width 1000 If ($DirError.Count -eq 0) { AddTo-CMServerSummary -Name "RCM.box File List" -Value ("Review $TempFileName") -NoToSummaryReport CollectFiles -filesToCollect $OutputFile -fileDescription "RCM.box File List" -sectionDescription $sectiondescription -noFileExtensionsOnDescription } else { AddTo-CMServerSummary -Name "RCM.box File List" -Value ("ERROR: " + $DirError[0].Exception.Message) -NoToSummaryReport $DirError.Clear() } # Server Info File is collected in DC_CM12SQLInfo.ps1. Need to make sure this script runs before that. # $ServerInfo | Out-File $ServerInfoFile -Append -Width 200 TraceOut "Completed" # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuLz0GycFAQ7KQ # LfpRFMTYdSduKXDIMT/Km56vXh0X9aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINN2r62K9efzFqmqClW8HZZ4 # EiEUDo7jgH7RuqUeykhVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhK/DNPiVO2UFTKiwcxbcIaNPfjV6zEjpxLIs0NbXrXur6PlOA01qDI7N # C53HjHNe1LRC5rp0h6nwwxxv1JASDx6MQWUc5+4HJInFnZlWXlj6Q6sZ+dFQUiws # Az5dCbS8azp4jsc6/W1nUlhFor6tow/LsW+W/2S5dGiZhNyvWBEa8ZEFEGwCu+O3 # 2ebtocTDIFJ8sqdaCVXcbPJzBNOUdw+3pep5emg9Bjgiq5Ku2TySWZnAx1UrjhVx # clpXpH1tDFPYQvx9PlLJCUBZND1I462hFFH2neHCeigv8bCViYr/WPW8WgPDwFMq # 2kIm/ECBkzjKsSg/ecJzGRfpY4W9BaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD5h7js0uX/xprpcS1w4HLYZ8UCVHRfmVcWnGLRPPtKEQIGZxqBxlgG # GBMyMDI0MTAyODExNDA0Mi4yMzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAgUsdylc26QNxX0nGAl0D4j13aeEtJzbM6kMScqnCPUzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIA4DBQhKoqmyTt0q/nerXxhkXt # 2aB6hZqAOVAz+2fTWmYfhlAtT/6KQ9smOpMdAMXhMOcM3I/y7O3lPvWWxrvXmOsa # HwH7T+WWTwJdQEzKTbjvK+bpDskMTofTdOcRr61uoTjQ6RlrlouVci0b0Bi8f7Ts # XqiKOhMUtS/pKPp1VHLaMJ2xX1M7X8+9ZjTHT4E0K8xTPRAYj31JKKXLnBpQj27U # M/C4GsqIyPAYEWexovwoAFsFi6fnl4VMv5HzLg/Vybke74x8qvabVIUbOif8O2PR # YzOOXd18zXQ4GX1kYG1H2EkRakbgW5KZ46yU18Gq2+Q3qtRkl1FH8xwnYlG5ddsk # GGxOVI7BZZJFTzHcNNNWMFjDMhu7R/zDh3mGLvmDOLAQ/1+HPcU6lFsOboCycjtR # y8lYg2G6P4dbeMOOhA8Ys3PiH0u6SgLQ+KxbURV9hhD3eMDDYETxg0QDBpHJjERD # C2LJ5iYQbRbTqLPqgBXP6eU282EW65pBmSdXnCQdFa1w0y77Mz0ztbdeXWgsyw6P # 0DMyuWIM6IE8LfM/IWWHBGs0Vt6U5NJ44nhJlunuG33QY1YIEhh/kCr6ogEginrw # /TE7HneFNN0sNVyaPmeGdDuYjgR7k208Ynpu1avmC8bjsx37mkYfgamJw4AsTuhz # cWbwZmbcUXCJlcdxZf4= # SIG # End signature block
combined_dataset/train/non-malicious/PasswordNeverExpires.ps1
PasswordNeverExpires.ps1
# Synopsis: # Windows Script to collect usernames and OU locations # for User Account with Password Set to Never Expire # and email .txt list to email address # Author: VulcanX # Date: 2011/10/11 # Version: 1.0 # Requirements: # -Quest PSSnapin Installed Locally # -SMTP Access to Relay/Exchange # Import AD module for additionals cmdlets Import-Module ActiveDirectory # Add Quest Snapin for Get-Q* cmdlets Add-PSSnapin Quest.ActiveRoles.ADManagement # Create variable for use later in script $currentDate = get-date -format "yyyy-MM-dd" # Find all users with Password Set to Never Expire and Export to a txt Get-Qaduser -PasswordNeverExpires | Out-File "C:\\Password_Exp\\Exp_$currentdate.txt" # Create variable for logfile location + name $attach = "C:\\Password_Exp\\Exp_$currentdate.txt" # Send Email with .txt attachment to infosec Send-MailMessage -From 'email1@domain.com' -to 'email2@domain.com' -Subject ` "Password Expiration - $currentDate" -Body "User Accounts whose Passwords Never Expire `n `r Please refer to the txt attachment" ` -Attachments $attach -SmtpServer 'smtp01.domain.com'
combined_dataset/train/non-malicious/4098.ps1
4098.ps1
Set-Variable -Name Command -Scope Global -Force Set-Variable -Name Computer -Scope Global -Force Set-Variable -Name Computers -Scope Global -Force Set-Variable -Name i -Scope Global -Value 1 -Force Set-Variable -Name Output -Scope Global -Force Set-Variable -Name RelativePath -Scope Global -Force Set-Variable -Name Results -Scope Global -Force Set-Variable -Name Username -Scope Global -Force Function RenameWindow ($Title) { Set-Variable -Name a -Scope Local -Force $a = (Get-Host).UI.RawUI $a.WindowTitle = $Title Remove-Variable -Name a -Scope Local -Force } Function GetRelativePath{ $Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" } cls RenameWindow "Who's Logged On and Logged Off?" GetRelativePath $Results = @() $Username = @() $Computers = Get-Content -Path $Global:RelativePath"Computers.txt" $Size = $Computers.Length Foreach ($Computer in $Computers) { Write-Host "Scanning System "$i" of "$Size Write-Host Write-Host "System:"$Computer $Command = $Global:RelativePath+"PsLoggedon.exe -x -l \\$Computer" $Output = Invoke-Expression $Command If ($Output.SyncRoot[2] -eq "Users logged on locally:") { $Username += $Output.SyncRoot[3].Trim() } else { $Username += "N/A" } $Output = $Output.SyncRoot[2] $Output = $Output.Substring(0,$Output.Length-1) $Results += $Output $i = $i + 1 cls } cls for ($i=0 ; $i -lt $Results.length ; $i++) { If ($Results[$i] -eq "No one is logged on locally") { Write-Host $Computers[$i]": "$Results[$i] -BackgroundColor Yellow -ForegroundColor Black } elseIf ($Results[$i] -eq "Users logged on locally") { Write-Host $Computers[$i]": "$Results[$i]" -- "$Username[$i]-ForegroundColor White } else { Write-Host $Computers[$i]": "$Results[$i]" -- "$Username[$i]-ForegroundColor Red } } Remove-Variable -Name Command -Scope Global -Force Remove-Variable -Name Computer -Scope Global -Force Remove-Variable -Name Computers -Scope Global -Force Remove-Variable -Name i -Scope Global -Force Remove-Variable -Name Output -Scope Global -Force Remove-Variable -Name RelativePath -Scope Global -Force Remove-Variable -Name Results -Scope Global -Force Remove-Variable -Name Username -Scope Global -Force
combined_dataset/train/non-malicious/Bytes.ps1
Bytes.ps1
#requires -version 2.0\nAdd-Type @"\npublic class Shift {\n public static int Right(int x, int count) { return x >> count; }\n public static uint Right(uint x, int count) { return x >> count; }\n public static long Right(long x, int count) { return x >> count; }\n public static ulong Right(ulong x, int count) { return x >> count; }\n public static int Left(int x, int count) { return x << count; }\n public static uint Left(uint x, int count) { return x << count; }\n public static long Left(long x, int count) { return x << count; }\n public static ulong Left(ulong x, int count) { return x << count; }\n} \n"@\n\n\n\n#.Example \n# Shift-Left 16 1 ## returns 32\n#.Example \n# 8,16 |Shift-Left ## returns 16,32\nfunction Shift-Left {\nPARAM( $x=1, $y )\nBEGIN {\n if($y) {\n [Shift]::Left( $x, $y )\n }\n}\nPROCESS {\n if($_){\n [Shift]::Left($_, $x)\n }\n}\n}\n\n\n#.Example \n# Shift-Right 8 1 ## returns 4\n#.Example \n# 2,4,8 |Shift-Right 2 ## returns 0,1,2\nfunction Shift-Right {\nPARAM( $x=1, $y )\nBEGIN {\n if($y) {\n [Shift]::Right( $x, $y )\n }\n}\nPROCESS {\n if($_){\n [Shift]::Right($_, $x)\n }\n}\n}\n\n\nfunction Write-FileByte {\n################################################################\n#.Synopsis\n#  Overwrites or creates a file with an array of raw bytes.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#.Parameter Path\n#  Path to the file as a string or as System.IO.FileInfo object.\n#  Path as a string can be relative, absolute, or a simple file\n#  name if the file is in the present working directory.\n#.Example\n#  write-filebyte -bytearray $bytes -path outfile.bin\n#.Example\n#  [Ref] $bytes | write-filebyte -path c:\\temp\\outfile.bin\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter(Mandatory = $True)] $Path\n)\n\nif ($Path -is [System.IO.FileInfo])\n { $Path = $Path.FullName }\nelseif ($Path -notlike "*\\*") #Simple file name.\n { $Path = "$pwd" + "\\" + "$Path" }\nelseif ($Path -like ".\\*")  #pwd of script\n { $Path = $Path -replace "^\\.",$pwd.Path }\nelseif ($Path -like "..\\*") #parent directory of pwd of script\n { $Path = $Path -replace "^\\.\\.",$(get-item $pwd).Parent.FullName }\nelse\n { throw "Cannot resolve path!" }\n[System.IO.File]::WriteAllBytes($Path, $ByteArray)\n}\n\n\nfunction Convert-HexStringToByteArray {\n################################################################\n#.Synopsis\n#  Convert a string of hex data into a System.Byte[] array. An\n#  array is always returned, even if it contains only one byte.\n#.Parameter String\n#  A string containing hex data in any of a variety of formats,\n#  including strings like the following, with or without extra\n#  tabs, spaces, quotes or other non-hex characters:\n#     0x41,0x42,0x43,0x44\n#     \\x41\\x42\\x43\\x44\n#     41-42-43-44\n#     41424344\n#  The string can be piped into the function too.\n################################################################\n[CmdletBinding()]\nParam ( [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [String] $String )\n\n#Clean out whitespaces and any other non-hex crud.\n$String = $String.ToLower() -replace '[^a-f0-9\\\\\\,x\\-\\:]',''\n\n#Try to put into canonical colon-delimited format.\n$String = $String -replace '0x|\\\\x|\\-|,',':'\n\n#Remove beginning and ending colons, and other detritus.\n$String = $String -replace '^:+|:+$|x|\\\\',''\n\n#Maybe there's nothing left over to convert...\nif ($String.Length -eq 0) { ,@() ; return } \n\n#Split string with or without colon delimiters.\nif ($String.Length -eq 1)\n{ ,@([System.Convert]::ToByte($String,16)) }\nelseif (($String.Length % 2 -eq 0) -and ($String.IndexOf(":") -eq -1))\n{ ,@($String -split '([a-f0-9]{2})' | foreach-object { if ($_) {[System.Convert]::ToByte($_,16)}}) }\nelseif ($String.IndexOf(":") -ne -1)\n{ ,@($String -split ':+' | foreach-object {[System.Convert]::ToByte($_,16)}) }\nelse\n{ ,@() }\n#The strange ",@(...)" syntax is needed to force the output into an\n#array even if there is only one element in the output (or none).\n}\n\n\nfunction Convert-ByteArrayToHexString {\n################################################################\n#.Synopsis\n#  Returns a hex representation of a System.Byte[] array as\n#  one or more strings.  Hex format can be changed.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#  Also accepts a single Byte object instead of Byte[].\n#.Parameter Width\n#  Number of hex characters per line of output.\n#.Parameter Delimiter\n#  How each pair of hex characters (each byte of input) will be\n#  delimited from the next pair in the output.  The default\n#  looks like "0x41,0xFF,0xB9" but you could specify "\\x" if\n#  you want the output like "\\x41\\xFF\\xB9" instead.  You do\n#  not have to worry about an extra comma, semicolon, colon\n#  or tab appearing before each line of output.  The default\n#  value is ",0x".\n#.Parameter Prepend\n#  An optional string you can prepend to each line of hex\n#  output, perhaps like '$x += ' to paste into another\n#  script, hence the single quotes.\n#.Parameter AddQuotes\n#  An switch which will enclose each line in double-quotes.\n#.Example\n#  [Byte[]] $x = 0x41,0x42,0x43,0x44\n#  Convert-ByteArrayToHexString $x\n#\n#  0x41,0x42,0x43,0x44\n#.Example\n#  [Byte[]] $x = 0x41,0x42,0x43,0x44\n#  Convert-ByteArrayToHexString $x -width 2 -delimiter "\\x" -addquotes\n#\n#  "\\x41\\x42"\n#  "\\x43\\x44"\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [Int] $Width = 10,\n [Parameter()] [String] $Delimiter = ",0x",\n [Parameter()] [String] $Prepend = "",\n [Parameter()] [Switch] $AddQuotes\n)\n\nif ($Width -lt 1) { $Width = 1 }\nif ($ByteArray.Length -eq 0) { Return }\n$FirstDelimiter = $Delimiter -Replace "^[\\,\\;\\:\\t]",""\n$From = 0\n$To = $Width - 1\nDo\n{\n $String = [System.BitConverter]::ToString($ByteArray[$From..$To])\n $String = $FirstDelimiter + ($String -replace "\\-",$Delimiter)\n if ($AddQuotes) { $String = '"' + $String + '"' }\n if ($Prepend -ne "") { $String = $Prepend + $String }\n $String\n $From += $Width\n $To += $Width\n} While ($From -lt $ByteArray.Length)\n}\n\n\nfunction Convert-ByteArrayToString {\n################################################################\n#.Synopsis\n#  Returns the string representation of a System.Byte[] array.\n#  ASCII string is the default, but Unicode, UTF7, UTF8 and\n#  UTF32 are available too.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to put into the file.  If you\n#  pipe this array in, you must pipe the [Ref] to the array.\n#  Also accepts a single Byte object instead of Byte[].\n#.Parameter Encoding\n#  Encoding of the string: ASCII, Unicode, UTF7, UTF8 or UTF32.\n#  ASCII is the default.\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [String] $Encoding = "ASCII"\n)\n\nswitch ( $Encoding.ToUpper() )\n{\n "ASCII"   { $EncodingType = "System.Text.ASCIIEncoding" }\n "UNICODE" { $EncodingType = "System.Text.UnicodeEncoding" }\n "UTF7"    { $EncodingType = "System.Text.UTF7Encoding" }\n "UTF8"    { $EncodingType = "System.Text.UTF8Encoding" }\n "UTF32"   { $EncodingType = "System.Text.UTF32Encoding" }\n Default   { $EncodingType = "System.Text.ASCIIEncoding" }\n}\n$Encode = new-object $EncodingType\n$Encode.GetString($ByteArray)\n}\n\n\nfunction Get-FileHex {\n################################################################\n#.Synopsis\n#  Display the hex dump of a file.\n#.Parameter Path\n#  Path to file as a string or as a System.IO.FileInfo object;\n#  object can be piped into the function, string cannot.\n#.Parameter Width\n#  Number of hex bytes shown per line (default = 16).\n#.Parameter Count\n#  Number of bytes in the file to process (default = all).\n#.Parameter NoOffset\n#  Switch to suppress offset line numbers in output.\n#.Parameter NoText\n#  Switch to suppress ASCII translation of bytes in output.\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)]\n [Alias("FullName","FilePath")] $Path,\n [Parameter()] [Int] $Width = 16,\n [Parameter()] [Int] $Count = -1,\n [Parameter()] [Switch] $NoOffset,\n [Parameter()] [Switch] $NoText\n)\n\n$linecounter = 0        # Offset from beginning of file in hex.\n$placeholder = "."      # What to print when byte is not a letter or digit.\n\nget-content $path -encoding byte -readcount $width -totalcount $count |\nforeach-object {\n $paddedhex = $asciitext = $null\n $bytes = $_        # Array of [Byte] objects that is $width items in length.\n\n foreach ($byte in $bytes) {\n $byteinhex = [String]::Format("{0:X}", $byte)     # Convert byte to hex, e.g., "F".\n $paddedhex += $byteinhex.PadLeft(2,"0") + " "     # Pad with zero to force 2-digit length, e.g., "0F ".\n } \n\n # Total bytes in file unlikely to be evenly divisible by $width, so fix last line.\n # Hex output width is '$width * 3' because of the extra spaces added around hex characters.\n if ($paddedhex.length -lt $width * 3)\n { $paddedhex = $paddedhex.PadRight($width * 3," ") }\n\n foreach ($byte in $bytes) {\n if ( [Char]::IsLetterOrDigit($byte) -or\n [Char]::IsPunctuation($byte) -or\n [Char]::IsSymbol($byte) )\n { $asciitext += [Char] $byte }\n else\n { $asciitext += $placeholder }\n }\n\n $offsettext = [String]::Format("{0:X}", $linecounter) # Linecounter in hex too.\n $offsettext = $offsettext.PadLeft(8,"0") + "h:"       # Pad linecounter with left zeros.\n $linecounter += $width                                # Increment linecounter, each line representing $width bytes.\n\n if (-not $NoOffset) { $paddedhex = "$offsettext $paddedhex" }\n if (-not $NoText) { $paddedhex = $paddedhex + $asciitext }\n $paddedhex\n}\n}\n\n\nfunction Toggle-Endian {\n################################################################\n#.Synopsis\n#  Swaps the ordering of bytes in an array where each swappable\n#  unit can be one or more bytes, and, if more than one, the\n#  ordering of the bytes within that unit is NOT swapped. Can\n#  be used to toggle between little- and big-endian formats.\n#  Cannot be used to swap nibbles or bits within a single byte.\n#.Parameter ByteArray\n#  System.Byte[] array of bytes to be rearranged.  If you\n#  pipe this array in, you must pipe the [Ref] to the array, but\n#  a new array will be returned (originally array untouched).\n#.Parameter SubWidthInBytes\n#  Defaults to 1 byte.  Defines the number of bytes in each unit\n#  (or atomic element) which is swapped, but no swapping occurs\n#  within that unit.  The number of bytes in the ByteArray must\n#  be evenly divisible by SubWidthInBytes.\n#.Example\n#  $bytearray = toggle-endian $bytearray\n#.Example\n#  [Ref] $bytearray | toggle-endian -SubWidthInBytes 2\n################################################################\n[CmdletBinding()] Param (\n [Parameter(Mandatory = $True, ValueFromPipeline = $True)] [System.Byte[]] $ByteArray,\n [Parameter()] [Int] $SubWidthInBytes = 1\n)\n\nif ($ByteArray.count -eq 1 -or $ByteArray.count -eq 0) { $ByteArray ; return } \n\nif ($SubWidthInBytes -eq 1) { [System.Array]::Reverse($ByteArray); $ByteArray ; return } \n\nif ($ByteArray.count % $SubWidthInBytes -ne 0)\n{ throw "ByteArray size must be an even multiple of SubWidthInBytes!" ; return }  \n\n$newarray = new-object System.Byte[] $ByteArray.count \n\n# $i tracks ByteArray from head, $j tracks NewArray from end.\nfor ($($i = 0; $j = $newarray.count - 1) ;\n $i -lt $ByteArray.count ;\n $($i += $SubWidthInBytes; $j -= $SubWidthInBytes))\n{\n for ($k = 0 ; $k -lt $SubWidthInBytes ; $k++)\n { $newarray[$j - ($SubWidthInBytes - 1) + $k] = $ByteArray[$i + $k] }\n}\n$newarray\n}\n\n\nfunction PushToTcpPort\n{\n param ([Byte[]] $bytearray, [String] $ipaddress, [Int32] $port)\n $tcpclient = new-object System.Net.Sockets.TcpClient($ipaddress, $port) -ErrorAction "SilentlyContinue"\n trap { "Failed to connect to $ipaddress`:$port" ; return }\n $networkstream = $tcpclient.getstream()\n #write(payload,starting offset,number of bytes to send)\n $networkstream.write($bytearray,0,$bytearray.length)\n $networkstream.close(1) #Wait 1 second before closing TCP session.\n $tcpclient.close()\n}\n
combined_dataset/train/non-malicious/3935.ps1
3935.ps1
function Check-CmdletReturnType { param($cmdletName, $cmdletReturn) $cmdletData = Get-Command $cmdletName; Assert-NotNull $cmdletData; [array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") }; [array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") }; $realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.",""; return $cmdletReturnTypes -contains $realReturnType; } function Test-NetworkInterfaceCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/networkInterfaces" "West Central US"; $SubnetName = "SubnetName"; $SubnetAddressPrefix = "10.0.1.0/24"; $VirtualNetworkName = "VirtualNetworkName"; $VirtualNetworkAddressPrefix = @("10.0.0.0/8"); try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Subnet = New-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $SubnetAddressPrefix; $VirtualNetwork = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $VirtualNetworkName -Subnet $Subnet -AddressPrefix $VirtualNetworkAddressPrefix; if(-not $Subnet.Id) { $Subnet = Get-AzVirtualNetworkSubnetConfig -Name $SubnetName -VirtualNetwork $VirtualNetwork; } $vNetworkInterface = New-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -Location $location -Subnet $Subnet; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "New-AzNetworkInterface" $vNetworkInterface }; $vIpConfiguration = $vNetworkInterface.IpConfigurations | Where-Object { $_.Name -eq "ipconfig1" }; Assert-NotNull $vIpConfiguration; Assert-NotNull $vIpConfiguration.Subnet; Assert-AreEqual $rname $vNetworkInterface.Name; $vNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterface" $vNetworkInterface }; Assert-AreEqual $rname $vNetworkInterface.Name; $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeNetworkInterface = $job | Receive-Job; Assert-AreEqual $true $removeNetworkInterface; Assert-ThrowsContains { Get-AzNetworkInterface -ResourceGroupName $rgname -Name $rname } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-NetworkInterfaceCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/networkInterfaces" "West Central US"; $PrivateIPAddress = "10.0.1.42"; $IpConfigurationName = "createipconf"; $InternalDnsNameLabel = "internal-dns-foo"; $EnableAcceleratedNetworking = $false; $EnableIPForwarding = $false; $InternalDnsNameLabelSet = "internal-dns-bar"; $EnableAcceleratedNetworkingSet = $true; $EnableIPForwardingSet = $true; $SubnetName = "SubnetName"; $SubnetAddressPrefix = "10.0.1.0/24"; $VirtualNetworkName = "VirtualNetworkName"; $VirtualNetworkAddressPrefix = @("10.0.0.0/8"); $PublicIPAddressName = "PublicIPAddressName"; $PublicIPAddressAllocationMethod = "Static"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Subnet = New-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $SubnetAddressPrefix; $VirtualNetwork = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $VirtualNetworkName -Subnet $Subnet -AddressPrefix $VirtualNetworkAddressPrefix; if(-not $Subnet.Id) { $Subnet = Get-AzVirtualNetworkSubnetConfig -Name $SubnetName -VirtualNetwork $VirtualNetwork; } $PublicIPAddress = New-AzPublicIPAddress -ResourceGroupName $rgname -Location $location -Name $PublicIPAddressName -AllocationMethod $PublicIPAddressAllocationMethod; $vNetworkInterface = New-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -Location $location -Subnet $Subnet -PublicIPAddress $PublicIPAddress -PrivateIPAddress $PrivateIPAddress -IpConfigurationName $IpConfigurationName -InternalDnsNameLabel $InternalDnsNameLabel; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "New-AzNetworkInterface" $vNetworkInterface }; $vIpConfiguration = $vNetworkInterface.IpConfigurations | Where-Object { $_.Name -eq $IpConfigurationName }; Assert-NotNull $vIpConfiguration; Assert-NotNull $vIpConfiguration.Subnet; Assert-NotNull $vIpConfiguration.PublicIPAddress; Assert-AreEqual $rname $vNetworkInterface.Name; Assert-AreEqual $PrivateIPAddress $vNetworkInterface.IpConfigurations[0].PrivateIpAddress; Assert-AreEqual $IpConfigurationName $vNetworkInterface.IpConfigurations[0].Name; Assert-AreEqual $InternalDnsNameLabel $vNetworkInterface.DnsSettings.InternalDnsNameLabel; Assert-AreEqual $EnableAcceleratedNetworking $vNetworkInterface.EnableAcceleratedNetworking; Assert-AreEqual $EnableIPForwarding $vNetworkInterface.EnableIPForwarding; $vNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterface" $vNetworkInterface }; Assert-AreEqual $rname $vNetworkInterface.Name; Assert-AreEqual $PrivateIPAddress $vNetworkInterface.IpConfigurations[0].PrivateIpAddress; Assert-AreEqual $IpConfigurationName $vNetworkInterface.IpConfigurations[0].Name; Assert-AreEqual $InternalDnsNameLabel $vNetworkInterface.DnsSettings.InternalDnsNameLabel; Assert-AreEqual $EnableAcceleratedNetworking $vNetworkInterface.EnableAcceleratedNetworking; Assert-AreEqual $EnableIPForwarding $vNetworkInterface.EnableIPForwarding; $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $vNetworkInterface.DnsSettings.InternalDnsNameLabel = $InternalDnsNameLabelSet; $vNetworkInterface.EnableAcceleratedNetworking = $EnableAcceleratedNetworkingSet; $vNetworkInterface.EnableIPForwarding = $EnableIPForwardingSet; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "Set-AzNetworkInterface" $vNetworkInterface }; Assert-AreEqual $rname $vNetworkInterface.Name; Assert-AreEqual $InternalDnsNameLabelSet $vNetworkInterface.DnsSettings.InternalDnsNameLabel; Assert-AreEqual $EnableAcceleratedNetworkingSet $vNetworkInterface.EnableAcceleratedNetworking; Assert-AreEqual $EnableIPForwardingSet $vNetworkInterface.EnableIPForwarding; $vNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vNetworkInterface; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterface" $vNetworkInterface }; Assert-AreEqual $rname $vNetworkInterface.Name; Assert-AreEqual $InternalDnsNameLabelSet $vNetworkInterface.DnsSettings.InternalDnsNameLabel; Assert-AreEqual $EnableAcceleratedNetworkingSet $vNetworkInterface.EnableAcceleratedNetworking; Assert-AreEqual $EnableIPForwardingSet $vNetworkInterface.EnableIPForwarding; $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName $rgname; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listNetworkInterface = Get-AzNetworkInterface -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listNetworkInterface | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeNetworkInterface = $job | Receive-Job; Assert-AreEqual $true $removeNetworkInterface; Assert-ThrowsContains { Get-AzNetworkInterface -ResourceGroupName $rgname -Name $rname } "not found"; Assert-ThrowsContains { Set-AzNetworkInterface -NetworkInterface $vNetworkInterface } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-NetworkInterfaceIpConfigurationCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/networkInterfaces" "West Central US"; $SubnetName = "SubnetName"; $SubnetAddressPrefix = "10.0.1.0/24"; $VirtualNetworkName = "VirtualNetworkName"; $VirtualNetworkAddressPrefix = @("10.0.0.0/8"); try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Subnet = New-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $SubnetAddressPrefix; $VirtualNetwork = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $VirtualNetworkName -Subnet $Subnet -AddressPrefix $VirtualNetworkAddressPrefix; if(-not $Subnet.Id) { $Subnet = Get-AzVirtualNetworkSubnetConfig -Name $SubnetName -VirtualNetwork $VirtualNetwork; } $vNetworkInterfaceIpConfiguration = New-AzNetworkInterfaceIpConfig -Name $rname -Subnet $Subnet; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "New-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; $vNetworkInterface = New-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -IpConfiguration $vNetworkInterfaceIpConfiguration -Location $location; Assert-NotNull $vNetworkInterface; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rname; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rname }); $vNetworkInterface = Set-AzNetworkInterfaceIpConfig -Name $rname -NetworkInterface $vNetworkInterface -Subnet $Subnet; Assert-NotNull $vNetworkInterface; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rname; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rname }); $vNetworkInterface = Add-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -SubnetId $Subnet.Id; Assert-NotNull $vNetworkInterface; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rnameAdd $vNetworkInterfaceIpConfiguration.Name; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -SubnetId $Subnet.Id } "already exists"; $vNetworkInterface = Remove-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; Assert-ThrowsContains { Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -Subnet $Subnet } "does not exist"; } finally { Clean-ResourceGroup $rgname; } } function Test-NetworkInterfaceIpConfigurationCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/networkInterfaces" "West Central US"; $PrivateIPAddress = "10.0.1.13"; $PrivateIPAddressVersion = "IPv4"; $Primary = $true; $PrivateIPAddressSet = "10.0.1.41"; $PrimarySet = $true; $PrivateIPAddressAdd = "10.0.1.42"; $PrimaryAdd = $false; $SubnetName = "SubnetName"; $SubnetAddressPrefix = "10.0.1.0/24"; $VirtualNetworkName = "VirtualNetworkName"; $VirtualNetworkAddressPrefix = @("10.0.0.0/8"); $PublicIPAddressName = "PublicIPAddressName"; $PublicIPAddressAllocationMethod = "Static"; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $Subnet = New-AzVirtualNetworkSubnetConfig -Name $SubnetName -AddressPrefix $SubnetAddressPrefix; $VirtualNetwork = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $VirtualNetworkName -Subnet $Subnet -AddressPrefix $VirtualNetworkAddressPrefix; if(-not $Subnet.Id) { $Subnet = Get-AzVirtualNetworkSubnetConfig -Name $SubnetName -VirtualNetwork $VirtualNetwork; } $PublicIPAddress = New-AzPublicIPAddress -ResourceGroupName $rgname -Location $location -Name $PublicIPAddressName -AllocationMethod $PublicIPAddressAllocationMethod; $vNetworkInterfaceIpConfiguration = New-AzNetworkInterfaceIpConfig -Name $rname -Subnet $Subnet -PublicIPAddress $PublicIPAddress -PrivateIPAddress $PrivateIPAddress -PrivateIPAddressVersion $PrivateIPAddressVersion -Primary; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "New-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; $vNetworkInterface = New-AzNetworkInterface -ResourceGroupName $rgname -Name $rname -IpConfiguration $vNetworkInterfaceIpConfiguration -Location $location; Assert-NotNull $vNetworkInterface; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; Assert-AreEqual $PrivateIPAddress $vNetworkInterfaceIpConfiguration.PrivateIpAddress; Assert-AreEqual $PrivateIPAddressVersion $vNetworkInterfaceIpConfiguration.PrivateIpAddressVersion; Assert-AreEqual $Primary $vNetworkInterfaceIpConfiguration.Primary; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rname; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; Assert-AreEqual $PrivateIPAddress $vNetworkInterfaceIpConfiguration.PrivateIpAddress; Assert-AreEqual $PrivateIPAddressVersion $vNetworkInterfaceIpConfiguration.PrivateIpAddressVersion; Assert-AreEqual $Primary $vNetworkInterfaceIpConfiguration.Primary; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rname }); $vNetworkInterface = Set-AzNetworkInterfaceIpConfig -Name $rname -NetworkInterface $vNetworkInterface -Subnet $Subnet -PrivateIPAddress $PrivateIPAddressSet -Primary; Assert-NotNull $vNetworkInterface; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rname; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rname $vNetworkInterfaceIpConfiguration.Name; Assert-AreEqual $PrivateIPAddressSet $vNetworkInterfaceIpConfiguration.PrivateIpAddress; Assert-AreEqual $PrimarySet $vNetworkInterfaceIpConfiguration.Primary; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rname }); $vNetworkInterface = Add-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -SubnetId $Subnet.Id -PublicIPAddressId $PublicIPAddress.Id -PrivateIPAddress $PrivateIPAddressAdd; Assert-NotNull $vNetworkInterface; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; $vNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd; Assert-NotNull $vNetworkInterfaceIpConfiguration; Assert-True { Check-CmdletReturnType "Get-AzNetworkInterfaceIpConfig" $vNetworkInterfaceIpConfiguration }; Assert-AreEqual $rnameAdd $vNetworkInterfaceIpConfiguration.Name; Assert-AreEqual $PrivateIPAddressAdd $vNetworkInterfaceIpConfiguration.PrivateIpAddress; Assert-AreEqual $PrimaryAdd $vNetworkInterfaceIpConfiguration.Primary; $listNetworkInterfaceIpConfiguration = Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface; Assert-NotNull ($listNetworkInterfaceIpConfiguration | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -SubnetId $Subnet.Id -PublicIPAddressId $PublicIPAddress.Id -PrivateIPAddress $PrivateIPAddressAdd } "already exists"; $vNetworkInterface = Remove-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd; $vNetworkInterface = Set-AzNetworkInterface -NetworkInterface $vNetworkInterface; Assert-NotNull $vNetworkInterface; Assert-ThrowsContains { Get-AzNetworkInterfaceIpConfig -NetworkInterface $vNetworkInterface -Name $rnameAdd } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzNetworkInterfaceIpConfig -Name $rnameAdd -NetworkInterface $vNetworkInterface -Subnet $Subnet -PrivateIPAddress $PrivateIPAddressSet -Primary } "does not exist"; } finally { Clean-ResourceGroup $rgname; } } function Test-NetworkInterfaceGetEffectiveRouteTable { param ( $basedir = "./" ) . ($basedir + "/ScenarioTests/Utils/Import-GeneratedTestUtils.ps1") $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rgName = Get-ResourceGroupName; $location = Get-ProviderLocation "Microsoft.Network/networkInterfaces" "West Central US"; $virtualMachineName = Get-ResourceName; $storageAccountName = Get-ResourceName; $routeTableName = Get-ResourceName; $networkInterfaceName = Get-ResourceName; $networkSecurityGroupName = Get-ResourceName; $virtualNetworkName = Get-ResourceName; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $env = Get-TestDeployment -rgName $rgName ` -location $location ` -virtualMachineName $virtualMachineName ` -storageAccountName $storageAccountName ` -routeTableName $routeTableName ` -networkInterfaceName $networkInterfaceName ` -networkSecurityGroupName $networkSecurityGroupName ` -virtualNetworkName $virtualNetworkName; $job = Get-AzEffectiveRouteTable -ResourceGroupName $rgname -NetworkInterfaceName $env.networkInterfaceName -AsJob; $job | Wait-Job; $vEffectiveRouteTable = $job | Receive-Job; Assert-NotNull $vEffectiveRouteTable; Assert-True { Check-CmdletReturnType "Get-AzEffectiveRouteTable" $vEffectiveRouteTable }; $vEffectiveNetworkSecurityGroups = Get-AzEffectiveNetworkSecurityGroup -ResourceGroupName $rgname -NetworkInterfaceName $env.networkInterfaceName; Assert-NotNull $vEffectiveNetworkSecurityGroups; Assert-True { Check-CmdletReturnType "Get-AzEffectiveNetworkSecurityGroup" $vEffectiveNetworkSecurityGroups }; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/139.ps1
139.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Test-JSON(){ param ( $JSON ) try { $TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop $validJson = $true } catch { $validJson = $false $_.Exception } if (!$validJson){ Write-Host "Provided JSON isn't in valid JSON format" -f Red break } } Function Add-DeviceCompliancePolicy(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "v1.0" $Resource = "deviceManagement/deviceCompliancePolicies" try { if($JSON -eq "" -or $JSON -eq $null){ write-host "No JSON specified, please specify valid JSON for the Android Policy..." -f Red } else { Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } } catch { Write-Host $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Add-DeviceCompliancePolicyAssignment(){ [cmdletbinding()] param ( $CompliancePolicyId, $TargetGroupId ) $graphApiVersion = "v1.0" $Resource = "deviceManagement/deviceCompliancePolicies/$CompliancePolicyId/assign" try { if(!$CompliancePolicyId){ write-host "No Compliance Policy Id specified, specify a valid Compliance Policy Id" -f Red break } if(!$TargetGroupId){ write-host "No Target Group Id specified, specify a valid Target Group Id" -f Red break } $JSON = @" { "assignments": [ { "target": { "@odata.type": " "groupId": "$TargetGroupId" } } ] } "@ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json" } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Get-AADGroup(){ [cmdletbinding()] param ( $GroupName, $id, [switch]$Members ) $graphApiVersion = "v1.0" $Group_resource = "groups" try { if($id){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($GroupName -eq "" -or $GroupName -eq $null){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } else { if(!$Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } elseif($Members){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'" $Group = (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value if($Group){ $GID = $Group.id $Group.displayName write-host $uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $JSON_Android = @" { "passwordExpirationDays": null, "requireAppVerify": true, "securityPreventInstallAppsFromUnknownSources": true, "@odata.type": "microsoft.graph.androidCompliancePolicy", "scheduledActionsForRule":[{"ruleName":"PasswordRequired","scheduledActionConfigurations":[{"actionType":"block","gracePeriodHours":0,"notificationTemplateId":""}]}], "passwordRequiredType": "numeric", "storageRequireEncryption": true, "storageRequireRemovableStorageEncryption": true, "passwordMinutesOfInactivityBeforeLock": 15, "passwordPreviousPasswordBlockCount": null, "passwordRequired": true, "description": "Android Compliance Policy", "passwordMinimumLength": 4, "displayName": "Android Compliance Policy Assigned", "securityBlockJailbrokenDevices": true, "deviceThreatProtectionRequiredSecurityLevel": "low", "deviceThreatProtectionEnabled": true, "securityDisableUsbDebugging": true } "@ $JSON_iOS = @" { "@odata.type": "microsoft.graph.iosCompliancePolicy", "description": "iOS Compliance Policy", "displayName": "iOS Compliance Policy Assigned", "scheduledActionsForRule":[{"ruleName":"PasswordRequired","scheduledActionConfigurations":[{"actionType":"block","gracePeriodHours":0,"notificationTemplateId":""}]}], "passcodeBlockSimple": true, "passcodeExpirationDays": null, "passcodeMinimumLength": 4, "passcodeMinutesOfInactivityBeforeLock": 15, "passcodePreviousPasscodeBlockCount": null, "passcodeMinimumCharacterSetCount": null, "passcodeRequiredType": "numeric", "passcodeRequired": true, "securityBlockJailbrokenDevices": true, "deviceThreatProtectionEnabled": true, "deviceThreatProtectionRequiredSecurityLevel": "low" } "@ $AADGroup = Read-Host -Prompt "Enter the Azure AD Group name where policies will be assigned" $TargetGroupId = (get-AADGroup -GroupName "$AADGroup").id if($TargetGroupId -eq $null -or $TargetGroupId -eq ""){ Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red Write-Host exit } Write-Host Write-Host "Adding Android Compliance Policy from JSON..." -ForegroundColor Yellow $CreateResult_Android = Add-DeviceCompliancePolicy -JSON $JSON_Android Write-Host "Compliance Policy created as" $CreateResult_Android.id write-host write-host "Assigning Compliance Policy to AAD Group '$AADGroup'" -f Cyan $Assign_Android = Add-DeviceCompliancePolicyAssignment -CompliancePolicyId $CreateResult_Android.id -TargetGroupId $TargetGroupId Write-Host "Assigned '$AADGroup' to $($CreateResult_Android.displayName)/$($CreateResult_Android.id)" Write-Host Write-Host "Adding iOS Compliance Policy from JSON..." -ForegroundColor Yellow Write-Host $CreateResult_iOS = Add-DeviceCompliancePolicy -JSON $JSON_iOS Write-Host "Compliance Policy created as" $CreateResult_iOS.id write-host write-host "Assigning Compliance Policy to AAD Group '$AADGroup'" -f Cyan $Assign_iOS = Add-DeviceCompliancePolicyAssignment -CompliancePolicyId $CreateResult_iOS.id -TargetGroupId $TargetGroupId Write-Host "Assigned '$AADGroup' to $($CreateResult_iOS.displayName)/$($CreateResult_iOS.id)" Write-Host
combined_dataset/train/non-malicious/sample_22_76.ps1
sample_22_76.ps1
<# .SYNOPSIS Adds an entry for the given IP address and hostname to a hosts file. Does nothing if a matching entry already exists. .PARAMETER IPAddress IP address for the address/name pair which should be added to the hosts file. .PARAMETER Hostname Hostname for the address/name pair which should be added to the hosts file. .PARAMETER HostsFilePath (Optional) Path to the hosts file to which an entry should be added. Defaults to the standard hosts file path under $env:windir. .EXAMPLE .\Local-Hosts-Add-HostsFileEntry.ps1 -IPAddress 10.0.2.3 -Hostname P-DV-VM-FOO2BAR.testvm.local Adds an entry to a different hosts file. This will not touch the default hosts file located under $env:windir. #> param ( # The ValidateScript here is to ensure that the argument/parameter pairing is correct # (so that a user won't pass Hostname to IPAddress and vice versa). [Parameter(Mandatory)] [ValidateScript( { $_ -match '^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$' })] [string] $IPAddress, [Parameter(Mandatory)] [string] $Hostname, [ValidateNotNullOrEmpty()] [string] $HostsFilePath = (Join-Path $env:windir 'System32\drivers\etc\hosts') ) try { . (Join-Path $PSScriptRoot 'Local-Hosts-HostsFileHelper.ps1') $ErrorActionPreference = 'Stop' $existingHostsFileEntries = @(Select-String -Pattern [^\s] -Path $HostsFilePath | ForEach-Object Line) $newHostsFileEntries = Add-HostsFileEntry -Lines $existingHostsFileEntries -IPAddress $IPAddress -Hostname $Hostname Save-HostsFile -Path $HostsFilePath -Lines $newHostsFileEntries -ErrorAction Stop } catch { $ErrorMessage = $_.Exception.Message throw "An error occurred when adding the VM entry into the Hosts file [IPAddress: $IPAddress, Hostname: $Hostname, HostsFilePath: $HostsFilePath]. Error: $($ErrorMessage)" }
combined_dataset/train/non-malicious/Get-ExchangeDBSizes_2.ps1
Get-ExchangeDBSizes_2.ps1
<# .SYNOPSIS Get-ExchangeDBSizes - Gather data on Exchange 2007 / 2010 Mailbox Databases. .DESCRIPTION Gathers data from Exchange mailbox servers. These data include: Server\\StorageGroup\\Database (2007) or Database (2010), Total Size (in GB) of the disk, Size of the .edb file (in GB), Free disk space, Percent Disk Free, Total Mailboxes on the database, White Space, Total Free disk space, Total Percent Free disk space .EXAMPLE Get-ExchangeDBSizes .LINK http://unlockpowershell.wordpress.com/ http://poshcode.org/1902 .NOTES File Name: Get-ExchangeDBSizes.ps1 Author: Karl Mitschke Requires: Exchange Managemnent Shell Requires: Powershell V2 Created: 6/14/2010 Modified: 7/28/2010 to convert .EdbFilePath to String Modified: 7/28/2010 - Changed whitespace to a [double] #> Function Get-MountPointInfo($ServerName) { $Summary = @() $VolumeHash = @{} $VolumeCapacityHash = @{} $DatabaseSizeHash = @{} $DatabaseFreeHash = @{} $MountPoints = Get-WmiObject -Class Win32_Mountpoint -ComputerName $ServerName $MailboxDatabases = Get-MailboxDatabase -Server $ServerName $Volumes = Get-WmiObject -Class Win32_Volume -ComputerName $ServerName | Where-Object {$_.DriveType -eq 3}| Select-Object Name,FreeSpace,Capacity $DatabaseLetters = $MailboxDatabases | Select-Object edbfilepath foreach ($Volume in $Volumes) { $VolumeHash.Add($Volume.name.TrimEnd("\\"),$Volume.FreeSpace) $VolumeCapacityHash.Add($Volume.name.TrimEnd("\\"),$Volume.Capacity) } foreach ($drive in $DatabaseLetters) { $letter = $drive.EdbFilePath.ToString().Substring(0,$drive.EdbFilePath.ToString().LastIndexOf("\\")) $DatabaseSizeHash.Add($letter.TrimEnd("\\"),$VolumeCapacityHash[$letter]) $DatabaseFreeHash.Add($letter.TrimEnd("\\"),$VolumeHash[$letter]) } $VolumeHash.Clear() $VolumeCapacityHash.Clear() #Now I have all mailbox databases, along with the OS reported free space and capacity foreach ($MP in $Mountpoints) { $MP.directory = $MP.directory.replace("\\\\","\\").Split("=")[1].Replace("`"","") if($DatabaseSizeHash[$MP.directory]) { #This mountpoint is a database $Record = new-Object PSObject $OSfree = $DatabaseFreeHash[$MP.directory] $OSCapacity = $DatabaseSizeHash[$MP.directory] $DestFolder = "\\\\"+$ServerName + "\\" + $MP.directory $colItems = (Get-ChildItem $destfolder.Replace(":","$") -Recurse| where{$_.length -ne $null} |Measure-Object -property length -sum) if($colItems.sum -eq $null) { $fsize = 0 } else { $fsize = $colItems.sum } $TotFolderSize = $fsize + $OSfree $percFree = "{0:P0}" -f ( $OSfree/$TotFolderSize) $Record | add-Member -memberType noteProperty -name Server -Value $ServerName $Record | add-Member -memberType noteProperty -name "Mount Point" -Value $MP.directory $Record | add-Member -memberType noteProperty -name "Capacity" -Value ("{0:N2}" -f ($OSCapacity /1gb)) $Record | add-Member -memberType noteProperty -name "Used" -Value ("{0:N2}" -f ($fsize / 1gb)) $Record | add-Member -memberType noteProperty -name "Free" -Value ("{0:N2}" -f ($OSfree / 1gb)) $Record | add-Member -memberType noteProperty -name "Percent Free" -Value $percFree $Summary += $Record } } return $Summary } function Get-ExchangeWhiteSpace { param( $ComputerName = $(throw "ComputerName cannot be empty.") ) # Convert Dates to WMI CIM dates $tc = [System.Management.ManagementDateTimeconverter] $Start =$tc::ToDmtfDateTime( (Get-Date).AddDays(-1).Date ) $End =$tc::ToDmtfDateTime( (Get-Date).Date) $whiteSpace = @{} # Create two claculated properties for InsertionStrings values $DB = @{Name="DB";Expression={$_.InsertionStrings[1]}} $FreeMB = @{Name="FreeMB";Expression={[int]$_.InsertionStrings[0]}} $freespace = Get-WMIObject Win32_NTLogEvent -ComputerName $ComputerName -Filter "LogFile='Application' AND EventCode=1221 AND TimeWritten>='$Start' AND TimeWritten<='$End'" | Select-Object $DB,$FreeMB | Sort-Object DB –Unique –Descending $freespace | ForEach-Object {$whiteSpace.Add($_.DB,$_.FreeMB)} #Preceding function from Shay Levy http://blogs.microsoft.co.il/blogs/scriptfanatic/archive/2009/08/13/exchange-white-space.aspx } $AllServers = @() $ServerVersion = @{} foreach ($server in Get-MailboxServer) { $ServerName = $server.name $version = Get-ExchangeServer -Identity $ServerName | Select-Object AdminDisplayVersion if($version.admindisplayversion.major) { $ServerVersion.Add($ServerName,$version.admindisplayversion.major) } else { $ServerVersion.Add($ServerName,$version.admindisplayversion.Split()[1].split(".")[0]) } } foreach ($server in Get-MailboxServer) { $ServerName = $server.Name if ([int]$ServerVersion[$ServerName] -gt 8) { #An Exchange 2010 server, so use Get-MailboxDatabase <database> -Status | Select-Object AvailableNewMailboxSpace $whiteSpace = @{} $Free = Get-MailboxDatabase -Server $ServerName -Status | Select-Object Server,Name,AvailableNewMailboxSpace foreach ($item in $free) { $db = $ServerName+"\\"+$item.Name $whiteSpace.Add($item.Name,[double]$item.AvailableNewMailboxSpace.split("(")[1].Split()[0]/1mb) } } Else {#not an Exchange 2010 server . Get-ExchangeWhiteSpace $ServerName } $MountPoint = . Get-MountPointInfo $ServerName foreach ($objItem in Get-MailboxDatabase -Server $ServerName) { $edbfilepath = $objItem.edbfilepath $path = "`\\`\\" + $ServerName + "`\\" + $objItem.EdbFilePath.ToString().Split(":")[0] + "$"+ $objItem.EdbFilePath.ToString().Split(":")[1] $dbsize = Get-ChildItem $path $dbpath=(Split-Path $EdbFilePath.ToString().Split(":")[1] -Leaf).trimend(".edb") if (!$MountPoint) { $mailboxpath = $ServerName + $EdbFilePath.ToString().Split(":")[1].trimend(".edb") $size = get-wmiobject -computername $ServerName win32_logicaldisk |where-object {$_.deviceid -eq $objItem.EdbFilePath.ToString().Split("\\")[0]} |select-object deviceID, Freespace, Size $freespace = ($size.freespace / 1GB) $total = ($size.size / 1GB) } if ($MountPoint) { $mailboxpath = "$ServerName\\$dbpath" $MPPath = $EdbFilePath.ToString().Substring(0,$EdbFilePath.ToString().LastIndexOf("\\")) $freespace = $DatabaseFreeHash[$MPPath ] /1GB $total = $DatabaseSizeHash[$MPPath] /1GB } $PercentFree = "{0:n2}" -f ($freespace / $total *100) if (!$MountPoint) { $mailboxcount = Get-MailboxStatistics -database "$mailboxpath" |Where {$_.DisconnectDate -eq $null -and $_.ObjectClass -eq 'Mailbox'} |measure-object } if($MountPoint) { $mailboxcount = Get-MailboxStatistics -database $mailboxpath.Split("\\")[1] |Where {$_.DisconnectDate -eq $null -and $_.ObjectClass -eq 'Mailbox'} |measure-object } $ReturnedObj = New-Object PSObject $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Server\\StorageGroup\\Database" -Value $objItem.Identity $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Total Size (GB)" -Value ("{0:n2}" -f ($total)) $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Used Space (GB)" -Value ("{0:n2}" -f ($dbsize.Length/1024MB)) $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Free Space (GB)" -Value ("{0:n2}" -f ($freespace)) $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Percent Disk Free" -Value $percentfree $ReturnedObj | Add-Member -MemberType NoteProperty -Name "User Mailbox Count" -Value $mailboxcount.count if ($objitem.Identity.Split("\\").Count -eq 3){$dbasename = $objitem.Identity.Substring($objitem.Identity.IndexOf("\\")+1)} else{$dbasename = $objitem.Identity} $ReturnedObj | Add-Member -MemberType NoteProperty -Name "White Space (GB)" -Value ("{0:n2}" -f ($whiteSpace[$dbasename]/1024)) $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Total Free (GB)" -Value ("{0:n2}" -f ($freespace + $whiteSpace[$dbasename]/1024)) $TotalPercent = ($freespace + $whiteSpace[$dbasename]/1024) / $total *100 $ReturnedObj | Add-Member -MemberType NoteProperty -Name "Total Percent Free" -Value ("{0:n2}" -f ($TotalPercent)) $AllServers += $ReturnedObj } } $AllServers |Export-Csv C:\\scripts\\MailboxDatabaseSizeReport.csv -NoTypeInformation
combined_dataset/train/non-malicious/sample_59_78.ps1
sample_59_78.ps1
LMetoda se ne može izvršiti kada je onemogućena pohrana s više snimki stanja.oZahtjev je ograničen, previše zahtjeva za ažuriranje izvora podataka koje pokreće korisnik u kratkom razdoblju.pNema dovoljno dozvola za osvježavanje tablice u načinu rada Direct Lake, obratite se autoru ovog skupa podataka.€Nije moguće zadržati metapodatke snimke baze podataka, izbacivanje baze podataka kako bi se izbjegla nedosljednost metapodataka.êTrenutno ne možemo vratiti sigurnosnu kopiju skupa podataka jer nema dovoljno memorije za dovršetak ove operacije. Upotrijebite mogućnost /ForceRestore za vraćanje skupa podataka s postojećim neučitanim i izvanmrežnim skupom podataka.rTrenutno ne možemo vratiti sigurnosnu kopiju skupa podataka jer nema dovoljno memorije za dovršetak ove operacije.łOperacija nije uspjela. Obratite se administratoru kapaciteta da biste provjerili je li omogućena podrška za čitanje/zapisivanje XMLA u postavkama kapaciteta na kapacitetu Power BI Premium, a zatim pokušajte ponovno. Dodatne informacije potražite u odjeljku "Podrška za čitanje/zapisivanje XMLA" u dokumentaciji proizvoda.ÄBroj grupa redaka u izvornoj delta tablici „%{oii_deltaTableName/}” premašuje trenutno ograničenje SKU-a (%u{rowgroupCount/}), optimizirajte delta tablicu ili nadogradite na veći SKU poslužitelja.²Veličina podataka stupca „%{oii_deltaColumnName/}” u izvorišnoj delta tablici „%{oii_deltaTableName/}” prekoračuje trenutačno ograničenje SKU-a (%I64u{columnFootprintLimit/} MB).ÍBroj datoteka u obliku parquet u izvornoj delta tablici „%{oii_deltaTableName/}” premašuje trenutno ograničenje SKU-a (%u{fileCount/}), optimizirajte delta tablicu ili nadogradite na veći SKU poslužitelja.yZbroj podataka za sve tablice delta premašuje trenutačno ograničenje inventarnog broja (%I64u{columnFootprintLimit/} MB).JPrivremeni abf put za ponovnu objavu servisa Power BI Premium nije valjan.ÔStupac „%{oii_columnname/}” s binarnom vrstom podataka nije dopušten u Direct Lake tablici „%{oii_TableName/}”. Uklonite stupac. Pogledajte https://go.microsoft.com/fwlink/?linkid=2215281 kako biste saznali više.ĩNačin rada Direct Lake ne možete koristiti zajedno s drugim načinima rada za pohranu u istom modelu. Složeni model ne podržava način rada Direct Lake. Uklonite nepodržane tablice ili ih prebacite u način rada Direct Lake. Pogledajte https://go.microsoft.com/fwlink/?linkid=2215281 da saznate više.ĒSve tablice u načina rada Direct Lake moraju se pozivati na isti izvor podataka. Provjerite izvore podataka tablica u načinu rada Direct Lake i provjerite koriste li sve tablice isti izvor podataka. Pogledajte https://go.microsoft.com/fwlink/?linkid=2215281 da saznate više.
combined_dataset/train/non-malicious/2722.ps1
2722.ps1
if (Test-Path "$env:SystemRoot\clrver.exe") { $counter = 0 & $env:SystemRoot\clrver.exe -all 2> $null | ` ConvertFrom-Csv -Delimiter `t -Header "PID","ProcessName","CLR Version" | ` ForEach-Object { if ($counter -gt 1) { $_ } $counter += 1 } } else { Write-Error "Clrver.exe not found in $env:SystemRoot." }
combined_dataset/train/non-malicious/Get-SPListItem.ps1
Get-SPListItem.ps1
#.Example # Get-SPListItem "Scrum Team Assignments" # Gets all the items in the list with the default columns on them #.Example # Get-SPListItem -Name "Scrum Team Assignments" -Property "Scrum Team","Team Role","Last","First" # Gets all the items in the list with just the specified columns as properties #.Example # Get-SPListItem -ListUrl "https://sharepoint.domain.org/subsite/Lists/ListName/AllItems.aspx" # Deduces list and sharepoint service URL from the list url function Get-SPListItem { [CmdletBinding(DefaultParameterSetName="FromListName")] param( # Url of the sharepoint (sub)site where the list is. This is NOT the url to the list, but to the site root # E.g: for https://sharepoint.domain.org/organization/site/Lists/listName/AllItems.aspx # You should put: https://sharepoint.domain.org/organization/site/ [Parameter(Mandatory=$True, Position=0, ParameterSetName="FromListName")] [string]$SharepointUrl, # The name of a sharepoint list to retrieve [Parameter(Mandatory=$True, Position=1, ParameterSetName="FromListName")] [String]$Name, # The full url to a sharepoint list (this only works if the URL has "/Lists/listname/" in it)... [Parameter(Mandatory=$True,ParameterSetName="FromListUrl")] [string]$ListUrl, # Columns that you want to retrieve from the list, as they appear in the list (or extra column names like "Created Date" or "Modified Date") [String[]]$Property, # Maximum number of items to retrieve (Defaults to 1000) [Int]$MaxCount = 1000 ) if($PSCmdlet.ParameterSetName -eq "FromListUrl") { if(!$ListUrl.Contains("/Lists/")) { throw "Can't deduce list name from ListUrl" } $i = $ListUrl.IndexOf("/Lists/") $SharepointUrl = $ListUrl.SubString(0,$i) $ListName = $ListUrl.SubString($i+7, $ListUrl.IndexOf("/",$i+7) - $i - 7) if($ListName -match "%") { Add-Type -Assembly System.Web $ListName = [System.Web.HttpUtility]::UrlDecode($ListName) } } $ServiceUrl = $SharepointUrl.Trim("/") + "/_vti_bin/Lists.asmx" Write-Verbose "Sharepoint Service Url: $ServiceUrl" Write-Verbose "Sharepoint List Name: $ListName" # Must manually set the Service.Url even after you fetch the service (otherwise it points at the root site) $Service = New-WebServiceProxy $ServiceUrl -UseDefaultCred $Service.Url = $ServiceUrl # Help people out (a little) by printing the ErrorString from soap exceptions trap [System.Web.Services.Protocols.SoapException] { Write-Error $_.Exception.Detail.errorstring."#text" throw $_ } # Get the list metadata from sharepoint and figure out what columns it has: $list = $Service.GetList($ListName) Write-Verbose "Default List View URL: $(([Uri]$SharepointUrl).GetLeftPart('authority'))$($List.DefaultViewUrl)" $Fields = $list.Fields.Field # A trick for debugging obstinate lists if($DebugPreference -gt "SilentlyContinue") { $Global:SPListFields = $Fields Write-Debug "Global variable SPListFields set to list fields for debugging purposes" } # Filter the list of columns if we were given a list if($Property.Count -gt 0) { $Fields = $Fields | Where-Object { $Property -contains $_.DisplayName } } else { $Fields = $Fields | Where-Object { $_.FromBaseType -ne "TRUE" -and $_.Hidden -ne "TRUE" } } # Turn that list of columns into selectors for GetListItems and Select-Object $ViewFields = @() $ObjectProperties = @() foreach($f in $Fields.GetEnumerator()) { $ViewFields += $f.StaticName $ObjectProperties += @{ Name = $f.DisplayName; Expression = [ScriptBlock]::Create("`$_.`"ows_$($f.StaticName)`"") } } # Generate some xml [xml]$vf = "<ViewFields>$($ViewFields | ForEach-Object { "<FieldRef Name='$_'/>" })</ViewFields>" Write-Verbose $vf.OuterXml $ListItems = $service.GetListItems($listName, "", [Xml]"<Query/>", $vf, $MaxCount, [Xml]"<QueryOptions/>", "").Data.Row # A trick for debugging obstinate lists if($DebugPreference -gt "SilentlyContinue") { $Global:SPObjectProperties = $ObjectProperties Write-Debug "Global variable SPObjectProperties set to ObjectProperties for debugging purposes" } # A trick for debugging obstinate lists if($DebugPreference -gt "SilentlyContinue") { $Global:SPListItems = $ListItems Write-Debug "Global variable SPListItems set to list items for debugging purposes" } $ListItems | Select-Object $ObjectProperties }
combined_dataset/train/non-malicious/Read-Choice.ps1
Read-Choice.ps1
function Read-Choice { #.Synopsis # Prompt the user for a choice, and return the (0-based) index of the selected item #.Parameter Message # The question to ask #.Parameter Choices # An array of strings representing the "menu" items, with optional ampersands (&) in them to mark (unique) characters to be used to select each item #.Parameter DefaultChoice # The (0-based) index of the menu item to select by default (defaults to zero). #.Parameter Title # An additional caption that can be displayed (usually above the Message) as part of the prompt #.Example # Read-Choice "WEBPAGE BUILDER MENU" "Create Webpage","View HTML code","Publish Webpage","Remove Webpage","E&xit" PARAM([string]$message, [string[]]$choices, [int]$defaultChoice=0, [string]$Title=$null ) if($choices[0].IndexOf('&') -lt 0) { $i = 0; $choices = $choices | ForEach-Object { if($_ -notmatch '&.') { "&$i $_" } else { $_ } $i++ } } $Host.UI.PromptForChoice( $caption, $message, [Management.Automation.Host.ChoiceDescription[]]$choices, $defaultChoice ) }
combined_dataset/train/non-malicious/1135.ps1
1135.ps1
$user = 'CarbonTestUser1' $group1 = 'CarbonTestGroup1' $password = 'a1z2b3y4!' $containerPath = $null $childPath = $null function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Install-User -Username $user -Password $password -Description 'Carbon test user 1' Install-Group -Name $group1 -Description 'Carbon test group 1' $containerPath = 'Carbon-Test-GetPermissions-{0}' -f ([IO.Path]::GetRandomFileName()) $containerPath = Join-Path $env:Temp $containerPath $null = New-Item $containerPath -ItemType Directory Grant-Permission -Path $containerPath -Identity $group1 -Permission Read $childPath = Join-Path $containerPath 'Child1' $null = New-Item $childPath -ItemType File Grant-Permission -Path $childPath -Identity $user -Permission Read } function Test-ShouldGetPermissions { $perms = Get-Permission -Path $childPath Assert-NotNull $perms $group1Perms = $perms | Where-Object { $_.IdentityReference.Value -like "*\$group1" } Assert-Null $group1Perms $userPerms = $perms | Where-Object { $_.IdentityReference.Value -like "*\$user" } Assert-NotNull $userPerms Assert-True ($userPerms -is [Security.AccessControl.FileSystemAccessrule]) } function Test-ShouldGetInheritedPermissions { $perms = Get-Permission -Path $childPath -Inherited Assert-NotNull $perms $group1Perms = $perms | Where-Object { $_.IdentityReference.Value -like "*\$group1" } Assert-NotNull $group1Perms Assert-True ($group1Perms -is [Security.AccessControl.FileSystemAccessrule]) $userPerms = $perms | Where-Object { $_.IdentityReference.Value -like "*\$user" } Assert-NotNull $userPerms Assert-True ($userPerms -is [Security.AccessControl.FileSystemAccessrule]) } function Test-ShouldGetSpecificUserPermissions { $perms = Get-Permission -Path $childPath -Identity $group1 Assert-Null $perms $perms = @( Get-Permission -Path $childPath -Identity $user ) Assert-NotNull $perms Assert-Equal 1 $perms.Length Assert-NotNull $perms[0] Assert-True ($perms[0] -is [Security.AccessControl.FileSystemAccessrule]) } function Test-ShouldGetSpecificUsersInheritedPermissions { $perms = Get-Permission -Path $childPath -Identity $group1 -Inherited Assert-NotNull $perms Assert-True ($perms -is [Security.AccessControl.FileSystemAccessRule]) } function Test-ShouldGetPermissionsOnRegistryKey { $perms = Get-Permission -Path 'hkcu:\' Assert-NotNull $perms $perms | ForEach-Object { Assert-True ($_ -is [Security.AccessControl.RegistryAccessRule]) } } function Test-ShouldGetPrivateCertPermission { $foundPermission = $false Get-ChildItem -Path 'cert:\*\*' -Recurse | Where-Object { -not $_.PsIsContainer } | Where-Object { $_.HasPrivateKey } | Where-Object { $_.PrivateKey } | ForEach-Object { Join-Path -Path 'cert:' -ChildPath (Split-Path -NoQualifier -Path $_.PSPath) } | ForEach-Object { Get-Permission -Path $_ } | ForEach-Object { $foundPermission = $true Assert-NotNull $_ Assert-Is $_ ([Security.AccessControl.CryptoKeyAccessRule]) } Assert-True $foundPermission } function Test-ShouldGetSpecificIdentityCertPermission { Get-ChildItem -Path 'cert:\*\*' -Recurse | Where-Object { -not $_.PsIsContainer } | Where-Object { $_.HasPrivateKey } | Where-Object { $_.PrivateKey } | ForEach-Object { Join-Path -Path 'cert:' -ChildPath (Split-Path -NoQualifier -Path $_.PSPath) } | ForEach-Object { [object[]]$rules = Get-Permission -Path $_ foreach( $rule in $rules ) { [object[]]$identityRule = Get-Permission -Path $_ -Identity $rule.IdentityReference.Value Assert-NotNull $identityRule Assert-True ($identityRule.Count -le $rules.Count) $ } } }
combined_dataset/train/non-malicious/sample_12_74.ps1
sample_12_74.ps1
ConvertFrom-StringData @' id_whoamioutput=Whoami Diagnostic Tool id_whoamistatus=Running Whoami.exe to gather the user's SID, group memberships and privileges '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBxoiiIBbzhkve1 # wQ5f/aHHVrzH4QoemHXT27+nnXXxr6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILgi # uBftkT92U9y0gKm/wMSjhRj6ZK+5wc7ZB62+GziUMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgGpgRA8Ug2/lWy5TIx8L7hagOuhy8+yY35Lx # K/OBxl06yc/gY4zm4mphOQptJaYBihaacWJySJhLFa/IfbIlc6GlpnLtMGgHBq40 # JQESGItbUJ++JE3yZbPnq7KVpAl2hZUssiN6P6F9s+t8TYM1gjXHlTnIZQrbkZ3X # W3C80rFEpFM2nufpyXK3ZiA3R+v8Xx0z19spGOzghhft3ulMqN1XcjFVWLT9jFAi # NGhn+BBA33b3SSVQl65tRkJyZIGJdTWqgm/0h1AGJQqgSVGqHNEgWbgvdGRreczX # MLrTlzeyKqo2Za+p/z2R0mtHAj6LryCNFoK1gB1yLozGQtSGpqGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAXM5lBiZrHbxGJbfuTVEo3UST531J/ecuz # xgJ6OH+yfwIGZut4BYxgGBMyMDI0MTAyODExNDA0MC4yNzFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ # lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38 # 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC # fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D # cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA # ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT # M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB # Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo # u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0 # PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88 # 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv # eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/ # 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4 # Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6 # I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa # QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV # 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS # s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5 # WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q # 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK # CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi # TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y # Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0 # MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA # AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3 # UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS # TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3 # FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO # RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB # NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgqjftqfV5tmZV6rg3xnAqv3c5RNgqBsc58Vl+q06a1FwwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT # hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1 # KYILMA0GCSqGSIb3DQEBCwUABIICABTpS2xeb4mLtEICDs0zzebkJbjb0WIY04sL # pjAR94BxhL9AJiysKEoxcaHmpCD806zD4h9V2HQZ+ZD76/aM9amjxcvkssjsv6n3 # X3tJw7iks8flOwc81nAxlTPFrqmJLY7uj/ChtHKSTKAjZ8XxbssrvMlzyFXERCG5 # d8wXntXDGjXAlINxBX7Qvp1lHifE9hACm/S/rGoT/BqdvgDCKnU8Vm0Y9smB0wyx # D2WVml1eoqDuh/eIAQob70EfzNV0nX3SlJYjuZdU0iksbZ8I0vLRRPrJ7T+4yQqF # /YZdKO7QXwHN8rjo/cYETou3jkbwHIJMPBkomQ15LXdxj21X1rqiogTVcVoAiRq+ # e3tRsU4p9xW/Iblzxb1ygKBx/phN2OTSFHVYLYSXLCypGUjJV1qBZdk2vL1tMiRt # /sINRq/VCTYTLE9JXTFUwkIV8uiojXDYEJrzwB+U1gVE0rPWY7fCnst0fiy5coJR # utpgSFqN/mQUxz9rtO3JazD6MvIdfTZtvGXykup7ZqNjTRUUUMGrYHxjFlqYciat # ynkWM1HPMXxoa4sIyugIPFQzNWVDAzhjEnsUngdJvIa1sUnMZqqdK540rrOYfSeQ # KxvlmUxV8NjEYmABegHOpIm66BZMFsAL7w25LFRAdTTl2eCg0fAteYhi+dTpTqbg # PoOLtOoI # SIG # End signature block
combined_dataset/train/non-malicious/sample_52_6.ps1
sample_52_6.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. ##################################################################################################### # # Registers the WinRM endpoint for this instance of PowerShell. # # If the parameters '-PowerShellHome' were specified, it means that the script will be registering # an instance of PowerShell from another instance of PowerShell. # # If no parameter is specified, it means that this instance of PowerShell is registering itself. # # Assumptions: # 1. The CoreCLR and the PowerShell assemblies are side-by-side in $PSHOME # 2. Plugins are registered by version number. Only one plugin can be automatically registered # per PowerShell version. However, multiple endpoints may be manually registered for a given # plugin. # ##################################################################################################### [CmdletBinding(DefaultParameterSetName = "NotByPath")] param ( [parameter(Mandatory = $true, ParameterSetName = "ByPath")] [switch]$Force, [string] $PowerShellHome ) Set-StrictMode -Version 3.0 if (! ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Write-Error "WinRM registration requires Administrator rights. To run this cmdlet, start PowerShell with the `"Run as administrator`" option." return } function Register-WinRmPlugin { param ( # # Expected Example: # %windir%\\system32\\PowerShell\\6.0.0\\pwrshplugin.dll # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginAbsolutePath, # # Expected Example: powershell.6.0.0-beta.3 # [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginEndpointName ) $regKey = "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN\Plugin\$pluginEndpointName" $pluginArchitecture = "64" if ($env:PROCESSOR_ARCHITECTURE -match "x86" -or $env:PROCESSOR_ARCHITECTURE -eq "ARM") { $pluginArchitecture = "32" } $regKeyValueFormatString = @" <PlugInConfiguration xmlns="http://schemas.microsoft.com/wbem/wsman/1/config/PluginConfiguration" Name="{0}" Filename="{1}" SDKVersion="2" XmlRenderingType="text" Enabled="True" OutputBufferingMode="Block" ProcessIdleTimeoutSec="0" Architecture="{2}" UseSharedProcess="false" RunAsUser="" RunAsPassword="" AutoRestart="false"> <InitializationParameters> <Param Name="PSVersion" Value="7.0"/> </InitializationParameters> <Resources> <Resource ResourceUri="http://schemas.microsoft.com/powershell/{0}" SupportsOptions="true" ExactMatch="true"> <Security Uri="http://schemas.microsoft.com/powershell/{0}" ExactMatch="true" Sddl="O:NSG:BAD:P(A;;GA;;;BA)S:P(AU;FA;GA;;;WD)(AU;SA;GXGW;;;WD)"/> <Capability Type="Shell"/> </Resource> </Resources> <Quotas IdleTimeoutms="7200000" MaxConcurrentUsers="5" MaxProcessesPerShell="15" MaxMemoryPerShellMB="1024" MaxShellsPerUser="25" MaxConcurrentCommandsPerShell="1000" MaxShells="25" MaxIdleTimeoutms="43200000"/> </PlugInConfiguration> "@ $valueString = $regKeyValueFormatString -f $pluginEndpointName, $pluginAbsolutePath, $pluginArchitecture New-Item $regKey -Force > $null New-ItemProperty -Path $regKey -Name ConfigXML -Value $valueString > $null } function New-PluginConfigFile { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $pluginFile, [string] [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] $targetPsHomeDir ) # This always overwrites the file with a new version of it if the # script is invoked multiple times. Set-Content -Path $pluginFile -Value "PSHOMEDIR=$targetPsHomeDir" -ErrorAction Stop Add-Content -Path $pluginFile -Value "CORECLRDIR=$targetPsHomeDir" -ErrorAction Stop Write-Verbose "Created Plugin Config File: $pluginFile" -Verbose } function Install-PluginEndpoint { [CmdletBinding(SupportsShouldProcess, ConfirmImpact="Medium")] param ( [Parameter()] [bool] $Force, [switch] $VersionIndependent ) ###################### # # # Install the plugin # # # ###################### if (-not [String]::IsNullOrEmpty($PowerShellHome)) { $targetPsHome = $PowerShellHome $targetPsVersion = & "$targetPsHome\pwsh" -NoProfile -Command '$PSVersionTable.PSVersion.ToString()' } else { ## Get the PSHome and PSVersion using the current powershell instance $targetPsHome = $PSHOME $targetPsVersion = $PSVersionTable.PSVersion.ToString() } Write-Verbose "PowerShellHome: $targetPsHome" -Verbose # For default, not tied to the specific version endpoint, we apply # only first number in the PSVersion string to the endpoint name. # Example name: 'PowerShell.6'. if ($VersionIndependent) { $dotPos = $targetPsVersion.IndexOf(".") if ($dotPos -ne -1) { $targetPsVersion = $targetPsVersion.Substring(0, $dotPos) } } Write-Verbose "Using PowerShell Version: $targetPsVersion" -Verbose $pluginEndpointName = "PowerShell.$targetPsVersion" $endPoint = Get-PSSessionConfiguration $pluginEndpointName -Force:$Force -ErrorAction silentlycontinue 2>&1 # If endpoint exists and -Force parameter was not used, the endpoint would not be overwritten. if ($endpoint -and !$Force) { Write-Error -Category ResourceExists -ErrorId "PSSessionConfigurationExists" -Message "Endpoint $pluginEndpointName already exists." return } if (!$PSCmdlet.ShouldProcess($pluginEndpointName)) { return } if ($PSVersionTable.PSVersion -lt "6.0") { # This script is primarily used from Windows PowerShell for Win10 IoT and NanoServer to setup PSCore6 remoting endpoint # so it's ok to hardcode to 'C:\Windows' for those systems $pluginBasePath = Join-Path "C:\Windows\System32\PowerShell" $targetPsVersion } else { $pluginBasePath = Join-Path ([System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::Windows) + "\System32\PowerShell") $targetPsVersion } $resolvedPluginAbsolutePath = "" if (! (Test-Path $pluginBasePath)) { Write-Verbose "Creating $pluginBasePath" $resolvedPluginAbsolutePath = New-Item -Type Directory -Path $pluginBasePath } else { $resolvedPluginAbsolutePath = Resolve-Path $pluginBasePath } $pluginPath = Join-Path $resolvedPluginAbsolutePath "pwrshplugin.dll" # This is forced to ensure the file is placed correctly Copy-Item $targetPsHome\pwrshplugin.dll $resolvedPluginAbsolutePath -Force -Verbose -ErrorAction Stop $pluginFile = Join-Path $resolvedPluginAbsolutePath "RemotePowerShellConfig.txt" New-PluginConfigFile $pluginFile (Resolve-Path $targetPsHome) # Register the plugin Register-WinRmPlugin $pluginPath $pluginEndpointName #################################################################### # # # Validations to confirm that everything was registered correctly. # # # #################################################################### if (! (Test-Path $pluginFile)) { throw "WinRM Plugin configuration file not created. Expected = $pluginFile" } if (! (Test-Path $resolvedPluginAbsolutePath\pwrshplugin.dll)) { throw "WinRM Plugin DLL missing. Expected = $resolvedPluginAbsolutePath\pwrshplugin.dll" } try { Write-Host "`nGet-PSSessionConfiguration $pluginEndpointName" -ForegroundColor "green" Get-PSSessionConfiguration $pluginEndpointName -ErrorAction Stop } catch [Microsoft.PowerShell.Commands.WriteErrorException] { throw "No remoting session configuration matches the name $pluginEndpointName." } } Install-PluginEndpoint -Force $Force Install-PluginEndpoint -Force $Force -VersionIndependent Write-Host "Restarting WinRM to ensure that the plugin configuration change takes effect.`nThis is required for WinRM running on Windows SKUs prior to Windows 10." -ForegroundColor Magenta Restart-Service winrm # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAmMBO/z6uvMDNL # ywsEntW1l8ui09V7mB9QxyD4sH3/L6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIASzAbkapgzkIHyjEtglU6vA # HP0o6aqvz8pdcZCJCVXCMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUojy/6UU4L3Vrn/dK+XJByO4hTJOqIPTzWVdj5ai/pNX+eUNphh8Tf0a # xHN7BsJqb2Qgq8YNMrEB6Sxl61PqD1LEURtyKJYjk8b8K7Kfrhi64VAYHmi0OWjq # aJx+EfcvDB7dP5FT9PH/Z5uv4SAiByOv5z1X0YvJBNIFDmTtlvMIqQjRtrJvZO9a # 7o8iJGnxo5Vndllw9S+ZIIMkncs4UQAr0wui06M6LlRp91xmUwEPd/xe5uorliBv # A6ztNcGc/IiBjoT1hmppbilf4cNI3Wvg/Q8lc91kVRl0l0eqMMmn2jFxXe9NgALo # Fbvo8me3db60yjPg0t51gWVQnq2naKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA665q8c4j/x8zJ68EYw6yuGbLJV5LA3xdRxe9zMCIbFAIGZXrldMmU # GBMyMDI0MDExMTA0MzEyMC4zMzlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAdYnaf9yLVbIrgABAAAB1jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MzRaFw0yNDAyMDExOTEyMzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDPLM2Om8r5u3fcbDEOXydJtbkW5U34KFaftC+8QyNq # plMIzSTC1ToE0zcweQCvPIfpYtyPB3jt6fPRprvhwCksUw9p0OfmZzWPDvkt40BU # Stu813QlrloRdplLz2xpk29jIOZ4+rBbKaZkBPZ4R4LXQhkkHne0Y/Yh85ZqMMRa # MWkBM6nUwV5aDiwXqdE9Jyl0i1aWYbCqzwBRdN7CTlAJxrJ47ov3uf/lFg9hnVQc # qQYgRrRFpDNFMOP0gwz5Nj6a24GZncFEGRmKwImL+5KWPnVgvadJSRp6ZqrYV3Fm # bBmZtsF0hSlVjLQO8nxelGV7TvqIISIsv2bQMgUBVEz8wHFyU3863gHj8BCbEpJz # m75fLJsL3P66lJUNRN7CRsfNEbHdX/d6jopVOFwF7ommTQjpU37A/7YR0wJDTt6Z # sXU+j/wYlo9b22t1qUthqjRs32oGf2TRTCoQWLhJe3cAIYRlla/gEKlbuDDsG392 # 6y4EMHFxTjsjrcZEbDWwjB3wrp11Dyg1QKcDyLUs2anBolvQwJTN0mMOuXO8tBz2 # 0ng/+Xw+4w+W9PMkvW1faYi435VjKRZsHfxIPjIzZ0wf4FibmVPJHZ+aTxGsVJPx # ydChvvGCf4fe8XfYY9P5lbn9ScKc4adTd44GCrBlJ/JOsoA4OvNHY6W+XcKVcIIG # WwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFGGaVDY7TQBiMCKg2+j/zRTcYsZOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDUv+RjNidwJxSbMk1IvS8LfxNM8VaVhpxR # 1SkW+FRY6AKkn2s3On29nGEVlatblIv1qVTKkrUxLYMZ0z+RA6mmfXue2Y7/YBbz # M5kUeUgU2y1Mmbin6xadT9DzECeE7E4+3k2DmZxuV+GLFYQsqkDbe8oy7+3BSiU2 # 9qyZAYT9vRDALPUC5ZwyoPkNfKbqjl3VgFTqIubEQr56M0YdMWlqCqq0yVln9mPb # hHHzXHOjaQsurohHCf7VT8ct79po34Fd8XcsqmyhdKBy1jdyknrik+F3vEl/90qa # on5N8KTZoGtOFlaJFPnZ2DqQtb2WWkfuAoGWrGSA43Myl7+PYbUsri/NrMvAd9Z+ # J9FlqsMwXQFxAB7ujJi4hP8BH8j6qkmy4uulU5SSQa6XkElcaKQYSpJcSjkjyTDI # Opf6LZBTaFx6eeoqDZ0lURhiRqO+1yo8uXO89e6kgBeC8t1WN5ITqXnjocYgDvyF # pptsUDgnRUiI1M/Ql/O299VktMkIL72i6Qd4BBsrj3Z+iLEnKP9epUwosP1m3N2v # 9yhXQ1HiusJl63IfXIyfBJaWvQDgU3Jk4eIZSr/2KIj4ptXt496CRiHTi011kcwD # pdjQLAQiCvoj1puyhfwVf2G5ZwBptIXivNRba34KkD5oqmEoF1yRFQ84iDsf/giy # n/XIT7YY/zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD5 # r3DVRpAGQo9sTLUHeBC87NpK+qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6UmkUzAiGA8yMDI0MDExMDIzMTg0 # M1oYDzIwMjQwMTExMjMxODQzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpSaRT # AgEAMAoCAQACAiLcAgH/MAcCAQACAhOPMAoCBQDpSvXTAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAIouDKvWDvK13BPp8yLZ9iqu253wgL0Nj6LXrawrFN2w # fPo8SN3lXKJJGvcdRwLz6bDhCl+cfNI8u/gmopCGn+8bGkNO4vtxLout/wYI1Yn4 # t53ZJWgcYI8E1hVPYGnL1667nPEM3AIBTbti6QRHYhMdKAHrRiDYmHW8cmtq7NLD # FMDGNteRUox2ujebG6jIQ3M7C169CUdih/SWMzwb4iKJ6b4mIkjh7nhZd2SKWtVN # zFCAnGs4yilO/0YhA780EGs9wKPZT26PCHI9qazRC6OooeYeXAOu6q22Sy/jqFhv # X3bnT9ASm41vMqdx7NVlRob6e18hDVeNUhjNICzOT4cxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdYnaf9yLVbIrgABAAAB # 1jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA+s96VO1WGnla+JymZ4lLSHWm2eQ9fOHQGdH8JHfuO # +zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINbLTQ1XeNM+EBinOEJMjZd0 # jMNDur+AK+O8P12j5ST8MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHWJ2n/ci1WyK4AAQAAAdYwIgQgMBWsPAqxQpWQbQ0LNQ1GoQyX # bz2oGXo0lEx3t6yznU4wDQYJKoZIhvcNAQELBQAEggIAUZHgdP3KKSyt6W+4Ovtt # XQtgnJ0rElsaGiLTfPomJAIEesd3CnFog5jJa1eRL7aRMN1hXAEkBO4lXLo5J0bc # jnjdLi4NJ3hPcuFHCnw5gi9vpAldP426MS3h6hlV1zsHqnOwXM621hR/CM/ig36P # y8EavdUg3TH4vDPYt/yjzD35v3SHihkhZc4ZGtFZjF/BOmNpP8morAOTt0+RxeF5 # 6BQLsIKI6WXON/aLS+DwTpIcwcTS4nYPYJj2xQe5G3FmCLVQpIaW/Dah1Puv9i/K # 8PFvyEyF9hPacrsMs6tZVXXMxju6JlIsVH7ncFDj8/XgzK0Hgnh6wyiYCgE8hMmb # Lrtp+qmzFGr/Z8QySjaS8tBajVWcnTL92ujj80oibWpPlBAvLqbYRwIrjd5ZkDTB # hPHXDD9AASpRRULxBrTZow7Kf3jHuX5DXQUIiWFpmEFdQI7U7vHBbSTQfO976leQ # soj02rTWtw0mTTtUZrOhQF3Sj8OJeXv7LPmCwsuyyvAU4CdlN3P+rvUn+lhhXZFP # QpC6dWxszu4NUmLrzhEcOF8YrfuRA2gjH8oEjkg/OQi30COD4GGFLJoMZTY0Qu8K # EJB724GMWQGUzMAmjjUXOlzmva/wlNL03Mz0rGYRuWCCUV9UF0t9BhpIEQRircr5 # n+UdPj2k9l9UFaLk7jl4Hws= # SIG # End signature block
combined_dataset/train/non-malicious/Update-ISETabs.ps1
Update-ISETabs.ps1
foreach($tab in $psISE.PowerShellTabs) { foreach($file in $tab.Files) { $position = Select-Object -InputObject $file.Editor -Property CaretLine, CaretColumn $content = Get-Content $file.FullPath -Raw if($content -ne $file.Editor.Text) { $file.Editor.Text = Get-Content $file.FullPath -Raw Write-Verbose "Updated $($file.DisplayName)" $file.Editor.SetCaretPosition( $Position.CaretLine, $Position.CaretColumn ) } } }
combined_dataset/train/non-malicious/Kill-Process_v2.ps1
Kill-Process_v2.ps1
function Kill-Process(){ param( [string[]]$ComputerNames, [string[]]$ProcessNames, $User ) if ($ProcessNames -eq $null){Write-Error 'The parametre "ProcessNames" cannot be empty';break} if ($User -is [String]){$Connection = Get-Credential -Credential $User} if ($Connection -eq $null){ foreach ($int1 in $ComputerNames){ foreach ($int2 in $ProcessNames){ if ($int2 -notlike "*.exe") {$int2 = $int2 + '.exe'} $Kill_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" | % {$_.terminate();$count++} $Kill_Process = "" | select @{e={$int1};n='Computer'},` @{e={$int2};n='Process'}, @{e={$count};n='Count'} $Kill_Process } } } else { foreach ($int1 in $ComputerNames){ foreach ($int2 in $ProcessNames){ $Kill_Process = gwmi "win32_process" -ComputerName $int1 -filter "name='$int2'" -Credential $Connection | % {$_.terminate();$count++} $Kill_Process = "" | select @{e={$int1};n='Computer'},` @{e={$int2};n='Process'}, @{e={$count};n='Count'} $Kill_Process } } } }
combined_dataset/train/non-malicious/BridgeBot 1.2.ps1
BridgeBot 1.2.ps1
## Depends on the PoshXmpp.dll from http://CodePlex.com/PoshXmpp #requires -pssnapin PoshXmpp ########################################################################################## # @Author: Joel Bennnett # @Usage: # Start-JabberMirror.ps1 User@JabberServer.com Password "groupchat@oneserver.com" "groupchat@anotherserver.com" "BridgeBot" "http://rssfeed" ########################################################################################## param ( $JabberId = $(Read-Host "Jabber Login") ,$Password = $(Read-Host "Password") ,$IRC = "powershell%irc.freenode.net@irc.im.flosoft.biz" # $(Read-Host "First Jabber conference address") ,$JabberConf = "powershell@conference.im.flosoft.biz" # $(Read-Host "Second Jabber conference address") ,$ChatNick = "PowerBot" # $(Read-Host "The nickname you want to use") ,[string[]]$AtomFeeds = @("http://groups.google.com/group/microsoft.public.windows.powershell/feed/atom_v1_0_topics.xml") ) ## Requires System.Web for the RSS-feed option [Reflection.Assembly]::LoadWithPartialName("System.Web") | Out-Null function Start-PowerBot { $global:LastNewsCheck = $([DateTime]::Now.AddHours(-5)) $global:feedReader = new-object Xml.XmlDocument $global:PoshXmppClient = PoshXmpp\\New-Client $JabberId $Password # http://im.flosoft.biz:5280/http-poll/ PoshXmpp\\Connect-Chat $IRC $ChatNick PoshXmpp\\Connect-Chat $JabberConf $ChatNick PoshXmpp\\Send-Message $IRC "Starting Mirror to $('{0}@{1}' -f $JabberConf.Split(@('%','@'),3))" PoshXmpp\\Send-Message $JabberConf "Starting Mirror to $('{0}@{1}' -f $IRC.Split(@('%','@'),3))" PoshXmpp\\Send-Message $IRC "/msg nickserv :id Sup3rB0t" } function Process-Command($Chat, $Message) { $split = $message.Body.Split(" |;") $from = $Message.From.Bare.ToLower() switch -regex ( $split[0] ) { "!list" { Write-Host "!LIST COMMAND. Send users of [$Chat] to [$($Message.From.Bare)]" -fore Magenta $users = @($PoshXmppClient.ChatManager.GetUsers( $Chat ).Values) PoshXmpp\\Send-Message $from ("There are $($users.Count) on $($Chat):") PoshXmpp\\Send-Message $from ($users -join ", ") } "!gh|!get-help|!man" { $help = get-help $split[1] | Select Synopsis,Syntax $msgs = (get-help $split[1] | ... Synopsis Syntax | Out-String -w 1000 | split-string "`n" -count 4)[0,2]; PoshXmpp\\Send-Message $from $help.Synopsis; PoshXmpp\\Send-Message $from ($help.Syntax | Out-String -w 1000 | split-string "`n" -count 4 -rem )[1] } } } # Max IRC Message Length http://www.faqs.org/rfcs/rfc1459.html # PRIVMSG CHANNEL MSG $IrcMaxLen = 510 - ("PRIVMSG :".Length + $IRC.Length + $JabberId.split('@')[0].Length) function Get-Feeds([string[]]$JIDs,[string[]]$AtomFeeds) { Write-Verbose "Checking feeds..." foreach($feed in $AtomFeeds) { $feedReader.Load($feed) for($i = $feedReader.feed.entry.count - 1; $i -ge 0; $i--) { $e = $feedReader.feed.entry[$i] if([datetime]$e.updated -gt $global:LastNewsCheck) { foreach($jid in $JIDs) { $msg = ([System.Web.HttpUtility]::HtmlDecode($e.summary."#text") -replace "<br>", "").Trim() $template = "{0} (Posted at {1:hh:mm} by {2}) {{0}} :: {3}" -f $e.title."#text", [datetime]$e.updated, $e.author.name, $e.link.href $len = [math]::Min($IrcMaxLen,($template.Length + $msg.Length)) - ($template.Length +3) PoshXmpp\\Send-Message $jid $($template -f $msg.SubString(0,$len)) } [Threading.Thread]::Sleep( 500 ) } } } $global:LastNewsCheck = [DateTime]::Now } [regex]$anagram = "^Unscramble ... (.*)$" function Bridge { PoshXmpp\\Receive-Message -All | foreach-object { Write-Verbose ("MESSAGE: FROM[{0}] RESOURCE[{1}] BODY[{2}]" -f $_.From.Bare, $_.From.Resource, $_.Body) if( $_.Type -eq "Error" ) { Write-Error $_.Error } if( $_.From.Resource -ne $ChatNick ) { $Chat = $null; if( $_.From.Bare -eq $IRC ) { $Chat = $JabberConf; } elseif( $_.From.Bare -eq $JabberConf ) { $Chat = $IRC; } else { $_ } if($Chat){ if(![String]::IsNullOrEmpty($_.Body) -and ($_.Body[0] -eq '!')) { PoshXmpp\\Send-Message $Chat ("<{0}> {1}" -f $_.From.Resource, $_.Body) Process-Command $Chat $_ } elseif(($_.From.Resource -eq "GeoBot") -and $_.Body.StartsWith("Unscramble ... ")) { Write-Verbose "KILL ANAGRAM! $($anagram.Match($_.Body).Groups[1].value)" $answers = Solve-Anagram $($anagram.Match($_.Body).Groups[1].value) foreach($ans in $answers) { Write-Verbose "ANAGRAM: $($_.From.Bare) $ans" PoshXmpp\\Send-Message "$($_.From.Bare.ToLower())" "$ans (PowerShell Scripting FTW!)" } } elseif( ![String]::IsNullOrEmpty($_.Subject) ) { $_.To = $Chat # Send it directly using a method on the PoshXmppClient $PoshXmppClient.Send($_) } else { PoshXmpp\\Send-Message $Chat ("<{0}> {1}" -f $_.From.Resource, $_.Body) } } } } } function Start-Bridge { "PRESS ANY KEY TO STOP" while(!$Host.UI.RawUI.KeyAvailable) { Bridge Get-Feeds @($IRC,$JabberConf) $AtomFeeds $counter = 0 Write-Verbose "PRESS ANY KEY TO STOP" # we're going to wait 3 * 60 seconds while(!$Host.UI.RawUI.KeyAvailable -and ($counter++ -lt 1800)) { Bridge [Threading.Thread]::Sleep( 100 ) } } } function Stop-PowerBot { PoshXmpp\\Disconnect-Chat $IRC $ChatNick PoshXmpp\\Disconnect-Chat $JabberConf $ChatNick $global:PoshXmppClient.Close(); } ## ## Silly anagram spoiler ## function Solve-Anagram($anagram) { [xml]$form = Post-HTTP "http://www.anagramsolver.net/Default.aspx" "" [xml]$result = Post-HTTP "http://www.anagramsolver.net/Default.aspx" ( "{0}&{1}&{2}&btnAnagram=Anagram" -f "txtAnagram=$anagram", ("__VIEWSTATE={0}" -f $($form.SelectSingleNode("//*[@id='__VIEWSTATE']").value)), ("__EVENTVALIDATION={0}" -f $($form.SelectSingleNode("//*[@id='__EVENTVALIDATION']").value))) $result.SelectSingleNode("//*[@id='lblResult']")."#text" } function Post-HTTP($url,$bytes) { $request = [System.Net.WebRequest]::Create($url) #$bytes = [Text.Encoding]::UTF8.GetBytes( $post ) $request.ContentType = "application/x-www-form-urlencoded" $request.ContentLength = $bytes.Length $request.Method = "POST" $rq = new-object IO.StreamWriter $request.GetRequestStream() $rq.Write($bytes,0,$bytes.Length) $rq.Close() $response = $request.GetResponse() $reader = new-object IO.StreamReader $response.GetResponseStream(),[Text.Encoding]::UTF8 return $reader.ReadToEnd() }
combined_dataset/train/non-malicious/2612.ps1
2612.ps1
$LabConfig = Get-Content C:\git-repositories\PowerShell\MSFVMLab\LabVMS.json | ConvertFrom-Json $WorkingDirectory = $LabConfig.WorkingDirectory $DomainCred = Import-Clixml "$WorkingDirectory\vmlab_domainadmin.xml" $dc = ( $LabConfig.Servers | Where-Object {$_.Class -eq 'DomainController'}).Name Copy-VMFile -VMName $dc -SourcePath C:\Temp\AdventureWorks2014.Full.bak -DestinationPath C:\Temp\AdventureWorks2014.Full.bak -FileSource Host -CreateFullPath -Force Copy-VMFile -VMName $dc -SourcePath C:\git-repositories\PowerShell\MSFVMLab\BuildAG.ps1 -DestinationPath C:\Temp\BuildAG.ps1 -FileSource Host -CreateFullPath -Force Invoke-Command -VMName $dc -ScriptBlock {C:\temp\BuildAG.ps1} -Credential $DomainCred
combined_dataset/train/non-malicious/2075.ps1
2075.ps1
Describe "Script with a class definition run path" -Tags "CI" { $TestCases = @( @{ FileName = 'MyTest.ps1'; Name = 'path without a comma' } @{ FileName = 'My,Test.ps1'; Name = 'path with a comma' } ) It "Script with a class definition can run from a <Name>" -TestCases $TestCases { param( $FileName ) $FilePath = Join-Path -Path $TestDrive -ChildPath $FileName @' class MyClass { static [string]$MyProperty = 'Some value' } [MyClass]::MyProperty '@ | Out-File -FilePath $FilePath ( . $FilePath ) | Should -Match 'Some value' } }
combined_dataset/train/non-malicious/Users_Contacts from CSV_2.ps1
Users_Contacts from CSV_2.ps1
#=============================================================================# #=============================================================================# #=============================================================================# # # SCRIPT : CreateOrUpdateUsersOrContacts.ps1 # LAST UPDATE : 9/18/2009 # VERSION : 1.00 # # # DESCRIPTION: # PowerShell script for creating/updating mail-enabled Users or Contact objects # in Active Directory for Exchange 2003. Uses a CSV source file. # # # TO DO: # * Logging. # * Roll-back # * Eliminate need to hard-code LDAP fields, use CSV header instead. # * Confirm required LDAP fields are present and populated. # * Incorporate command-line argument functionality # # (NOTE: NONE OF THESE HAVE BEEN IMPLEMENTED YET!!!) # # CSV input path and file name # $File = $args[0] # -f <CSV File Name> # # Type of Active Directory object to target # $ADObject = $args[1] # -a <AD Object Type> # # Where the Contacts should be created # $OUPath = $args[2] # -o <Target OU Path> # # Which Exchange environment to create contacts in (CHI or LA) # $Affiliate = $args[3] # -e <Exchange Environment> # # Test only -- Add 'what if' to New-QADObject # $TestFlag = $args[4] # -t # # Domain and username of authentication credentials # $UserName = $args[5] # -u <domain\\sAMAccountName> # # Password for above credentials # $Password = $args[6] # -p <password> # # # VERSION HISTORY: # 1.00 - 8/18/2009 # * Initial Release. # # # AUTHOR: # banglogic - banglogic@gmail.com # #=============================================================================# #=============================================================================# #=============================================================================# #=============================================================================# #=============================================================================# # Functions #=============================================================================# #=============================================================================# #=============================================================================# Function Set_People_Attributes { #=============================================================================# $Input | Set-QADObject -ObjectAttributes @{ c = ($_.c); co = ($_.co); countryCode = ($_.countryCode); comment = ($_.comment); company = ($_.company); description = ($_.description); division = ($_.division); employeeID = ($_.employeeID); employeeType = ($_.employeeType); extensionAttribute1 = ($_.extensionAttribute1); extensionAttribute2 = ($_.extensionAttribute2); extensionAttribute3 = ($_.extensionAttribute3); extensionAttribute4 = ($_.extensionAttribute4); extensionAttribute5 = ($_.extensionAttribute5); extensionAttribute6 = ($_.extensionAttribute6); extensionAttribute7 = ($_.extensionAttribute7); extensionAttribute8 = ($_.extensionAttribute8); extensionAttribute9 = ($_.extensionAttribute9); extensionAttribute10 = ($_.extensionAttribute10); extensionAttribute11 = ($_.extensionAttribute11); extensionAttribute12 = ($_.extensionAttribute12); extensionAttribute13 = ($_.extensionAttribute13); extensionAttribute14 = ($_.extensionAttribute14); extensionAttribute15 = ($_.extensionAttribute15); facsimileTelephoneNumber = ($_.facsimileTelephoneNumber); givenName = ($_.givenName); info = ($_.info); initials = ($_.initials); l = ($_.l); # memberOf = ($_.memberOf); # Group memberships mobile = ($_.mobile); physicalDeliveryOfficeName = ($_.physicalDeliveryOfficeName); postalCode = ($_.postalCode); sn = ($_.sn); st = ($_.st); streetAddress = ($_.streetAddress); telephoneNumber = ($_.telephoneNumber); title = ($_.title) } -Verbose } #=============================================================================# Function Set_User_Attributes { #=============================================================================# $Input | Set-QADUser -ObjectAttributes @{ homeDirectory = ($_.homeDirectory); homeDrive = ($_.homeDrive); # manager = ($_.manager); # Path of user's manager mobile = ($_.mobile); profilePath = ($_.profilePath); sAMAccountName = ($_.sAMAccountName); scriptPath = ($_.scriptPath); userPrincipalName = ($_.sAMAccountName + $Domain); wWWHomePage = ($_.wWWHomePage) } -Verbose } #=============================================================================# Function Set_Mail_Attributes { #=============================================================================# $Input | Set-QADObject -ObjectAttributes @{ legacyExchangeDN = ($Root_LegacyExchangeDN + $_.mailNickname); mail = ($_.mail); mailNickname = ($_.mailNickname); # msExchHideFromAddressLists = ($_.msExchHideFromAddressLists); # TRUE or FALSE # msExchHomeServerName = ($_.msExchHomeServerName); # Only for User objects targetAddress = ($_.targetAddress) } -Verbose } #=============================================================================# #=============================================================================# # Script Setup #=============================================================================# #=============================================================================# #=============================================================================# # Load snap-in for Quest ActiveRoles cmdlets #=============================================================================# If (-not (Get-PSSnapin Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue)) { Add-PSSnapin Quest.ActiveRoles.ADManagement -Verbose } #=============================================================================# # Initialize variables #=============================================================================# $CSVPath = "\\\\SERVER\\SharePath\\ListOfPeople.csv" $PeopleList = Import-Csv $CSVPath -Verbose # CSV file containing people info $MailEnable = $false # Set these all to null to clear from last execution. $ObjectType = $null $Domain = $null $OU = $null $Root_LegacyExchangeDN = $null $Server = $null $UserName = $null #=============================================================================# # Affiliate Number 1 attributes #=============================================================================# $Affiliate1_Contact_OU = "OU=Contacts,DC=affiliate1,DC=com" $Affiliate1_User_OU = "OU=Users,DC=affiliate1,DC=com" $Affiliate1_Root_LegacyExchangeDN = "/O=Affiliate 1/OU=AFFILIATE1/cn=Recipients/cn=" $Affiliate1_Domain = "@affiliate1.com" $Affiliate1_Server = "domaincontroller.affiliate1.com" #=============================================================================# # Affiliate Number 2 attributes #=============================================================================# $Affiliate2_Contact_OU = "OU=Contacts,DC=affiliate2,DC=com" $Affiliate2_User_OU = "OU=Users,DC=affiliate2,DC=com" $Affiliate2_Root_LegacyExchangeDN = "/O=Affiliate 2/OU=AFFILIATE2/cn=Recipients/cn=" $Affiliate2_Domain = "@affiliate2.com" $Affiliate2_Server = "domaincontroller.affiliate2.com" #=============================================================================# # Credentials #=============================================================================# $Location = Read-Host "Affiliate location: ''A1'' for Affiliate 1, ''A2'' for Affiliate 2:" $ObjectType = Read-Host "Object type? ''Contact'' or ''User'':" If ($Location -eq "AF1") { If ($ObjectType -eq "User") { $OU = $Affiliate1_User_OU } Else { $OU = $CHI_Contact_OU } $Root_LegacyExchangeDN = $Affiliate1_Root_LegacyExchangeDN $Domain = $Affiliate1_Domain $Server = $Affiliate1_Server $UserName = $Affiliate1_UserName } If ($Location -eq "AF2") { If ($ObjectType -eq "User") { $OU = $Affiliate2_User_OU } Else { $OU = $CHI_Contact_OU } $Root_LegacyExchangeDN = $Affiliate2_Root_LegacyExchangeDN $Domain = $Affiliate2_Domain $Server = $Affiliate2_Server $UserName = $Affiliate2_UserName } $UserName = Read-Host "Enter username for the domain you are connecting to (''DOMAIN\\username''):" $Password = Read-Host "Enter password for"$UserName -AsSecureString Connect-QADService -Service $Server -ConnectionAccount $UserName -ConnectionPassword $Password -Verbose #=============================================================================# #=============================================================================# # Main Script #=============================================================================# #=============================================================================# #=============================================================================# # Create or update Contact or User objects from CSV records #=============================================================================# $PeopleList | ForEach-Object { $Person = Get-QADObject -DisplayName $_.displayName -LdapFilter "(&(objectClass=$ObjectType))" -Verbose If ($Person -eq $Null){ Write-Host "Creating Object for" $_.displayName -ForegroundColor Green -Verbose If ($ObjectType -eq "Contact") { $Person = New-QADObject -ParentContainer $OU -Name $_.cn -Type $ObjectType -DisplayName $_.displayName -Verbose } ElseIf ($ObjectType -eq "User") { $Person = New-QADUser -ParentContainer $OU -Name $_.cn -DisplayName $_.displayName -SamAccountName $_.sAMAccountName -UserPrincipalName ($_.sAMAccountName+"$Domain") -Verbose $Person | Set_User_Attributes } $Person | Set_People_Attributes } Else { Write-Host "Updating Properties for" $_.displayName -ForegroundColor Red -Verbose $Person | Set_People_Attributes } If ($MailEnable -eq $true) { $Person | Set_Mail_Attributes } } #=============================================================================# # END SCRIPT #=============================================================================#
combined_dataset/train/non-malicious/3948.ps1
3948.ps1
function Check-CmdletReturnType { param($cmdletName, $cmdletReturn) $cmdletData = Get-Command $cmdletName; Assert-NotNull $cmdletData; [array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") }; [array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") }; $realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.",""; return $cmdletReturnTypes -contains $realReturnType; } function Test-ExpressRouteCircuitCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/expressRouteCircuits" "Brazil South"; $SkuTier = "Standard"; $SkuFamily = "MeteredData"; $ServiceProviderName = "Interxion"; $PeeringLocation = "London"; $BandwidthInMbps = 100; $SkuTierSet = "Premium"; $SkuFamilySet = "UnlimitedData"; $BandwidthInMbpsSet = 200; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vExpressRouteCircuit = New-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -Location $location -SkuTier $SkuTier -SkuFamily $SkuFamily -ServiceProviderName $ServiceProviderName -PeeringLocation $PeeringLocation -BandwidthInMbps $BandwidthInMbps; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "New-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTier $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamily $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $ServiceProviderName $vExpressRouteCircuit.ServiceProviderProperties.ServiceProviderName; Assert-AreEqual $PeeringLocation $vExpressRouteCircuit.ServiceProviderProperties.PeeringLocation; Assert-AreEqual $BandwidthInMbps $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; $vExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTier $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamily $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $ServiceProviderName $vExpressRouteCircuit.ServiceProviderProperties.ServiceProviderName; Assert-AreEqual $PeeringLocation $vExpressRouteCircuit.ServiceProviderProperties.PeeringLocation; Assert-AreEqual $BandwidthInMbps $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $vExpressRouteCircuit.Sku.Tier = $SkuTierSet; $vExpressRouteCircuit.Sku.Family = $SkuFamilySet; $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps = $BandwidthInMbpsSet; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Set-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTierSet $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamilySet $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $BandwidthInMbpsSet $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; $vExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTierSet $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamilySet $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $BandwidthInMbpsSet $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeExpressRouteCircuit = $job | Receive-Job; Assert-AreEqual $true $removeExpressRouteCircuit; Assert-ThrowsContains { Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname } "not found"; Assert-ThrowsContains { Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-ExpressRouteCircuitCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $location = Get-ProviderLocation "Microsoft.Network/expressRouteCircuits" "Brazil South"; $SkuTier = "Standard"; $SkuFamily = "MeteredData"; $ServiceProviderName = "Interxion"; $PeeringLocation = "London"; $BandwidthInMbps = 100; $AllowClassicOperation = $true; $Tag = @{tag1='test'}; $SkuTierSet = "Premium"; $SkuFamilySet = "UnlimitedData"; $BandwidthInMbpsSet = 200; $AllowClassicOperationSet = $false; $TagSet = @{tag2='testSet'}; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vExpressRouteCircuit = New-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -Location $location -SkuTier $SkuTier -SkuFamily $SkuFamily -ServiceProviderName $ServiceProviderName -PeeringLocation $PeeringLocation -BandwidthInMbps $BandwidthInMbps -AllowClassicOperation $AllowClassicOperation -Tag $Tag; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "New-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTier $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamily $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $ServiceProviderName $vExpressRouteCircuit.ServiceProviderProperties.ServiceProviderName; Assert-AreEqual $PeeringLocation $vExpressRouteCircuit.ServiceProviderProperties.PeeringLocation; Assert-AreEqual $BandwidthInMbps $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; Assert-AreEqual $AllowClassicOperation $vExpressRouteCircuit.AllowClassicOperations; Assert-AreEqualObjectProperties $Tag $vExpressRouteCircuit.Tag; $vExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTier $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamily $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $ServiceProviderName $vExpressRouteCircuit.ServiceProviderProperties.ServiceProviderName; Assert-AreEqual $PeeringLocation $vExpressRouteCircuit.ServiceProviderProperties.PeeringLocation; Assert-AreEqual $BandwidthInMbps $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; Assert-AreEqual $AllowClassicOperation $vExpressRouteCircuit.AllowClassicOperations; Assert-AreEqualObjectProperties $Tag $vExpressRouteCircuit.Tag; $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $vExpressRouteCircuit.Sku.Tier = $SkuTierSet; $vExpressRouteCircuit.Sku.Family = $SkuFamilySet; $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps = $BandwidthInMbpsSet; $vExpressRouteCircuit.AllowClassicOperations = $AllowClassicOperationSet; $vExpressRouteCircuit.Tag = $TagSet; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Set-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTierSet $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamilySet $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $BandwidthInMbpsSet $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; Assert-AreEqual $AllowClassicOperationSet $vExpressRouteCircuit.AllowClassicOperations; Assert-AreEqualObjectProperties $TagSet $vExpressRouteCircuit.Tag; $vExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname; Assert-NotNull $vExpressRouteCircuit; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuit" $vExpressRouteCircuit }; Assert-AreEqual $rname $vExpressRouteCircuit.Name; Assert-AreEqual $SkuTierSet $vExpressRouteCircuit.Sku.Tier; Assert-AreEqual $SkuFamilySet $vExpressRouteCircuit.Sku.Family; Assert-AreEqual $BandwidthInMbpsSet $vExpressRouteCircuit.ServiceProviderProperties.BandwidthInMbps; Assert-AreEqual $AllowClassicOperationSet $vExpressRouteCircuit.AllowClassicOperations; Assert-AreEqualObjectProperties $TagSet $vExpressRouteCircuit.Tag; $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName $rgname; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $listExpressRouteCircuit = Get-AzExpressRouteCircuit -ResourceGroupName "*" -Name "*"; Assert-NotNull ($listExpressRouteCircuit | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname }); $job = Remove-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob; $job | Wait-Job; $removeExpressRouteCircuit = $job | Receive-Job; Assert-AreEqual $true $removeExpressRouteCircuit; Assert-ThrowsContains { Get-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname } "not found"; Assert-ThrowsContains { Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit } "not found"; } finally { Clean-ResourceGroup $rgname; } } function Test-ExpressRouteCircuitAuthorizationCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = Get-ResourceName; $rnameAdd = "${rname}Add"; $location = Get-ProviderLocation "Microsoft.Network/expressRouteCircuits" "Brazil South"; $ExpressRouteCircuitSkuTier = "Standard"; $ExpressRouteCircuitSkuFamily = "MeteredData"; $ExpressRouteCircuitServiceProviderName = "Interxion"; $ExpressRouteCircuitPeeringLocation = "London"; $ExpressRouteCircuitBandwidthInMbps = 100; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vExpressRouteCircuitAuthorization = New-AzExpressRouteCircuitAuthorization -Name $rname; Assert-NotNull $vExpressRouteCircuitAuthorization; Assert-True { Check-CmdletReturnType "New-AzExpressRouteCircuitAuthorization" $vExpressRouteCircuitAuthorization }; $vExpressRouteCircuit = New-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -Authorization $vExpressRouteCircuitAuthorization -SkuTier $ExpressRouteCircuitSkuTier -SkuFamily $ExpressRouteCircuitSkuFamily -ServiceProviderName $ExpressRouteCircuitServiceProviderName -PeeringLocation $ExpressRouteCircuitPeeringLocation -BandwidthInMbps $ExpressRouteCircuitBandwidthInMbps -Location $location; Assert-NotNull $vExpressRouteCircuit; Assert-AreEqual $rname $vExpressRouteCircuitAuthorization.Name; $vExpressRouteCircuitAuthorization = Get-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; Assert-NotNull $vExpressRouteCircuitAuthorization; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitAuthorization" $vExpressRouteCircuitAuthorization }; Assert-AreEqual $rname $vExpressRouteCircuitAuthorization.Name; $listExpressRouteCircuitAuthorization = Get-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitAuthorization | Where-Object { $_.Name -eq $rname }); $vExpressRouteCircuit = Add-AzExpressRouteCircuitAuthorization -Name $rnameAdd -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuitAuthorization = Get-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rnameAdd; Assert-NotNull $vExpressRouteCircuitAuthorization; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitAuthorization" $vExpressRouteCircuitAuthorization }; Assert-AreEqual $rnameAdd $vExpressRouteCircuitAuthorization.Name; $listExpressRouteCircuitAuthorization = Get-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitAuthorization | Where-Object { $_.Name -eq $rnameAdd }); Assert-ThrowsContains { Add-AzExpressRouteCircuitAuthorization -Name $rnameAdd -ExpressRouteCircuit $vExpressRouteCircuit } "already exists"; $vExpressRouteCircuit = Remove-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rnameAdd; $vExpressRouteCircuit = Remove-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Remove-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; Assert-ThrowsContains { Get-AzExpressRouteCircuitAuthorization -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname } "Sequence contains no matching element"; } finally { Clean-ResourceGroup $rgname; } } function Test-ExpressRouteCircuitPeeringCRUDMinimalParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = "AzurePrivatePeering"; $location = Get-ProviderLocation "Microsoft.Network/expressRouteCircuits" "Brazil South"; $PeeringType = "AzurePrivatePeering"; $PeerASN = 1; $PrimaryPeerAddressPrefix = "10.0.0.0/30"; $SecondaryPeerAddressPrefix = "12.0.0.0/30"; $VlanId = 1; $PeeringTypeSet = "AzurePrivatePeering"; $PeerASNSet = 2; $PrimaryPeerAddressPrefixSet = "11.0.0.0/30"; $SecondaryPeerAddressPrefixSet = "14.0.0.0/30"; $VlanIdSet = 2; $ExpressRouteCircuitSkuTier = "Standard"; $ExpressRouteCircuitSkuFamily = "MeteredData"; $ExpressRouteCircuitServiceProviderName = "Interxion"; $ExpressRouteCircuitPeeringLocation = "London"; $ExpressRouteCircuitBandwidthInMbps = 100; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vExpressRouteCircuitPeering = New-AzExpressRouteCircuitPeeringConfig -Name $rname -PeeringType $PeeringType -PeerASN $PeerASN -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefix -VlanId $VlanId; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "New-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; $vExpressRouteCircuit = New-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -Peering $vExpressRouteCircuitPeering -SkuTier $ExpressRouteCircuitSkuTier -SkuFamily $ExpressRouteCircuitSkuFamily -ServiceProviderName $ExpressRouteCircuitServiceProviderName -PeeringLocation $ExpressRouteCircuitPeeringLocation -BandwidthInMbps $ExpressRouteCircuitBandwidthInMbps -Location $location; Assert-NotNull $vExpressRouteCircuit; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringType $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASN $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefix $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefix $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanId $vExpressRouteCircuitPeering.VlanId; $vExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringType $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASN $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefix $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefix $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanId $vExpressRouteCircuitPeering.VlanId; $listExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitPeering | Where-Object { $_.Name -eq $rname }); $vExpressRouteCircuit = Set-AzExpressRouteCircuitPeeringConfig -Name $rname -ExpressRouteCircuit $vExpressRouteCircuit -PeeringType $PeeringTypeSet -PeerASN $PeerASNSet -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefixSet -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefixSet -VlanId $VlanIdSet; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringTypeSet $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASNSet $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefixSet $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefixSet $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanIdSet $vExpressRouteCircuitPeering.VlanId; $listExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitPeering | Where-Object { $_.Name -eq $rname }); $vExpressRouteCircuit = Remove-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Remove-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; Assert-ThrowsContains { Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzExpressRouteCircuitPeeringConfig -Name $rname -ExpressRouteCircuit $vExpressRouteCircuit -PeeringType $PeeringTypeSet -PeerASN $PeerASNSet -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefixSet -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefixSet -VlanId $VlanIdSet } "does not exist"; } finally { Clean-ResourceGroup $rgname; } } function Test-ExpressRouteCircuitPeeringCRUDAllParameters { $rgname = Get-ResourceGroupName; $rglocation = Get-ProviderLocation ResourceManagement; $rname = "AzurePrivatePeering"; $location = Get-ProviderLocation "Microsoft.Network/expressRouteCircuits" "Brazil South"; $PeeringType = "AzurePrivatePeering"; $PeerASN = 1; $PrimaryPeerAddressPrefix = "10.0.0.0/30"; $SecondaryPeerAddressPrefix = "12.0.0.0/30"; $VlanId = 1; $SharedKey = "testkey"; $PeerAddressType = "IPv4"; $PeeringTypeSet = "AzurePrivatePeering"; $PeerASNSet = 2; $PrimaryPeerAddressPrefixSet = "11.0.0.0/30"; $SecondaryPeerAddressPrefixSet = "14.0.0.0/30"; $VlanIdSet = 2; $SharedKeySet = "testkey2"; $PeerAddressTypeSet = "IPv4"; $ExpressRouteCircuitSkuTier = "Standard"; $ExpressRouteCircuitSkuFamily = "MeteredData"; $ExpressRouteCircuitServiceProviderName = "Interxion"; $ExpressRouteCircuitPeeringLocation = "London"; $ExpressRouteCircuitBandwidthInMbps = 100; try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation; $vExpressRouteCircuitPeering = New-AzExpressRouteCircuitPeeringConfig -Name $rname -PeeringType $PeeringType -PeerASN $PeerASN -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefix -VlanId $VlanId -SharedKey $SharedKey -PeerAddressType $PeerAddressType; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "New-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; $vExpressRouteCircuit = New-AzExpressRouteCircuit -ResourceGroupName $rgname -Name $rname -Peering $vExpressRouteCircuitPeering -SkuTier $ExpressRouteCircuitSkuTier -SkuFamily $ExpressRouteCircuitSkuFamily -ServiceProviderName $ExpressRouteCircuitServiceProviderName -PeeringLocation $ExpressRouteCircuitPeeringLocation -BandwidthInMbps $ExpressRouteCircuitBandwidthInMbps -Location $location; Assert-NotNull $vExpressRouteCircuit; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringType $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASN $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefix $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefix $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanId $vExpressRouteCircuitPeering.VlanId; $vExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringType $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASN $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefix $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefix $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanId $vExpressRouteCircuitPeering.VlanId; $listExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitPeering | Where-Object { $_.Name -eq $rname }); $vExpressRouteCircuit = Set-AzExpressRouteCircuitPeeringConfig -Name $rname -ExpressRouteCircuit $vExpressRouteCircuit -PeeringType $PeeringTypeSet -PeerASN $PeerASNSet -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefixSet -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefixSet -VlanId $VlanIdSet -SharedKey $SharedKeySet -PeerAddressType $PeerAddressTypeSet; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; $vExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; Assert-NotNull $vExpressRouteCircuitPeering; Assert-True { Check-CmdletReturnType "Get-AzExpressRouteCircuitPeeringConfig" $vExpressRouteCircuitPeering }; Assert-AreEqual $rname $vExpressRouteCircuitPeering.Name; Assert-AreEqual $PeeringTypeSet $vExpressRouteCircuitPeering.PeeringType; Assert-AreEqual $PeerASNSet $vExpressRouteCircuitPeering.PeerASN; Assert-AreEqual $PrimaryPeerAddressPrefixSet $vExpressRouteCircuitPeering.PrimaryPeerAddressPrefix; Assert-AreEqual $SecondaryPeerAddressPrefixSet $vExpressRouteCircuitPeering.SecondaryPeerAddressPrefix; Assert-AreEqual $VlanIdSet $vExpressRouteCircuitPeering.VlanId; $listExpressRouteCircuitPeering = Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull ($listExpressRouteCircuitPeering | Where-Object { $_.Name -eq $rname }); $vExpressRouteCircuit = Remove-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Remove-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname; $vExpressRouteCircuit = Set-AzExpressRouteCircuit -ExpressRouteCircuit $vExpressRouteCircuit; Assert-NotNull $vExpressRouteCircuit; Assert-ThrowsContains { Get-AzExpressRouteCircuitPeeringConfig -ExpressRouteCircuit $vExpressRouteCircuit -Name $rname } "Sequence contains no matching element"; Assert-ThrowsContains { Set-AzExpressRouteCircuitPeeringConfig -Name $rname -ExpressRouteCircuit $vExpressRouteCircuit -PeeringType $PeeringTypeSet -PeerASN $PeerASNSet -PrimaryPeerAddressPrefix $PrimaryPeerAddressPrefixSet -SecondaryPeerAddressPrefix $SecondaryPeerAddressPrefixSet -VlanId $VlanIdSet -SharedKey $SharedKeySet -PeerAddressType $PeerAddressTypeSet } "does not exist"; } finally { Clean-ResourceGroup $rgname; } }
combined_dataset/train/non-malicious/3763.ps1
3763.ps1
function Test-CreateIntegrationAccountMap { $xslt1FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt1Map.xslt" $xslt2FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt2Map.xslt" $xslt3FilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt3Map.xslt" $liquidFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleLiquidMap.liquid" $xslt1MapContent = [IO.File]::ReadAllText($xslt1FilePath) $xslt2MapContent = [IO.File]::ReadAllText($xslt2FilePath) $xslt3MapContent = [IO.File]::ReadAllText($xslt3FilePath) $liquidMapContent = [IO.File]::ReadAllText($liquidFilePath) $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountMapName1 = "XSLT-" + (getAssetname) $integrationAccountMapName2 = "XSLT-" + (getAssetname) $integrationAccountMapName3 = "XSLT-" + (getAssetname) $integrationAccountXslt2MapName = "XSLT2-" + (getAssetname) $integrationAccountXslt3MapName = "XSLT3-" + (getAssetname) $integrationAccountLiquidMapName = "Liquid-" + (getAssetname) $integrationAccountLiquidMapName2 = "Liquid2-" + (getAssetname) $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $integrationAccountMap1 = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName1 -MapDefinition $xslt1MapContent Assert-AreEqual $integrationAccountMapName1 $integrationAccountMap1.Name $integrationAccountMap2 = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName2 -MapFilePath $xslt1FilePath Assert-AreEqual $integrationAccountMapName2 $integrationAccountMap2.Name $integrationAccountMap3 = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName3 -MapFilePath $xslt1FilePath -MapType "Xslt" -ContentType "application/xml" Assert-AreEqual $integrationAccountMapName3 $integrationAccountMap3.Name $integrationAccountXslt2Map = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountXslt2MapName -MapDefinition $xslt2MapContent -MapType "Xslt20" Assert-AreEqual $integrationAccountXslt2MapName $integrationAccountXslt2Map.Name $integrationAccountXslt3Map = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountXslt3MapName -MapDefinition $xslt3MapContent -MapType "Xslt30" Assert-AreEqual $integrationAccountXslt3MapName $integrationAccountXslt3Map.Name $integrationAccountLiquidMap = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountLiquidMapName -MapDefinition $liquidMapContent -MapType "Liquid" Assert-AreEqual $integrationAccountLiquidMapName $integrationAccountLiquidMap.Name $integrationAccountLiquidMap2 = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountLiquidMapName2 -MapDefinition $liquidMapContent -MapType "liquid" Assert-AreEqual $integrationAccountLiquidMapName2 $integrationAccountLiquidMap2.Name Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-GetIntegrationAccountMap { $mapFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt1Map.xslt" $mapContent = [IO.File]::ReadAllText($mapFilePath) $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountMapName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $integrationAccountMap = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -MapDefinition $mapContent Assert-AreEqual $integrationAccountMapName $integrationAccountMap.Name $result = Get-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName Assert-AreEqual $integrationAccountMapName $result.Name $result1 = Get-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName Assert-AreEqual $integrationAccountMapName $result1.Name Assert-True { $result1.Count -gt 0 } Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-RemoveIntegrationAccountMap { $mapFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt1Map.xslt" $mapContent = [IO.File]::ReadAllText($mapFilePath) $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountMapName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $integrationAccountMap = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -MapDefinition $mapContent Assert-AreEqual $integrationAccountMapName $integrationAccountMap.Name Remove-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -Force Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-UpdateIntegrationAccountMap { $mapFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt1Map.xslt" $mapContent = [IO.File]::ReadAllText($mapFilePath) $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccountMapName = getAssetname $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $integrationAccountMap = New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -MapDefinition $mapContent Assert-AreEqual $integrationAccountMapName $integrationAccountMap.Name $integrationAccountMapUpdated = Set-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -MapDefinition $mapContent -Force Assert-AreEqual $integrationAccountMapName $integrationAccountMap.Name $integrationAccountMapUpdated = Set-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapName $integrationAccountMapName -MapDefinition $mapContent -Force Assert-AreEqual $integrationAccountMapName $integrationAccountMap.Name Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force } function Test-ListIntegrationAccountMap { $xsltFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleXslt1Map.xslt" $liquidFilePath = Join-Path (Join-Path $TestOutputRoot "Resources") "SampleLiquidMap.liquid" $xsltContent = [IO.File]::ReadAllText($xsltFilePath) $liquidContent = [IO.File]::ReadAllText($liquidFilePath) $resourceGroup = TestSetup-CreateResourceGroup $integrationAccountName = "IA-" + (getAssetname) $integrationAccount = TestSetup-CreateIntegrationAccount $resourceGroup.ResourceGroupName $integrationAccountName $xsltMapName = "XSLT-" + (getAssetname) $liquidMapName = "Liquid-" + (getAssetname) New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapType "XSLT" -MapName $xsltMapName -MapDefinition $xsltContent New-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapType "Liquid" -MapName $liquidMapName -MapDefinition $liquidContent $result = Get-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName Assert-True { $result.Count -eq 2 } $result = Get-AzIntegrationAccountMap -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -MapType "Xslt" Assert-True { $result.Count -eq 1 } Remove-AzIntegrationAccount -ResourceGroupName $resourceGroup.ResourceGroupName -IntegrationAccountName $integrationAccountName -Force }
combined_dataset/train/non-malicious/sample_49_7.ps1
sample_49_7.ps1
# # Module manifest for module 'OCI.PSModules.Operatoraccesscontrol' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment', 'Get-OCIOperatoraccesscontrolAccessRequest', 'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList', 'Get-OCIOperatoraccesscontrolAccessRequestsList', 'Get-OCIOperatoraccesscontrolAssignmentValidationStatus', 'Get-OCIOperatoraccesscontrolAuditLogReport', 'Get-OCIOperatoraccesscontrolInteractionsList', 'Get-OCIOperatoraccesscontrolOperatorAction', 'Get-OCIOperatoraccesscontrolOperatorActionsList', 'Get-OCIOperatoraccesscontrolOperatorControl', 'Get-OCIOperatoraccesscontrolOperatorControlAssignment', 'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList', 'Get-OCIOperatoraccesscontrolOperatorControlsList', 'Invoke-OCIOperatoraccesscontrolApproveAccessRequest', 'Invoke-OCIOperatoraccesscontrolInteractionRequest', 'Invoke-OCIOperatoraccesscontrolRejectAccessRequest', 'Invoke-OCIOperatoraccesscontrolReviewAccessRequest', 'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest', 'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment', 'Move-OCIOperatoraccesscontrolOperatorControlCompartment', 'New-OCIOperatoraccesscontrolOperatorControl', 'New-OCIOperatoraccesscontrolOperatorControlAssignment', 'Remove-OCIOperatoraccesscontrolOperatorControl', 'Remove-OCIOperatoraccesscontrolOperatorControlAssignment', 'Update-OCIOperatoraccesscontrolOperatorControl', 'Update-OCIOperatoraccesscontrolOperatorControlAssignment' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_12_85.ps1
sample_12_85.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\resolve@1.22.8\node_modules\resolve\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\resolve@1.22.8\node_modules\resolve\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\resolve@1.22.8\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/resolve@1.22.8/node_modules/resolve/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/resolve@1.22.8/node_modules/resolve/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/resolve@1.22.8/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../bin/resolve" $args } else { & "$basedir/node$exe" "$basedir/../../bin/resolve" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../bin/resolve" $args } else { & "node$exe" "$basedir/../../bin/resolve" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_55_87.ps1
sample_55_87.ps1
. "$PSScriptRoot/api.ps1" . "$PSScriptRoot/../php/api.ps1" [Console]::OutputEncoding = [System.Text.Encoding]::UTF8 $project = Get-Project-Definition $env:allegro_root = Resolve-Path -Path (Get-Project-Root) $env:include_path = ".:" + $env:allegro_root + ":" + $env:allegro_root + "/External" $env:php_ini_path = Get-Php-Ini-From-Ini-File -IniFilePath (Get-Full-Path('Config/config.ini')) $env:php_path = Get-Php-From-Ini-File -IniFilePath (Get-Full-Path('Config/config.ini')) $env:php = Get-Php-From-Ini-File -IniFilePath (Get-Full-Path('Config/config.ini')) $env:default_charset = $project.encoding $env:environment = Get-Environment-Name $env:version = Get-Hris-Version function Write-Header { $logFile = $env:log_file $env:start_date = GET-DATE Add-Content -Path $logFile -Value "------------ Start $(Get-Date) $env:task_description --------------------`n" } function Write-CR { $logFile = $env:log_file $endDate = Get-Date $duration = New-TimeSpan -Start $env:start_date -End $endDate $success = $LastExitCode -eq 0 $report = "$endDate in $duration - Status " if ($success) { $report += "OK" } else { $report += "KO ($LastExitCode)" } Add-Content -Path $logFile -Value "`n------------ End $report --------------------`n" }
combined_dataset/train/non-malicious/sample_67_9.ps1
sample_67_9.ps1
# # Module manifest for module 'ClientContext' # # Generated by: JakubVanak # # Generated on: 01.05.2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'ClientContext.psm1' # Version number of this module. ModuleVersion = '0.0.1' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '57daa51b-9ec3-48bd-8da8-0dd1a671f31e' # Author of this module Author = 'Jakub Vanak' # Company or vendor of this module CompanyName = 'NaviPartner' # Copyright statement for this module Copyright = '(c) NaviPartner. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the PowerShell engine required by this module # PowerShellVersion = '' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module #RequiredAssemblies = @( # "$PSScriptRoot\..\..\..\.test-runner\CSLibs\Newtonsoft.Json.dll", # "$PSScriptRoot\..\..\..\.test-runner\CSLibs\System.ServiceModel.Primitives.dll", # "$PSScriptRoot\..\..\..\.test-runner\CSLibs\Microsoft.Dynamics.Framework.UI.Client.dll") # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_50_1.ps1
sample_50_1.ps1
# # Module manifest for module 'OCI.PSModules.Core' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Core.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6da66bae-1e88-4a00-9740-811ccd4999c8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Core Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Core.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIComputeImageShapeCompatibilityEntry', 'Add-OCIVirtualNetworkDrgRouteDistributionStatements', 'Add-OCIVirtualNetworkDrgRouteRules', 'Add-OCIVirtualNetworkIpv6SubnetCidr', 'Add-OCIVirtualNetworkIpv6VcnCidr', 'Add-OCIVirtualNetworkNetworkSecurityGroupSecurityRules', 'Add-OCIVirtualNetworkPublicIpPoolCapacity', 'Add-OCIVirtualNetworkVcnCidr', 'Confirm-OCIVirtualNetworkByoipRange', 'Connect-OCIVirtualNetworkLocalPeeringGateways', 'Connect-OCIVirtualNetworkRemotePeeringConnections', 'Copy-OCIBlockstorageBootVolumeBackup', 'Copy-OCIBlockstorageVolumeBackup', 'Copy-OCIBlockstorageVolumeGroupBackup', 'DisMount-OCIComputeBootVolume', 'DisMount-OCIComputeManagementInstancePoolInstance', 'DisMount-OCIComputeManagementLoadBalancer', 'DisMount-OCIComputeVnic', 'DisMount-OCIComputeVolume', 'DisMount-OCIVirtualNetworkServiceId', 'Edit-OCIVirtualNetworkVcnCidr', 'Export-OCIComputeImage', 'Get-OCIBlockstorageBlockVolumeReplica', 'Get-OCIBlockstorageBlockVolumeReplicasList', 'Get-OCIBlockstorageBootVolume', 'Get-OCIBlockstorageBootVolumeBackup', 'Get-OCIBlockstorageBootVolumeBackupsList', 'Get-OCIBlockstorageBootVolumeKmsKey', 'Get-OCIBlockstorageBootVolumeReplica', 'Get-OCIBlockstorageBootVolumeReplicasList', 'Get-OCIBlockstorageBootVolumesList', 'Get-OCIBlockstorageVolume', 'Get-OCIBlockstorageVolumeBackup', 'Get-OCIBlockstorageVolumeBackupPoliciesList', 'Get-OCIBlockstorageVolumeBackupPolicy', 'Get-OCIBlockstorageVolumeBackupPolicyAssetAssignment', 'Get-OCIBlockstorageVolumeBackupPolicyAssignment', 'Get-OCIBlockstorageVolumeBackupsList', 'Get-OCIBlockstorageVolumeGroup', 'Get-OCIBlockstorageVolumeGroupBackup', 'Get-OCIBlockstorageVolumeGroupBackupsList', 'Get-OCIBlockstorageVolumeGroupReplica', 'Get-OCIBlockstorageVolumeGroupReplicasList', 'Get-OCIBlockstorageVolumeGroupsList', 'Get-OCIBlockstorageVolumeKmsKey', 'Get-OCIBlockstorageVolumesList', 'Get-OCIComputeAppCatalogListing', 'Get-OCIComputeAppCatalogListingAgreements', 'Get-OCIComputeAppCatalogListingResourceVersion', 'Get-OCIComputeAppCatalogListingResourceVersionsList', 'Get-OCIComputeAppCatalogListingsList', 'Get-OCIComputeAppCatalogSubscriptionsList', 'Get-OCIComputeBootVolumeAttachment', 'Get-OCIComputeBootVolumeAttachmentsList', 'Get-OCIComputeCapacityReservation', 'Get-OCIComputeCapacityReservationInstanceShapesList', 'Get-OCIComputeCapacityReservationInstancesList', 'Get-OCIComputeCapacityReservationsList', 'Get-OCIComputeCapacityTopologiesList', 'Get-OCIComputeCapacityTopology', 'Get-OCIComputeCapacityTopologyComputeBareMetalHostsList', 'Get-OCIComputeCapacityTopologyComputeHpcIslandsList', 'Get-OCIComputeCapacityTopologyComputeNetworkBlocksList', 'Get-OCIComputeCluster', 'Get-OCIComputeClustersList', 'Get-OCIComputeConsoleHistoriesList', 'Get-OCIComputeConsoleHistory', 'Get-OCIComputeConsoleHistoryContent', 'Get-OCIComputeDedicatedVmHost', 'Get-OCIComputeDedicatedVmHostInstanceShapesList', 'Get-OCIComputeDedicatedVmHostInstancesList', 'Get-OCIComputeDedicatedVmHostShapesList', 'Get-OCIComputeDedicatedVmHostsList', 'Get-OCIComputeGlobalImageCapabilitySchema', 'Get-OCIComputeGlobalImageCapabilitySchemasList', 'Get-OCIComputeGlobalImageCapabilitySchemaVersion', 'Get-OCIComputeGlobalImageCapabilitySchemaVersionsList', 'Get-OCIComputeImage', 'Get-OCIComputeImageCapabilitySchema', 'Get-OCIComputeImageCapabilitySchemasList', 'Get-OCIComputeImageShapeCompatibilityEntriesList', 'Get-OCIComputeImageShapeCompatibilityEntry', 'Get-OCIComputeImagesList', 'Get-OCIComputeInstance', 'Get-OCIComputeInstanceConsoleConnection', 'Get-OCIComputeInstanceConsoleConnectionsList', 'Get-OCIComputeInstanceDevicesList', 'Get-OCIComputeInstanceMaintenanceReboot', 'Get-OCIComputeInstancesList', 'Get-OCIComputeManagementClusterNetwork', 'Get-OCIComputeManagementClusterNetworkInstancesList', 'Get-OCIComputeManagementClusterNetworksList', 'Get-OCIComputeManagementInstanceConfiguration', 'Get-OCIComputeManagementInstanceConfigurationsList', 'Get-OCIComputeManagementInstancePool', 'Get-OCIComputeManagementInstancePoolInstance', 'Get-OCIComputeManagementInstancePoolInstancesList', 'Get-OCIComputeManagementInstancePoolLoadBalancerAttachment', 'Get-OCIComputeManagementInstancePoolsList', 'Get-OCIComputeMeasuredBootReport', 'Get-OCIComputeShapesList', 'Get-OCIComputeVnicAttachment', 'Get-OCIComputeVnicAttachmentsList', 'Get-OCIComputeVolumeAttachment', 'Get-OCIComputeVolumeAttachmentsList', 'Get-OCIComputeWindowsInstanceInitialCredentials', 'Get-OCIVirtualNetworkAllDrgAttachments', 'Get-OCIVirtualNetworkAllowedIkeIPSecParameters', 'Get-OCIVirtualNetworkAllowedPeerRegionsForRemotePeeringList', 'Get-OCIVirtualNetworkByoipAllocatedRangesList', 'Get-OCIVirtualNetworkByoipRange', 'Get-OCIVirtualNetworkByoipRangesList', 'Get-OCIVirtualNetworkCaptureFilter', 'Get-OCIVirtualNetworkCaptureFiltersList', 'Get-OCIVirtualNetworkCpe', 'Get-OCIVirtualNetworkCpeDeviceConfigContent', 'Get-OCIVirtualNetworkCpeDeviceShape', 'Get-OCIVirtualNetworkCpeDeviceShapesList', 'Get-OCIVirtualNetworkCpesList', 'Get-OCIVirtualNetworkCrossConnect', 'Get-OCIVirtualNetworkCrossConnectGroup', 'Get-OCIVirtualNetworkCrossConnectGroupsList', 'Get-OCIVirtualNetworkCrossConnectLetterOfAuthority', 'Get-OCIVirtualNetworkCrossConnectLocationsList', 'Get-OCIVirtualNetworkCrossConnectMappingsList', 'Get-OCIVirtualNetworkCrossconnectPortSpeedShapesList', 'Get-OCIVirtualNetworkCrossConnectsList', 'Get-OCIVirtualNetworkCrossConnectStatus', 'Get-OCIVirtualNetworkDhcpOptions', 'Get-OCIVirtualNetworkDhcpOptionsList', 'Get-OCIVirtualNetworkDrg', 'Get-OCIVirtualNetworkDrgAttachment', 'Get-OCIVirtualNetworkDrgAttachmentsList', 'Get-OCIVirtualNetworkDrgRedundancyStatus', 'Get-OCIVirtualNetworkDrgRouteDistribution', 'Get-OCIVirtualNetworkDrgRouteDistributionsList', 'Get-OCIVirtualNetworkDrgRouteDistributionStatementsList', 'Get-OCIVirtualNetworkDrgRouteRulesList', 'Get-OCIVirtualNetworkDrgRouteTable', 'Get-OCIVirtualNetworkDrgRouteTablesList', 'Get-OCIVirtualNetworkDrgsList', 'Get-OCIVirtualNetworkFastConnectProviderService', 'Get-OCIVirtualNetworkFastConnectProviderServiceKey', 'Get-OCIVirtualNetworkFastConnectProviderServicesList', 'Get-OCIVirtualNetworkFastConnectProviderVirtualCircuitBandwidthShapesList', 'Get-OCIVirtualNetworkInternetGateway', 'Get-OCIVirtualNetworkInternetGatewaysList', 'Get-OCIVirtualNetworkIpInventoryList', 'Get-OCIVirtualNetworkIPSecConnection', 'Get-OCIVirtualNetworkIPSecConnectionDeviceConfig', 'Get-OCIVirtualNetworkIPSecConnectionDeviceStatus', 'Get-OCIVirtualNetworkIPSecConnectionsList', 'Get-OCIVirtualNetworkIPSecConnectionTunnel', 'Get-OCIVirtualNetworkIPSecConnectionTunnelError', 'Get-OCIVirtualNetworkIPSecConnectionTunnelRoutesList', 'Get-OCIVirtualNetworkIPSecConnectionTunnelSecurityAssociationsList', 'Get-OCIVirtualNetworkIPSecConnectionTunnelSharedSecret', 'Get-OCIVirtualNetworkIPSecConnectionTunnelsList', 'Get-OCIVirtualNetworkIpsecCpeDeviceConfigContent', 'Get-OCIVirtualNetworkIpv6', 'Get-OCIVirtualNetworkIpv6sList', 'Get-OCIVirtualNetworkLocalPeeringGateway', 'Get-OCIVirtualNetworkLocalPeeringGatewaysList', 'Get-OCIVirtualNetworkNatGateway', 'Get-OCIVirtualNetworkNatGatewaysList', 'Get-OCIVirtualNetworkNetworkingTopology', 'Get-OCIVirtualNetworkNetworkSecurityGroup', 'Get-OCIVirtualNetworkNetworkSecurityGroupSecurityRulesList', 'Get-OCIVirtualNetworkNetworkSecurityGroupsList', 'Get-OCIVirtualNetworkNetworkSecurityGroupVnicsList', 'Get-OCIVirtualNetworkPrivateIp', 'Get-OCIVirtualNetworkPrivateIpsList', 'Get-OCIVirtualNetworkPublicIp', 'Get-OCIVirtualNetworkPublicIpByIpAddress', 'Get-OCIVirtualNetworkPublicIpByPrivateIpId', 'Get-OCIVirtualNetworkPublicIpPool', 'Get-OCIVirtualNetworkPublicIpPoolsList', 'Get-OCIVirtualNetworkPublicIpsList', 'Get-OCIVirtualNetworkRemotePeeringConnection', 'Get-OCIVirtualNetworkRemotePeeringConnectionsList', 'Get-OCIVirtualNetworkResourceIpInventory', 'Get-OCIVirtualNetworkRouteTable', 'Get-OCIVirtualNetworkRouteTablesList', 'Get-OCIVirtualNetworkSecurityList', 'Get-OCIVirtualNetworkSecurityListsList', 'Get-OCIVirtualNetworkService', 'Get-OCIVirtualNetworkServiceGateway', 'Get-OCIVirtualNetworkServiceGatewaysList', 'Get-OCIVirtualNetworkServicesList', 'Get-OCIVirtualNetworkSubnet', 'Get-OCIVirtualNetworkSubnetCidrUtilization', 'Get-OCIVirtualNetworkSubnetIpInventory', 'Get-OCIVirtualNetworkSubnetsList', 'Get-OCIVirtualNetworkSubnetTopology', 'Get-OCIVirtualNetworkTunnelCpeDeviceConfig', 'Get-OCIVirtualNetworkTunnelCpeDeviceConfigContent', 'Get-OCIVirtualNetworkUpgradeStatus', 'Get-OCIVirtualNetworkVcn', 'Get-OCIVirtualNetworkVcnDnsResolverAssociation', 'Get-OCIVirtualNetworkVcnOverlap', 'Get-OCIVirtualNetworkVcnsList', 'Get-OCIVirtualNetworkVcnTopology', 'Get-OCIVirtualNetworkVirtualCircuit', 'Get-OCIVirtualNetworkVirtualCircuitAssociatedTunnelsList', 'Get-OCIVirtualNetworkVirtualCircuitBandwidthShapesList', 'Get-OCIVirtualNetworkVirtualCircuitPublicPrefixesList', 'Get-OCIVirtualNetworkVirtualCircuitsList', 'Get-OCIVirtualNetworkVlan', 'Get-OCIVirtualNetworkVlansList', 'Get-OCIVirtualNetworkVnic', 'Get-OCIVirtualNetworkVtap', 'Get-OCIVirtualNetworkVtapsList', 'Invoke-OCIComputeInstanceAction', 'Invoke-OCIComputeManagementLaunchInstanceConfiguration', 'Invoke-OCIComputeManagementSoftresetInstancePool', 'Invoke-OCIComputeManagementSoftstopInstancePool', 'Invoke-OCIComputeManagementTerminateClusterNetwork', 'Invoke-OCIComputeManagementTerminateInstancePool', 'Invoke-OCIComputeTerminateInstance', 'Invoke-OCIVirtualNetworkAdvertiseByoipRange', 'Invoke-OCIVirtualNetworkBulkAddVirtualCircuitPublicPrefixes', 'Invoke-OCIVirtualNetworkBulkDeleteVirtualCircuitPublicPrefixes', 'Invoke-OCIVirtualNetworkUpgradeDrg', 'Invoke-OCIVirtualNetworkWithdrawByoipRange', 'Mount-OCIComputeBootVolume', 'Mount-OCIComputeManagementInstancePoolInstance', 'Mount-OCIComputeManagementLoadBalancer', 'Mount-OCIComputeVnic', 'Mount-OCIComputeVolume', 'Mount-OCIVirtualNetworkServiceId', 'Move-OCIBlockstorageBootVolumeBackupCompartment', 'Move-OCIBlockstorageBootVolumeCompartment', 'Move-OCIBlockstorageVolumeBackupCompartment', 'Move-OCIBlockstorageVolumeCompartment', 'Move-OCIBlockstorageVolumeGroupBackupCompartment', 'Move-OCIBlockstorageVolumeGroupCompartment', 'Move-OCIComputeCapacityReservationCompartment', 'Move-OCIComputeCapacityTopologyCompartment', 'Move-OCIComputeClusterCompartment', 'Move-OCIComputeDedicatedVmHostCompartment', 'Move-OCIComputeImageCapabilitySchemaCompartment', 'Move-OCIComputeImageCompartment', 'Move-OCIComputeInstanceCompartment', 'Move-OCIComputeManagementClusterNetworkCompartment', 'Move-OCIComputeManagementInstanceConfigurationCompartment', 'Move-OCIComputeManagementInstancePoolCompartment', 'Move-OCIVirtualNetworkByoipRangeCompartment', 'Move-OCIVirtualNetworkCaptureFilterCompartment', 'Move-OCIVirtualNetworkCpeCompartment', 'Move-OCIVirtualNetworkCrossConnectCompartment', 'Move-OCIVirtualNetworkCrossConnectGroupCompartment', 'Move-OCIVirtualNetworkDhcpOptionsCompartment', 'Move-OCIVirtualNetworkDrgCompartment', 'Move-OCIVirtualNetworkInternetGatewayCompartment', 'Move-OCIVirtualNetworkIPSecConnectionCompartment', 'Move-OCIVirtualNetworkLocalPeeringGatewayCompartment', 'Move-OCIVirtualNetworkNatGatewayCompartment', 'Move-OCIVirtualNetworkNetworkSecurityGroupCompartment', 'Move-OCIVirtualNetworkPublicIpCompartment', 'Move-OCIVirtualNetworkPublicIpPoolCompartment', 'Move-OCIVirtualNetworkRemotePeeringConnectionCompartment', 'Move-OCIVirtualNetworkRouteTableCompartment', 'Move-OCIVirtualNetworkSecurityListCompartment', 'Move-OCIVirtualNetworkServiceGatewayCompartment', 'Move-OCIVirtualNetworkSubnetCompartment', 'Move-OCIVirtualNetworkVcnCompartment', 'Move-OCIVirtualNetworkVirtualCircuitCompartment', 'Move-OCIVirtualNetworkVlanCompartment', 'Move-OCIVirtualNetworkVtapCompartment', 'New-OCIBlockstorageBootVolume', 'New-OCIBlockstorageBootVolumeBackup', 'New-OCIBlockstorageVolume', 'New-OCIBlockstorageVolumeBackup', 'New-OCIBlockstorageVolumeBackupPolicy', 'New-OCIBlockstorageVolumeBackupPolicyAssignment', 'New-OCIBlockstorageVolumeGroup', 'New-OCIBlockstorageVolumeGroupBackup', 'New-OCIComputeAppCatalogSubscription', 'New-OCIComputeCapacityReport', 'New-OCIComputeCapacityReservation', 'New-OCIComputeCapacityTopology', 'New-OCIComputeCluster', 'New-OCIComputeDedicatedVmHost', 'New-OCIComputeImage', 'New-OCIComputeImageCapabilitySchema', 'New-OCIComputeInstance', 'New-OCIComputeInstanceConsoleConnection', 'New-OCIComputeManagementClusterNetwork', 'New-OCIComputeManagementInstanceConfiguration', 'New-OCIComputeManagementInstancePool', 'New-OCIVirtualNetworkByoipRange', 'New-OCIVirtualNetworkCaptureFilter', 'New-OCIVirtualNetworkCpe', 'New-OCIVirtualNetworkCrossConnect', 'New-OCIVirtualNetworkCrossConnectGroup', 'New-OCIVirtualNetworkDhcpOptions', 'New-OCIVirtualNetworkDrg', 'New-OCIVirtualNetworkDrgAttachment', 'New-OCIVirtualNetworkDrgRouteDistribution', 'New-OCIVirtualNetworkDrgRouteTable', 'New-OCIVirtualNetworkInternetGateway', 'New-OCIVirtualNetworkIPSecConnection', 'New-OCIVirtualNetworkIpv6', 'New-OCIVirtualNetworkLocalPeeringGateway', 'New-OCIVirtualNetworkNatGateway', 'New-OCIVirtualNetworkNetworkSecurityGroup', 'New-OCIVirtualNetworkPrivateIp', 'New-OCIVirtualNetworkPublicIp', 'New-OCIVirtualNetworkPublicIpPool', 'New-OCIVirtualNetworkRemotePeeringConnection', 'New-OCIVirtualNetworkRouteTable', 'New-OCIVirtualNetworkSecurityList', 'New-OCIVirtualNetworkServiceGateway', 'New-OCIVirtualNetworkSubnet', 'New-OCIVirtualNetworkVcn', 'New-OCIVirtualNetworkVirtualCircuit', 'New-OCIVirtualNetworkVlan', 'New-OCIVirtualNetworkVtap', 'Receive-OCIComputeShieldedIntegrityPolicy', 'Remove-OCIBlockstorageBootVolume', 'Remove-OCIBlockstorageBootVolumeBackup', 'Remove-OCIBlockstorageBootVolumeKmsKey', 'Remove-OCIBlockstorageVolume', 'Remove-OCIBlockstorageVolumeBackup', 'Remove-OCIBlockstorageVolumeBackupPolicy', 'Remove-OCIBlockstorageVolumeBackupPolicyAssignment', 'Remove-OCIBlockstorageVolumeGroup', 'Remove-OCIBlockstorageVolumeGroupBackup', 'Remove-OCIBlockstorageVolumeKmsKey', 'Remove-OCIComputeAppCatalogSubscription', 'Remove-OCIComputeCapacityReservation', 'Remove-OCIComputeCapacityTopology', 'Remove-OCIComputeCluster', 'Remove-OCIComputeConsoleHistory', 'Remove-OCIComputeDedicatedVmHost', 'Remove-OCIComputeImage', 'Remove-OCIComputeImageCapabilitySchema', 'Remove-OCIComputeImageShapeCompatibilityEntry', 'Remove-OCIComputeInstanceConsoleConnection', 'Remove-OCIComputeManagementInstanceConfiguration', 'Remove-OCIVirtualNetworkByoipRange', 'Remove-OCIVirtualNetworkCaptureFilter', 'Remove-OCIVirtualNetworkCpe', 'Remove-OCIVirtualNetworkCrossConnect', 'Remove-OCIVirtualNetworkCrossConnectGroup', 'Remove-OCIVirtualNetworkDhcpOptions', 'Remove-OCIVirtualNetworkDrg', 'Remove-OCIVirtualNetworkDrgAttachment', 'Remove-OCIVirtualNetworkDrgRouteDistribution', 'Remove-OCIVirtualNetworkDrgRouteDistributionStatements', 'Remove-OCIVirtualNetworkDrgRouteRules', 'Remove-OCIVirtualNetworkDrgRouteTable', 'Remove-OCIVirtualNetworkExportDrgRouteDistribution', 'Remove-OCIVirtualNetworkImportDrgRouteDistribution', 'Remove-OCIVirtualNetworkInternetGateway', 'Remove-OCIVirtualNetworkIPSecConnection', 'Remove-OCIVirtualNetworkIpv6', 'Remove-OCIVirtualNetworkIpv6SubnetCidr', 'Remove-OCIVirtualNetworkIpv6VcnCidr', 'Remove-OCIVirtualNetworkLocalPeeringGateway', 'Remove-OCIVirtualNetworkNatGateway', 'Remove-OCIVirtualNetworkNetworkSecurityGroup', 'Remove-OCIVirtualNetworkNetworkSecurityGroupSecurityRules', 'Remove-OCIVirtualNetworkPrivateIp', 'Remove-OCIVirtualNetworkPublicIp', 'Remove-OCIVirtualNetworkPublicIpPool', 'Remove-OCIVirtualNetworkPublicIpPoolCapacity', 'Remove-OCIVirtualNetworkRemotePeeringConnection', 'Remove-OCIVirtualNetworkRouteTable', 'Remove-OCIVirtualNetworkSecurityList', 'Remove-OCIVirtualNetworkServiceGateway', 'Remove-OCIVirtualNetworkSubnet', 'Remove-OCIVirtualNetworkVcn', 'Remove-OCIVirtualNetworkVcnCidr', 'Remove-OCIVirtualNetworkVirtualCircuit', 'Remove-OCIVirtualNetworkVlan', 'Remove-OCIVirtualNetworkVtap', 'Reset-OCIComputeManagementInstancePool', 'Save-OCIComputeConsoleHistory', 'Start-OCIComputeManagementInstancePool', 'Stop-OCIComputeManagementInstancePool', 'Update-OCIBlockstorageBootVolume', 'Update-OCIBlockstorageBootVolumeBackup', 'Update-OCIBlockstorageBootVolumeKmsKey', 'Update-OCIBlockstorageVolume', 'Update-OCIBlockstorageVolumeBackup', 'Update-OCIBlockstorageVolumeBackupPolicy', 'Update-OCIBlockstorageVolumeGroup', 'Update-OCIBlockstorageVolumeGroupBackup', 'Update-OCIBlockstorageVolumeKmsKey', 'Update-OCIComputeCapacityReservation', 'Update-OCIComputeCapacityTopology', 'Update-OCIComputeCluster', 'Update-OCIComputeConsoleHistory', 'Update-OCIComputeDedicatedVmHost', 'Update-OCIComputeImage', 'Update-OCIComputeImageCapabilitySchema', 'Update-OCIComputeInstance', 'Update-OCIComputeInstanceConsoleConnection', 'Update-OCIComputeManagementClusterNetwork', 'Update-OCIComputeManagementInstanceConfiguration', 'Update-OCIComputeManagementInstancePool', 'Update-OCIComputeVolumeAttachment', 'Update-OCIVirtualNetworkByoipRange', 'Update-OCIVirtualNetworkCaptureFilter', 'Update-OCIVirtualNetworkCpe', 'Update-OCIVirtualNetworkCrossConnect', 'Update-OCIVirtualNetworkCrossConnectGroup', 'Update-OCIVirtualNetworkDhcpOptions', 'Update-OCIVirtualNetworkDrg', 'Update-OCIVirtualNetworkDrgAttachment', 'Update-OCIVirtualNetworkDrgRouteDistribution', 'Update-OCIVirtualNetworkDrgRouteDistributionStatements', 'Update-OCIVirtualNetworkDrgRouteRules', 'Update-OCIVirtualNetworkDrgRouteTable', 'Update-OCIVirtualNetworkInternetGateway', 'Update-OCIVirtualNetworkIPSecConnection', 'Update-OCIVirtualNetworkIPSecConnectionTunnel', 'Update-OCIVirtualNetworkIPSecConnectionTunnelSharedSecret', 'Update-OCIVirtualNetworkIpv6', 'Update-OCIVirtualNetworkLocalPeeringGateway', 'Update-OCIVirtualNetworkNatGateway', 'Update-OCIVirtualNetworkNetworkSecurityGroup', 'Update-OCIVirtualNetworkNetworkSecurityGroupSecurityRules', 'Update-OCIVirtualNetworkPrivateIp', 'Update-OCIVirtualNetworkPublicIp', 'Update-OCIVirtualNetworkPublicIpPool', 'Update-OCIVirtualNetworkRemotePeeringConnection', 'Update-OCIVirtualNetworkRouteTable', 'Update-OCIVirtualNetworkSecurityList', 'Update-OCIVirtualNetworkServiceGateway', 'Update-OCIVirtualNetworkSubnet', 'Update-OCIVirtualNetworkTunnelCpeDeviceConfig', 'Update-OCIVirtualNetworkVcn', 'Update-OCIVirtualNetworkVirtualCircuit', 'Update-OCIVirtualNetworkVlan', 'Update-OCIVirtualNetworkVnic', 'Update-OCIVirtualNetworkVtap' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Core' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2200e57e-b53f-4e8d-96c9-43d4360ace3e.ps1
2200e57e-b53f-4e8d-96c9-43d4360ace3e.ps1
# Environment proprties [string]$QTDIR = "C:\\Qt\\4.8.3-msvc2008" [string]$rootDir = "C:\\Build\\" [string]$buildDir = "C:\\Build\\build_dir\\" [string]$outputDir = "C:\\Build\\output_dir\\" [string]$svnDir = "C:\\Build\\build_dir\\vacuum" [string]$svnUrl = "http://vacuum-im.googlecode.com/svn/trunk/" [string]$qmake = "qmake.exe" [Environment]::SetEnvironmentVariable("QTDIR", $QTDIR, "User") $env:Path += ";C:\\Qt\\4.8.3-msvc2008\\bin\\" Import-VisualStudioVars -VisualStudioVersion 2008 -Architecture x86 $currentScriptDirectory = split-path -parent $MyInvocation.MyCommand.Definition [Reflection.Assembly]::LoadFile(($currentScriptDirectory + ".\\SharpSvn\\SharpSvn.dll")) $svnClient = New-Object SharpSvn.SvnClient $repoUri = New-Object SharpSvn.SvnUriTarget($svnUrl) Write-Host "Getting source code from subversion repository" $repoUri -ForegroundColor Green $svnClient.CheckOut($repoUri, $svnDir) $svnInfo = $null $svnClient.GetInfo($SvnDir, ([ref]$svnInfo)) $rev = $svnInfo.LastChangeRevision Set-Location $svnDir Write-Host "Configuring ..." -ForegroundColor Green & qmake.exe -r CONFIG-=debug CONFIG+=release INSTALL_PREFIX=C:/Build/output_dir Write-Host "Building ..." -ForegroundColor Green & nmake /NOLOGO Write-Host "Installing ..." -ForegroundColor Green & nmake install /NOLOGO
combined_dataset/train/non-malicious/2727.ps1
2727.ps1
Get-HotFix | Select-Object HotfixID, Caption, Description, InstalledBy
combined_dataset/train/non-malicious/sample_63_44.ps1
sample_63_44.ps1
<# .SYNOPSIS UninstallSyncServiceIIS.ps1 script file This is a place-holder file only fofr agent patch build purposes #> Write-Host "This file functionality is deprecated and is place-holder only" # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEvnFrRZvKy/OS # C0ygkPg/c9JDdInV1kiXJEGiWC3HZ6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEzMJQPUPOFWDq0gS4hvErW8 # fWJkpZRMljzzwPX7X7H2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjHsHRmtuxFPNcY7YhHoxWKHd/MQbkLQti0iIp8qN5ZU4ygdcVEJ69gNu # BDqvG8DjATKsMwFTASU7jbVvRhGOsClba5+4dn4dd98ju3MMsn4mw3lkG/AGPbBd # zYPuhJbpDG6/a4FN3T2nfdtKGQXTJGYs+vB/rZTKX7a5DfVx4g95B7egDsEGYMv/ # BWdHNEmxj1zlq5/LZ+mt5F00j5xX7zPRwDNTxDlrKIN9CoOxGtGs5ZMnbwjIOWb/ # LtL6yBPPQrCUy4mPKMTkXnG0Os2gdanB+tOxoXkStEb+JHDA7tHHG/tvCHjaowlY # 298Sw7tvXPNLeGfd+lxmR/XefAAeMqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDHJEtasASqi6xoNnQZwqrzsYB0un3srJVZ3gfOwGCkOwIGZnLcJM8W # GBMyMDI0MDYyMTIxMjYxNC4yOTFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOof/WEwIhgPMjAyNDA2MjEyMTIzNDVaGA8yMDI0MDYyMjIxMjM0NVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6h/9YQIBADAHAgEAAgIHHDAHAgEAAgIRdDAKAgUA # 6iFO4QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACAM1EbIQcnUBJLGfuL1 # 7tDFWdz8YaRiEEWK3gRGPIDfnPQqy6r+wmN19RSs0qSl7fMqV85t/oxSE82oppyb # ZdTRknErae+nb3Yruax+/euaxFDwq7v+4u/xsDGS2h7O3qQzBwOLLrtJ/nqW5rjI # cvIeejlC/CyNtspIFK6lvwZsMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg1RxfdDOoRWQc6x3fhI0C0z8gw5UoYJrYWUXVc60pSHAwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIIHXPRmwFaQNWaZdXhCPU+NMVqYNi3/SF6SuofZF7vhH # MA0GCSqGSIb3DQEBCwUABIICAI5NZcY7bXQdT2WpDLpvax5d3rHdMjPQXz6ECTvv # hxrBC1dQrk4KWdmrfQMmowzqc0gsFGGH7bk0woeYvBMqYF9F5lFMVuTh7bQd7rcf # QSPGoE7Q4pK5eovAyq40MpVv4Rx/CYV1MgmbEJ5JlRo75j89qUpN1xtrzbYge9et # Gs2ZByIfiwTsU/lKJ0IdKOAoC4XVQBhmk3GE+gCeSbKG8WcXlQc4ASolhOoDXvzJ # oKu9QVK+8EQh7pCBsIuYkG68qorByhCVDdfz864blJ51wjkDomsdh6dyUnYnkVsg # +Xan78dARG9TARX0qySCJlbQM2Ef8Z+d2EkIg0HeUQrutP8Tr1naN72HR3l0j5KY # gPYp5TSy5R8OTBYqyfSNZ51F+hSyWjbObUgYpXpnAzdRdPLbAFX1TM7gxGYKBNUd # J1zA7kzRbm4aGLHcYgeLh+p7PBC0BtGuEiUAxJtJ4eG7G8neF/bPNSPixaJJ8KHn # CZJ10//O/eFVRuv159rZwqvSkVf3KxCDvGaCj02RNLWH3OFsg0bbFA0dpp+ud6kq # vdlYMaJNC2hkZWwTsBDSUIScDHmrYJvvsFfU+09HkJg/dcWwnDT1MlSraMDsUNnL # yZaqgf0Eviu24HywmS004y/EQ1As3Drdr0AQ0NLUWBUqjCZzqi+oT+j2TXOvG43O # gw6z # SIG # End signature block
combined_dataset/train/non-malicious/sample_56_51.ps1
sample_56_51.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [string] $FabricRuntimePackageOutputDirectory, [Parameter(Mandatory=$false)] [switch] $AcceptEULA, [Parameter(Mandatory=$false)] [switch] $Force ) $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" if(!(Test-Path $FabricRuntimePackageOutputDirectory)) { if(!$Force.IsPresent) { Write-Warning "Output directory specified $FabricRuntimePackageOutputDirectory does not exist. Consider using -Force to automatically create this path." exit 1 } else { New-Item -Path $FabricRuntimePackageOutputDirectory -ItemType Directory -Force -ErrorAction Stop | Out-Null } } $FabricRuntimePackageOutputDirectoryAbsolutePath = Resolve-Path $FabricRuntimePackageOutputDirectory if(!(Test-Path $FabricRuntimePackageOutputDirectoryAbsolutePath)) { Write-Error "Output directory $FabricRuntimePackageOutputDirectoryAbsolutePath does not exist." exit 1 } # Invoke in separate AppDomain $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $FabricRuntimePackageOutputDirectoryAbsolutePath) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $FabricRuntimePackageOutputDirectoryAbsolutePath ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath #Download Runtime Package Try { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion -Latest $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $RuntimePackageDetails.GoalRuntimeVersion + ".cab" $MicrosoftServiceFabricCabFilePath = Join-Path $FabricRuntimePackageOutputDirectoryAbsolutePath -ChildPath $RuntimeCabFilename if(!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $Version = $RuntimePackageDetails.GoalRuntimeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } Resolve-Path $MicrosoftServiceFabricCabFilePath -ErrorAction Stop | Out-Null } Catch { Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet use DownloadServiceFabricRuntimePackage.ps1 script to download the latest package. Then run CreateServiceFabricCluster.ps1 -ClusterConfigurationFilePath <ClusterConfigFilePath> -FabricRuntimePackagePath <RuntimePackagePath> to create the cluster. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBipOvW7FuiislB # egY7XRsjdXBJzU5+FWLPcYPJlaUbgaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIONy1io4+U73Pz2uFeZLr5F3 # prq9+maQpqwiwI3b3qCvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArML4j1JuUNzuaIaOQ32Mm+S4vZWGcmQDLD6ndtrWI5t6jjw9Wurg/9a3 # PXvrgEh+HEIpmsTzI+UUdGEJX/FhmQs7IXO0a+gc6Ig+cpmS7e1W1DwsO6qy2HZq # 1XdE0NPpxmsQFKiD0w+erBjZj0sPMcOsmtrTf/UvzhKUGdLab5XtUCUB5F8MW7Iq # SQllDcn1xhdNmLfs5JY0xJnFiE8FfhpY1zgBX5nvlL7lJ1t+ph5sAsYQ7GAW6gXD # /huJGmZi/d8aYfxpIY7h7V4PweY290urttMoKJO4me3t0+SK/tKDI3hACXHPhwk0 # NQ4bmrbUdI0/y9ohS+SpZBaNbBiuw6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAqJh/77BqbLYuVZEFAceVZBBHQr5W4KDUkY9Yf+qPWqwIGZZ/pwdEx # GBMyMDI0MDEyOTEyNTUzNy45NzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QABAAAB0DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG0UxPi25HkSyBgzk3zpYO # 311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU9KaQ4WNHqHrhWftpgo3M # kJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo5nZiasMigGKawGb2HqD7 # /kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwgttaYEk5XlULaBH5OnXz2 # eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0xp4B1cAHVDwlGwZuv9Rfc # 3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7IsbyvRrax//83gYqo8c5Z # /1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDdNl2Leej+qIbdBr/SUvKE # C+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TAY/v+v6pNhAeohPMCFJc+ # ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUdseT0nfk8Y0fPjtdw2Wne # jl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFXUGPDEQt9tzgbR9g8HLtU # fEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyEGepoZDkKhSMR5eCB6Kcv # /QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+lOtITfjJtyl0knRRMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06SNW+qxtS9gHQp4x7G+gdi # kngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNBUbaNEmaKAGMZ5YcS7IZU # KPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZVpzv7k8CYnBYoxdhI1uGh # qH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0GUX3b+iZg+As0xTN6T0Qa # 8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQHBfXK/fLAbHFGS1XNOtr6 # 2/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoHRuMaiXsrGmGsuYnLn3Aw # TguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkNDTs9rTjVNjjIUgoZ6XPM # xlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gLHtBxXCWJ5bMW7WwUC2Ll # tburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQjyYQH6H/h9Xc8smm2n6Vj # ySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvXvMVQUIEkB7GUEeN6heY8 # gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8vzhJSZFNkH8svRztO/i3T # vKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQC8 # t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6WF5wDAiGA8yMDI0MDEyOTAxMTEy # OFoYDzIwMjQwMTMwMDExMTI4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpYXnA # AgEAMAcCAQACAhyiMAcCAQACAhNnMAoCBQDpYstAAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABx5Dlu15EuJ3NxjFkfERniuKQe3nvNDFNV3w1RnzHaBzYZs # jadVfsOxeyYOeBWNSK5cFhT9oA6rQxYoiiiZOkJNQfoLP4VTvnP1s1pC/g5DUerj # eAjKg0pjxjsvDqpFFu8Nn8GaPtTqUbALsgZpUzm6yzCYU/jMJifCAX56+SmxuGX/ # GmFlDeI6dH5lkaclLSP7rEbMYQXuVRHAdW5tl9NDmZXPSks6rV1OUYkOXViO9WBE # nPE8+OC+Mi9PctBt7Tj2Qz2o9HAUpMJYYU0oAuuRQKixC42u1gP1mFELwEPoqgGp # Cjug8WXmA5YYbLh9rDVAfRlclTp2uhPopFdWuhQxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdB3CKrvoxfG3QABAAAB0DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAKzlY51OwZ/Tid8d1LS/FGpmNlCEGYhc9b0tU4QUipXzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiVQAZftNP/Md1E2Yw+fBXa9w6f # jmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgEBoJNnbFIhHZE/FeMBXgv2XNKDc5 # p8cAtVCl8kxn+/EwDQYJKoZIhvcNAQELBQAEggIAmLR54eFke2qBRaoJl5krdIOM # fyI847HPXvqWZrEX76Gh0RRUV/jOyy3DzkcOeS4H+onBWRPer+MMZgZeeYs39p6Y # BBkIksyAvXrxEQAw7SY+1Tf5jXdeD7TI/ABOFJM8FQlc5PLAfBPncLtiT+u3A7h3 # 4hLSdhfuQwVHfhAMvgK5dUDlJIUQnVOaWrFmD1iDyToEINwccKRrzvcO8nieBJUD # Noh/B+iKAb3+3jGrer2ScXZaDKDuL3V641PkY8GIVxqDC6rNkF+90Z7UB/Z4LFZD # XcvvPJdf3C9fJrpKx2tblYVfUa6HLl0Y0T/7v93Z02uB/0GUQOTEkgeThp657Bei # MozZM/MKy+Lz1jiHCZXb1sjFRjFsQTRGRGW7GUvRrBW2G3LWhu76D/ErXK01wnDZ # nBQrxVItC47Xc6l2hvccBQaZ7dwTqoIKbrZJDltfWf/zgKOgkXx4B3a5/HIbZ37f # K/Ob3qbEzOlhfmm6F32H/9w3TthgYI445hNIwXXu92E0iFmMI/TVKavIEoRFQN9/ # 8BWCXTu3mG+1OLZfRV6w+TtWyz26ma38crE6XyM2f+8Aw0qwEFwtokh+5IyHueGY # +krQQsXSJRoYwPAQHiDSIUzi+Slrv1xLSsFUrNvWQE7IWIx/bPDnNNkNcSN1QaiI # Jqhm/2sgfM1K85m/hJQ= # SIG # End signature block
combined_dataset/train/non-malicious/565.ps1
565.ps1
function Add-SPODocumentLibrary { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$listTitle ) Add-SPOList -listTitle $listTitle -templateType "DocumentLibrary" }
combined_dataset/train/non-malicious/sample_40_9.ps1
sample_40_9.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.LoadTesting.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.LoadTesting.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANCg7h43aTTT5H # wgJoeM9HZfazx0DFJSjHKYkgJioXJqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFYjGpHsyxGptbHgv7BUdv5v # KxIeiGSjy49R+rTgelArMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAu5FhXO1C/BUX5eJKToFli2ISoFly0spBN4UQN8pDApCUf2MTTZje4/JY # dH5mQJpeu0owbrrj6VI+xjs8CJT0+CojHSWKeQcnSOkevaTxgSNgJkWuTZAXrzZE # x7rM6/6y5AaQ9o5bKwbli1cn+W2nIw9T/IZrxD+Z4POnAmhW4VL2IKBYTT+aHF20 # wGLey0ZJcvJ0KSz8e8Boew/y4XEeeXE26r2bSlXnkx6x2OadTH9af/3FnmExgszq # OHHdrZzDBEehGZ1y2esxN6XIlVWJqEflNxqlLgOhfOGCewHmmo7LYrT8QJk7ynAn # RD0qeGeSZ/vxT90WdoIiXm1jtyIT0qGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD8T7VXO+0wZsP/qlIBn4OnVoKlCN6aoNqbexBcwVO4tAIGZiAgthPi # GBMyMDI0MDQyMzEzMTUxNi40NjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgTUrZFvZtQCczcvODtzFNhSHHY9DKTU0W8CdOjdBO/owwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICAFONDkqu7X8K5Gwa1bOGYGxYbz29KqJ6m9dN # HI9hlweshPwmFVMf0TmNdCL+gUOhHZwV2CZP6WsZxs5vl+KYCPb8mfEMFOIDmJqZ # 6moX6XAAK/3kvkhRD7OrGic43LDnIw9C42eab7PzUaguaHGE1VjXyDK8OV6vyROt # 60zfkVHy4i/kNuA4wE1IDkfdIi2ipHcMfstB1I38lZSJGdSmEMDyGJxQ3BKGhl+a # Hxoy1MSFk+KOjkb/RgLEOdXDKviuPqrNcvN6A6Fim4m9fN7ypIXqhW36WqDtSfnA # 5aqgLPcEYDctocJYOm/v56Bm5Boeznwv8d9F7AyzmRhZpSJkuCYKVPmtHujU7pef # v66WvNKpgAyHlMs1aclrPRpYezZ3WnXYfV+aARMXQhDvXQVFXWHNJK12nAk5TeQe # WD1gTLwWwt3m3V6CPzNV5e9PNUPQ3ojzlQ/lVc97wy4QEFJ0S3FXkQG46AZMmQgp # QK9M7pgW1g5fp4vQqH8pOdJ/p1xt/pMAFdIamdjrWI0bcHJFyCrHYQtpcPM8wD9j # AzcmN9IacCGFmWPJs/FQL+D/R9iw6qcldpLxQOpiqYYudebEwJ9wh9zUxkLXUOba # jOIjh0VNcbHgn6SlW7dbSzYjoVvH/L36jYmznx1S1blT3cKRPwdoRoY0/YvdOezf # Ik/D5MEm # SIG # End signature block
combined_dataset/train/non-malicious/sample_5_1.ps1
sample_5_1.ps1
// Copyright (c) 2016 Dell Inc. or its subsidiaries. All Rights Reserved. // ================================================================== // DCIM_OpaqueManagementData // ================================================================== [dynamic, provider("dcismprovider"), Description( "DCIM_OpaqueManagementData is a derivation of " "CIM_OpaqueManagementData and represents a partition " "on a storage device like the VFlash." ) ] class DCIM_OpaqueManagementData : CIM_OpaqueManagementData { [ Description ("The user-friendly name for this instance."), Override ("ElementName"), Required ] string ElementName; [ Description ("A unique identifier for the partition."), Mappingstrings { "SPC.INCITS-T10| VPD 83, Association 0 | Identifier" }, Modelcorrespondence { "CIM_StorageExtent.NameFormat","CIM_StorageExtent.NameNamespace" }, Override ("Name"), Required ] string Name; [ Description ("The property shall have value of: \"Raw\", \"Ext2\", \"Ext3\", \"FAT16\", or \"FAT32\"."), Override ("DataFormat"), Required ] string DataFormat; [ Description ("The Name of the scoping System."), Key, Maxlen (256), Override ("SystemName"), Propagated ("CIM_System.Name") ] string SystemName; [ Description ("An address or other identifying information to uniquely name the LogicalDevice."), Key, Maxlen (64), Override ("DeviceID") ] string DeviceID; [ Description ("CreationClassName indicates the name of the class or the subclass that is used in the creation of an instance. When used with the other key properties of this class, this property allows all instances of this class and its subclasses to be uniquely identified."), Key, Maxlen (256), Override ("CreationClassName") ] string CreationClassName; [ Description ("The CreationClassName of the scoping System."), Key, Maxlen (256), Override ("SystemCreationClassName"), Propagated ("CIM_System.CreationClassName") ] string SystemCreationClassName; [ Description ("This property represents the index of the partition."), Required ] uint16 PartitionIndex; [ Description ("This property represents the type of the partition which is specified at creation time. The property shall have value of: \"Floppy\", \"HDD\" or \"CD-DVD\"."), Required ] string PartitionType; [ Description ("This property represents if the partition is attached to OS."), Required ] string AttachedState; [ Description ("Access describes whether the media is readable. The property shall have value of: \"Read Only\" or \"Read- Write\"."), Required ] string AccessType; [ Description ("The property value shall be in MB."), Required ] uint32 Size; }; /* SIG # Begin signature block */ /* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOGLR4QgMBdovM */ /* GDUNRhJ53b64UfG2zaEOHM58C7sYeaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAkPBEsmyjc */ /* Ew/E6pSJYPtinTr56pzN2X59TIeirntqKDBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYANnJ/lyr0etlRFKDHkikMgqF27k05P1HYefSDAJSvxWH8w */ /* 6DEUFI70ru7EJM3nakYeHKUIfsOuXSaAG0IGcjY+SJc7alMAHgi8tJtj7d2OByZo */ /* fpg42RyKDReY+25qym65nD1c5HqcTXM02Fox5iGgKdOs9chbm8RFexXBjq40nP9o */ /* OPJDuWwTKwZMvx5am/0uuhUJuejrJLoAOs7FcFqcPMwDmHd2HlCbRJgeQn2C60Ta */ /* Skog8BUB4XvQ0AYa2mv97BE0vdeHCM4TEljz9vybYVkiAsy8S9cWgSiADYZsbJE3 */ /* wdxWwV7zGraALLbalxRuVxPTnPAoEIh7JIur64lubfkxzLDKoQ56OLrrh6GFn3cc */ /* dZ3ufc2MV2FD71UrYICpj0SGU/fqot2lhHQ3BW1JOt6JD/hKbmcVYHjNNg/Xo6HU */ /* 2PS+wPkgEeYqmpPmmwn5qmEhL3HQrvkCZ+qpgR4ZZ9OVHdtabsjoBWO6Q5HSSTI/ */ /* go4UZoRNJXnvOqz+qc+hghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */ /* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */ /* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgn/7B+x5lQbKE */ /* EpSqWKay/yn3hXrG5ERhmKFBlu1xmcoCEQDxyh88XLX7LfnY0r/WQJXyGA8yMDI0 */ /* MDkyMDA3MDEyMFqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */ /* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */ /* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */ /* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */ /* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */ /* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */ /* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */ /* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */ /* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */ /* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */ /* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */ /* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */ /* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */ /* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */ /* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */ /* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */ /* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */ /* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */ /* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */ /* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */ /* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */ /* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */ /* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */ /* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */ /* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */ /* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */ /* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */ /* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */ /* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */ /* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */ /* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */ /* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */ /* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */ /* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */ /* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */ /* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */ /* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */ /* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */ /* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */ /* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */ /* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */ /* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */ /* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */ /* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */ /* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */ /* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */ /* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */ /* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */ /* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */ /* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */ /* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */ /* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */ /* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */ /* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */ /* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */ /* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */ /* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */ /* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */ /* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */ /* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */ /* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */ /* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */ /* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */ /* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */ /* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */ /* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */ /* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */ /* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */ /* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */ /* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */ /* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */ /* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */ /* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */ /* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */ /* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */ /* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */ /* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */ /* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */ /* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */ /* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */ /* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */ /* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */ /* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */ /* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */ /* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */ /* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */ /* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */ /* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */ /* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */ /* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */ /* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */ /* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */ /* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */ /* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */ /* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */ /* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */ /* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */ /* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */ /* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */ /* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */ /* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */ /* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */ /* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */ /* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */ /* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */ /* MDA3MDEyMFowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */ /* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIPTqTLutSlSguZwM/Ezv0NMwtavElCbC7aws */ /* +7zWeuF+MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */ /* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAEZL8++NjpyL1yC9cDMK */ /* LT9/ou5Y5NarBxkAWgcoaNeY3hEyasJhratEtz/VGpdQpbh//D/iwLN5hhlhr0bM */ /* cz3KUhGP8hCTe65/oYcay9zddI07W8Ie+u/o3N40xXdtvjWrPB+e4oLntTJytQL4 */ /* 0oU3GJ7hDyugQI4YxLdMjYRKx8GeNY417GM3m7O+wi010nNrHLAJBy48+CzBtWEb */ /* qebV5F0PbW+tS/fk8L+SJk4FrW5+ASJOYbJDBRMp1opg1Y4qrz1G+i8culZ8Wbws */ /* HeEN/TH+vrFCxO9FBpkQBZnV37NtzF73SKV1Dbph4YkkFlNCElNjgASYic5xUSSJ */ /* ENHXy/mLAxAUoBO31gfM2nS1l416LAC/QquMW7Jw2qe8aXxBYZEwoXII7lqh5Kau */ /* +ozflcBHg0SYZKYHgJgVJ1NPhbEFHOMnzspElm9fPgJLV+P0noCITzEhBtiHO/u+ */ /* 7PqWGvBugd6ghj7WUno3FGllEL6W5xsWzEguxZaF3nyENeaOFP49HzoRK/hK0Rz7 */ /* 7/WBdJ/5A5mjRusxfhX9Ky1bFelhFJIKcKFXJR6SIDaDOzsivug8dazaKBYJQ7SB */ /* 6M1GW+HIRsjymEeZ0pSI7sNKwaIOhd1xxHiEcL2/t7zVf4y2oVvpU4tnE7Q+TZfq */ /* 0zJP7gi9bcblRqgkgiBhvWaX */ /* SIG # End signature block */
combined_dataset/train/non-malicious/sample_7_91.ps1
sample_7_91.ps1
ConvertFrom-StringData @' id_sccm_activity_iisvdirinfo=Gathering IIS Virtual Directories Information id_sccm_iisvdirinfo_vdir=Obtaining a list of IIS Virtual Directories '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDVwC98SNMiNFDa # sEodHygGetd4S1Fvtk4/Ey3qSuHkf6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEwgA4VEsMvjtdNzgDLu9oFS # SjJBpd2AGgNXicjQspbnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAYozPCYaBa+VscFzV7MKu+JCkqP4KZ8wgM8L0hmOyye6U63XnYq6AqUQC # fviAMoDk0BVFZwfGcTA20dVEAlP3uaBNE/pxY7gTZ0JxIh7kKiVOxvAx2la8YeDS # JNbOtck0aliFE+Fo+3Rj7VlQ+GATumnyI/7L6anKzGWEqbHtAUmVIp1j5AfpoTmB # T9L6pPVLo6hIegR2j3p2tQyktMF3ZCwPlXZOBlaRyh2fVIm85JDriM1OyOERAAU+ # zDkJ31pY6vBvuNZOzW5EtKwEkqvFzwsj1obRA2BTvoqcZIOr9aT/vsaI0GHrIsTu # oXiCp2hGY2FuU974Q9IhYcPcqBUwLaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA26qywB7Xp4toVR7ie7rNU9oGRVkqxjHtk2GS+j4B0KgIGZxqBxlf2 # GBMyMDI0MTAyODExNDA0MC43NjhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAu+NQU7t0X2FrU9h2QXMhcTYejtn+WZJciEyynMS8pnDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAdbm7BQMwjKXDXcyCynAYMmys # s38VJsHIRB+0x6DpFPYql80ULOqj8HhpojC2Kt2NLU7ia8xiOfFByDvG/NAxn3sn # TKbvUzrh4ZU2qMYAOiI0oae4K80c5b/o167MJ7XtvBs8oXGm2olXTfNY60XNtKjW # xURfoRwdnyzRpRhEAm3N4mwtk2L151lUL/xbuJF050GQVru+chFv40+1Aw3tudsL # f26H/iFa2siLvEgP9UhZxJH9Cw3gFr7FyrefDohQOfAGIhnq35n3vwZtJMYuhBGp # 3i3GXNRkrOiEPOpHkbCz6shbLrTW57oT9m2PPXj6SYbbwIhpAGI5d5sSrvbGcERc # Qy3mOp1bUOWxxVK0ZMMu/1AdtSv3NCOAsPmc15r15k1PXLfDuDpJR6zEhQoeJZHL # UQLvUwpYvd4/A5XX0gOTrtNM5oH2qrISW9IT/oIfb0LaRqQKm3hTLORpRD6dMbxP # XRNAKkL5jsldltN1PXSXy2zBPxOKuIKSE9GkEm2QJo1ZIhcuhnxxEpsor9MW1o03 # R2U4mFcB6RPgScqcQ7gYrzPWAY/QPX+eJ3N0pWAjPXK4U/OYTA+o3in3vrKgttmp # HEgeOUN5Fafh8i8toN/bWpaopT6ThzooCtaqCeQ95iu92MFU0S1tpM4+NRy05ow0 # 7XJr7xgrkh+vVNOWWs8= # SIG # End signature block
combined_dataset/train/non-malicious/1148.ps1
1148.ps1
$cert = $null $ipAddress = '1.2.3.4' $ipV6Address = '::1234' $port = '8483' $ipPort = '{0}:{1}' -f $ipAddress,$port $ipv6Port = '[{0}]:{1}' -f $ipV6Address,$port $appID = '454f19a6-3ea8-434c-874f-3a860778e4af' $ipV6AppID = 'b01fa31e-d255-48df-983e-c5c6dd0ccd03' function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { $cert = Install-Certificate (Join-Path $TestDir CarbonTestCertificate.cer -Resolve) -StoreLocation LocalMachine -StoreName My netsh http add sslcert ipport=$ipPort "certhash=$($cert.Thumbprint)" "appid={$appID}" netsh http add sslcert ipport=$ipV6Port "certhash=$($cert.Thumbprint)" "appid={$ipV6AppID}" } function Stop-Test { netsh http delete sslcert ipport=$ipPort netsh http delete sslcerrt ipport=$ipV6Port Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My } function Test-ShouldRemoveNonExistentBinding { $bindings = @( Get-SslCertificateBinding ) Remove-SslCertificateBinding -IPAddress '1.2.3.4' -Port '8332' $newBindings = @( Get-SslCertificateBinding ) Assert-Equal $bindings.Length $newBindings.Length } function Test-ShouldNotRemoveCertificateWhatIf { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port -WhatIf Assert-True (Test-SslCertificateBinding -IPAddress $ipAddress -Port $port) } function Test-ShouldRemoveBinding { Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port Assert-False (Test-SslCertificateBinding -IPAddress $ipAddress -Port $port) } function Test-ShouldRemoveIPv6Binding { Remove-SslCertificateBinding -IPAddress $ipV6Address -Port $port Assert-False (Test-SslCertificateBinding -IPAddress $ipV6Address -Port $port) }
combined_dataset/train/non-malicious/sample_61_83.ps1
sample_61_83.ps1
# # Module manifest for module 'OCI.PSModules.Psql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Psql.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Psql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList', 'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList', 'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem', 'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration', 'Get-OCIPsqlDefaultConfigurationsList', 'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList', 'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList', 'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList', 'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem', 'Move-OCIPsqlBackupCompartment', 'Move-OCIPsqlConfigurationCompartment', 'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup', 'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem', 'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration', 'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword', 'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem', 'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration', 'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1719.ps1
1719.ps1
Function Get-ServiceNowAttachment { [System.Diagnostics.CodeAnalysis.SuppressMessage('PSAvoidUsingConvertToSecureStringWithPlainText','')] [System.Diagnostics.CodeAnalysis.SuppressMessage('PSAvoidGlobalVars','')] [CmdletBinding(DefaultParameterSetName,SupportsShouldProcess=$true)] Param( [Parameter( Mandatory=$true, ValueFromPipelineByPropertyName = $true )] [Alias('sys_id')] [string]$SysID, [Parameter( Mandatory=$true, ValueFromPipelineByPropertyName = $true )] [Alias('file_name')] [string]$FileName, [parameter(Mandatory=$false)] [ValidateScript({ Test-Path $_ })] [string]$Destination = $PWD.Path, [parameter(Mandatory=$false)] [switch]$AllowOverwrite, [parameter(Mandatory=$false)] [switch]$AppendNameWithSysID, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$true)] [ValidateNotNullOrEmpty()] [Alias('ServiceNowCredential')] [PSCredential]$Credential, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$true)] [ValidateScript({Test-ServiceNowURL -Url $_})] [ValidateNotNullOrEmpty()] [Alias('Url')] [string]$ServiceNowURL, [Parameter(ParameterSetName='UseConnectionObject', Mandatory=$true)] [ValidateNotNullOrEmpty()] [Hashtable]$Connection ) begin {} process { Try { Switch ($PSCmdlet.ParameterSetName) { 'SpecifyConnectionFields' { $ApiUrl = 'https://' + $ServiceNowURL + '/api/now/v1/attachment' break } 'UseConnectionObject' { $SecurePassword = ConvertTo-SecureString $Connection.Password -AsPlainText -Force $Credential = New-Object System.Management.Automation.PSCredential ($Connection.Username, $SecurePassword) $ApiUrl = 'https://' + $Connection.ServiceNowUri + '/api/now/v1/attachment' break } Default { If ((Test-ServiceNowAuthIsSet)) { $Credential = $Global:ServiceNowCredentials $ApiUrl = $Global:ServiceNowRESTURL + '/attachment' } Else { Throw "Exception: You must do one of the following to authenticate: `n 1. Call the Set-ServiceNowAuth cmdlet `n 2. Pass in an Azure Automation connection object `n 3. Pass in an endpoint and credential" } } } $Uri = $ApiUrl + '/' + $SysID + '/file' If ($True -eq $PSBoundParameters.ContainsKey('AppendNameWithSysID')) { $FileName = "{0}_{1}{2}" -f [io.path]::GetFileNameWithoutExtension($FileName), $SysID,[io.path]::GetExtension($FileName) } $OutFile = $Null $OutFile = Join-Path $Destination $FileName If ((Test-Path $OutFile) -and -not $PSBoundParameters.ContainsKey('AllowOverwrite')) { $ThrowMessage = "The file [{0}] already exists. Please choose a different name, use the -AppendNameWithSysID switch parameter, or use the -AllowOverwrite switch parameter to overwrite the file." -f $OutFile Throw $ThrowMessage } $invokeRestMethodSplat = @{ Uri = $Uri Credential = $Credential OutFile = $OutFile } If ($PSCmdlet.ShouldProcess($Uri,$MyInvocation.MyCommand)) { Invoke-RestMethod @invokeRestMethodSplat } } Catch { Write-Error $PSItem } } end {} }
combined_dataset/train/non-malicious/sample_67_11.ps1
sample_67_11.ps1
# # Module manifest for module 'Az.StorageSync' # # Generated by: Microsoft Corporation # # Generated on: 7/31/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.StorageSync.psm1' # Version number of this module. ModuleVersion = '2.3.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'c542dcae-4317-44f7-9f2b-2ee66d151ff0' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Storage Sync cmdlets in Windows PowerShell and PowerShell Core. Manages operations pertaining to Azure File Sync in PowerShell.' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Microsoft.Azure.PowerShell.StorageSync.Management.Sdk.dll', 'System.CodeDom.dll', 'System.Management.dll', 'Microsoft.Azure.Management.Authorization.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'StorageSync.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-AzStorageSyncCloudEndpoint', 'Get-AzStorageSyncGroup', 'Get-AzStorageSyncServer', 'Get-AzStorageSyncServerEndpoint', 'Get-AzStorageSyncService', 'Invoke-AzStorageSyncChangeDetection', 'Invoke-AzStorageSyncCompatibilityCheck', 'New-AzStorageSyncCloudEndpoint', 'New-AzStorageSyncGroup', 'New-AzStorageSyncServerEndpoint', 'New-AzStorageSyncService', 'Register-AzStorageSyncServer', 'Remove-AzStorageSyncCloudEndpoint', 'Remove-AzStorageSyncGroup', 'Remove-AzStorageSyncServerEndpoint', 'Remove-AzStorageSyncServerEndpointPermission', 'Remove-AzStorageSyncService', 'Reset-AzStorageSyncServerCertificate', 'Set-AzStorageSyncCloudEndpointPermission', 'Set-AzStorageSyncServer', 'Set-AzStorageSyncServerEndpoint', 'Set-AzStorageSyncServerEndpointPermission', 'Set-AzStorageSyncService', 'Set-AzStorageSyncServiceIdentity', 'Unregister-AzStorageSyncServer' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module ModuleList = @(@{ModuleName = 'Az.Accounts'; ModuleVersion = '3.0.3'; }) # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','Storage','StorageSync' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Fixed the Register-AzStorageSyncServer with Azure FileSync Agent v17 * Improved performance for Managed Identity migration cmdlet' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInwwYJKoZIhvcNAQcCoIIntDCCJ7ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDnvB4kuEtlYkE5 # nVl+8MqobiuyI0aL9RzmYKfPoYKbTaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaMwghmfAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIPj394FSZWe5qkkFAy6J5pb # 0pCmOzxrz4nI0EqreHIEMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOaFZrDr7JqA9T1FJ449J1ISXieyvUUP9BJzfOcqoWCPfHQuzlbjgOyUN # v9mdezWJMt/ESvIzOuayQVzJmwSaRqlOTHkUJUq9OEItqLyAR7l3KZ08hEbieCs/ # fwCI4wf74UiYCVCiRMuho7YLTlqtAF9/t8FPA+ZMlEF6E8wi/QwCBXHVQjohsDVZ # 74Yy2VzyqrszRUrBP3mzGlGWh2uXk5tFf8ylCfZBFZx0p249s+4DwLV4sJV+XT6I # BiQi5ce5Zkky52gOqe31HbMe+C3OndtPzP2gYC1Kxq3gC2Kw/AxictyyJBW40VGG # H+MUGIILmhepuzWE5NEKrbrl35TjbKGCFy0wghcpBgorBgEEAYI3AwMBMYIXGTCC # FxUGCSqGSIb3DQEHAqCCFwYwghcCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCUbBCi9CgGEaovzxcswU3JE7qEPXnYe5uOBSsTS8r/UQIGZpe+fitQ # GBMyMDI0MDczMTA3MTQxNy4yMzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRfDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtgwggJBAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpUB40wIhgPMjAyNDA3MzEwODQ1MDFaGA8yMDI0MDgwMTA4NDUwMVoweDA+Bgor # BgEEAYRZCgQBMTAwLjAKAgUA6lQHjQIBADALAgEAAgMA/x4CAf8wBwIBAAICE6Iw # CgIFAOpVWQ0CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC # AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQA7WwOU6+K0jG3+ # 8JyBZJCusVWG9GqMUmWio094c02znIUntHNKDAkq+rEm7uJM8BcG0UtGqUcpnhpi # c9pk1ijNofhHAEJQFf3d6ZlyMDP+9Vkkki/V5sXDOIBFWoz2h9tfkPlcKiudfakw # +0oQ4yU2GZygVCJoNKBFtzebMUs7HzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIPU15Qx/9SvXpKAfJwmynLh0qeSelCkFhG1q5XMVKSBfMIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQgM9Qjq+Ww/mT3RIEI1r3CFrgyXEG3YKvDXY9M # cjLmJiowgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AePfvZuaHGiDIgABAAAB4zAiBCDna+qe9xf6Q9UIlMBI5FSJbx6pzEuLdMfAJPNS # BHOBbjANBgkqhkiG9w0BAQsFAASCAgCFdk6HXENW3GsZATTL2BU6b8AW0lGnFvDZ # MWRxpzpH5Fh02MVEhPdF2sCvSW9cjhfWh+Jrs1NyTL12dhG3u3G8jCY6WOrZkR2Q # /IUQg6TegPDtmLIPGcVXg8nO/AA6ontfnFQv0c1+MZEz9+F/DpsHV1LSWmCiRi3T # 9+Dj/bJFVnPZmnIVCiZKosss2MvfYGiq3AwazVw4n4HoK4kRJLnBoXmTcU91a2Ka # wS4xDp/2dZu4q0HoVkNUm+KkOAwcDd666DhPQRYkpvxdUaXdbh6bEkpN03+Q0bh1 # iEUYSGnElmikB1iOFrp43whGRzy3rCM3G2IYcBHP1Lk+gQLtJ8Fa1eLtxXtvG86O # ITBI1k+Fcw3P0uQNL9/0oIWw07yXRsGnXr7IQebWmFao++TroFmnKYGZxdyfF9Lg # kgD1ClxgOoU9QV10Ybp7JjWY8IAaobAZ5KqNEjCWdVHUwUMqXtyWK3FTANZlLOYC # nZaEYp+9eMKeI4oNtgN9fPKnOXpK4If3amgwhUp1pVqDjHOB26sJnHRaOnYYvSc/ # XtOKvtL5dGznXhn/BvdNvTaQ9eFpRhOiwGWEZqZT+KeY8UUmnSPF36CeXyU2NSs5 # gh4EJ5Dn3vd8TuxFEChRdoxHqp9/Hg03UGKA8pwKrXHQVi1/3r55VwMUgJg2GHt5 # 3SunYWyRyQ== # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_14.ps1
sample_53_14.ps1
ConvertFrom-StringData @' EnvironmentErrorAlreadyExists=Ya existe una variable de entorno con este nombre y tipo. EnvironmentErrorDoesNotExists=No existe una variable de entorno con este nombre y tipo. '@ # SIG # Begin signature block # MIIoLgYJKoZIhvcNAQcCoIIoHzCCKBsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0juNyYN8zPupe # unJCdUvxv/ypcMdmpLZi3tJQhuyJ8KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg4wghoKAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF3K22NpeNGlK1HrA3qK0w0r # 00cQ8Pn1hsGJM3JZv6QfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHx3Zx9BYb8GKPXmawiH5vhs7OtXmjqm/m4RqUk5eAwDdPErYmrPaH+U1 # WbOFNLkGy0zWc0BPqwykclOuVyPbfr6N7ukjTFFPxAoqEiQi8qHKt8HojqdNkUUJ # Z4/9nQuAiQv4DNTe0uwkxPue9WCZ+4376Y8nlOylec17n+I51WaT0Mnczp4XNaLS # st7keUi2Jyx7Su5dozejFbWnP2RbbucSXgcFXhupyeYT7tLLquAwJk7qZub3nuPG # y+9l17JhHKle6nB5F+e9/p2I2NQMUVmhKoQXlPRCh8hxQUP4U87p7gi4KhmQXDfO # LtHNl47cR+QOrI6suGNgnUo9zFuAJqGCF5gwgheUBgorBgEEAYI3AwMBMYIXhDCC # F4AGCSqGSIb3DQEHAqCCF3EwghdtAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAn7J+ohCZZlJ6AV5WqFDkLxFhGhUoZ4viFlw14j2Vm1QIGZhfc8ejG # GBMyMDI0MDQxNzE3MDQzOC41NTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHuMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNR # MIICOQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cpDwjAiGA8yMDI0MDQxNzEyNDkw # NloYDzIwMjQwNDE4MTI0OTA2WjB4MD4GCisGAQQBhFkKBAExMDAuMAoCBQDpykPC # AgEAMAsCAQACAwDLMQIB/zAHAgEAAgISPzAKAgUA6cuVQgIBADA2BgorBgEEAYRZ # CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G # CSqGSIb3DQEBCwUAA4IBAQBhQW5ouvl/DsRpuseRAr7P6RVUNAMCDEjENjgdfrgz # 3I6kJOxt3G+N7YrZl4tht5zA/pDHwnYDULlpjupPjvvjoTygWWsYf7nk9CuORB9J # HTdpGx8Wn/RxLAENB1NgFe+s152v9yKDCsjCD1ftlN0/28CjVpWR3K2J1D6eBSjD # lSIkYkBbu6UmB3wPE/gWs9v52HP/FXuhRh/gz4V6WJxlqY3+1B3JOl1cU3QixX7i # cZ7j2xFc2VO/2nVJcPc6mLkXqiK0f7Y9vipV+jVU7ANblvhNtiojsi9JX0Y/GMRl # J+yVEH4qs+PZiRp13b4zQLeXcm0+S/kBd8edOgMlNrpTMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAA # AeswDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgtwG+4mq8OX31UpFirHveWjxhcSSrGB+hyjNYOEzG # qlwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDOt2u+X2kD4X/EgQ07ZNg0 # lICG3Ys17M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHrMCIEIBg6rSotCNS66SasI5YmDOjN # PeuHtGlXXlnXamZcvlteMA0GCSqGSIb3DQEBCwUABIICAJ6ag/yOZGQLNGSz7vBk # h2WorsbsnrvbziC/9smsTLUd+9lQcxCwirvFnit2lgyYhDm9isMGDgdIccDzmHLP # 9ZOB0b2kswREG/QX2avQitMk93+UHDVHvGvFmdIkzC4zM9E+1G033yOD3AXglxi5 # Qj8uPW4Ea1UIicoLbe1+faJ9lOwMlj9DEhhfBaqAnGw6vO/54V46t5e7fC4zPms+ # 4l2GITH1XcwplreYxAsc+4cRs/bYyvQ2StD4L03rC2mD6gTBcHTn3HsbuP3imkXT # 7uKc8muGN/ZIWt9wVepU+W2jYvjVZczUPQVmuT+vatNcxJnBIFc2Z6M9PzKlycP3 # j1RUKaC7FsxPtevt37oAFgLu/jDvLcTzutgOLSppHrmxfjC6Bagnw7/CoG0uAZtd # 7rgLmp4Zl740UM+l0AK6QYSxEnJlF0xR8L1f5x0JkuEz6e9k5GadQB7a2HFZO25q # nHrIL2GTn9mD1PjYVKuXmhcBuRu+ym7/0H3ZFvTUb2P/Y/FTLSE0yhkAvHu4bxNa # yEuuDGdn6gs/ds6Q2qQYCTMdKNWjh68DA1DGwNwnOBaoA+hjRTzHe9WsOGpGGkfY # BgXKrWsVRckUHTGI9oileeTnHHtVG2Q201SIVJNRfjI62l4ifpQ6ycjoRI1PB22t # sK0KvezBznsAnk88oUH1uihR # SIG # End signature block
combined_dataset/train/non-malicious/Set-IPConfigv4.ps1
Set-IPConfigv4.ps1
# script parameters param( [string[]] $Computers = $env:computername, [switch] $ChangeSettings, [switch] $EnableDHCP, [switch] $IpRelease ) # script variables $nl = [Environment]::NewLine $Domain = "domain.local" $DNSSuffix = @("domain.local,domain.com") $DNSServers = @("10.10.0.1", "10.10.0.2", "10.10.0.3", "10.10.0.4") $WINSServers = @("10.10.0.5", "10.10.0.6") $Gateway = @("10.10.255.254") # script functions Function ChangeIPConfig($NIC){ if ($EnableDHCP){ $NIC.EnableDHCP() $NIC.SetDNSServerSearchOrder() } else{ $DNSServers = Get-random $DNSservers -Count 4 $NIC.SetDNSServerSearchOrder($DNSServers) #$x = 0 #$IPaddress = @() #$NetMask = @() #$Gateway = @() #$Metric = @() #foreach ($IP in $NIC.IPAddress){ #$IPaddress[$x] = $NIC.IPAddress[$x] #$NetMask[$x] = $NIC.IPSubnet[$x] #$Gateway[$x] = $NIC.DefaultIPGateway[$x] #$Metric[$x] = $NIC.GatewayCostMetric[$x] #$x++ #} #$NIC.EnableStatic($IPaddress, $NetMask) #$NIC.SetGateways($Gateway, $Metric) #$NIC.SetWINSServer($WINSServers) } $NIC.SetDynamicDNSRegistration("TRUE") $NIC.SetDNSDomain($Domain) # remote WMI registry method for updating DNS Suffix SearchOrder $registry = [WMIClass]"\\\\$computer\\root\\default:StdRegProv" $HKLM = [UInt32] "0x80000002" $registry.SetStringValue($HKLM, "SYSTEM\\CurrentControlSet\\Services\\TCPIP\\Parameters", "SearchList", $DNSSuffix) } Function ShowDetails($NIC, $Computer){ Write-Output "$($nl)$(" IP settings on: ")$($Computer.ToUpper())$($nl)$($nl)$(" for") $($NIC.Description)$(":")$($nl)" Write-Output "$("Hostname = ")$($NIC.DNSHostName)" Write-Output "$("DNSDomain= ")$($NIC.DNSDomain)" Write-Output "$("Domain DNS Registration Enabled = ")$($NIC.DomainDNSRegistrationEnabled)" Write-Output "$("Full DNS Registration Enabled = ")$($NIC.FullDNSRegistrationEnabled)" Write-Output "$("DNS Domain Suffix Search Order = ")$($NIC.DNSDomainSuffixSearchOrder)" Write-Output "$("MAC address = ")$($NIC.MACAddress)" Write-Output "$("DHCP enabled = ")$($NIC.DHCPEnabled)" # show all IP adresses on this NIC $x = 0 foreach ($IP in $NIC.IPAddress){ Write-Output "$("IP address $x =")$($NIC.IPAddress[$x])$("/")$($NIC.IPSubnet[$x])" $x++ } Write-Output "$("Default IP Gateway = ")$($NIC.DefaultIPGateway)" Write-Output "$("DNS Server Search Order = ")$($NIC.DNSServerSearchOrder)" } # actual script execution foreach ($Computer in $Computers){ If (Test-connection $Computer -quiet -count 1){ Try { [array]$NICs = Get-WMIObject Win32_NetworkAdapterConfiguration -Computername $Computer -EA Stop | where{$_.IPEnabled -eq "TRUE"} } Catch { Write-Warning "$($error[0])" Write-Output "$("INACCESIBLE: ")$($nl)$($Computer.ToUpper())" Write-Host $nl continue } # Generate selection menu $NICindex = $NICs.count Write-Host "$nl Selection for "$Computer.ToUpper() ": $nl" For ($i=0;$i -lt $NICindex; $i++) { Write-Host -ForegroundColor Green "$i --> $($NICs[$i].Description)" Write-Output $(ShowDetails $NICs[$i] $Computer) } $nl Write-Host -ForegroundColor Green "q --> Quit" $nl # Wait for user selection input Do { $SelectIndex = Read-Host "Select connection by number or 'q' (=default) to quit" Switch -regex ($SelectIndex){ "^q.*"{$SelectIndex="quit"; $kip = $true} "\\d"{$SelectIndex = $SelectIndex -as [int]} "^\\s*$"{$SelectIndex="quit"; $kip = $true} } } Until (($SelectIndex -lt $NICindex) -OR $SelectIndex -like "q*") $nl Write-Host "You selected: $SelectIndex" #skip current $computer if $true If ($kip) {continue} # Change settings for selected network card if option is true and show updated values If ($ChangeSettings){ If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")){ Write-Warning "You need Administrator rights to run this script!" Break } If ($IpRelease){ #$NICs[$SelectIndex].ReleaseDHCPLease $NICs[$SelectIndex].RenewDHCPLease } Else{ ChangeIPConfig $NICs[$SelectIndex] } start-sleep -s 2 Write-Host $nl " ====NEW SETTINGS====" $nl $UpdatedNIC = Get-WMIObject Win32_NetworkAdapterConfiguration -Computername $Computer | where{$_.Index -eq $NICs[$SelectIndex].Index} Write-Output $(ShowDetails $UpdatedNIC $Computer)$($nl) } Else{ If ($SelectIndex -notlike "q*"){ $nl Write-Warning "For changing settings add -ChangeSettings as parameter, if not this script is output only" $nl } } } }
combined_dataset/train/non-malicious/Set-Encoding.ps1
Set-Encoding.ps1
function Set-Encoding{ <# .Synopsis Takes a Script file or any other text file into memory and Re-Encodes it in the format specified. .Parameter FilePath The path to the file to be re-encoded. .Parameter Unicode Outputs the file in Unicode format. .Parameter UTF7 Outputs the file in UTF7 format. .Parameter UTF8 Outputs the file in UTF8 format. .Parameter UTF32 Outputs the file in UTF32 format. .Parameter ASCII Outputs the file in ASCII format. .Parameter BigEndianUnicode Outputs the file in BigEndianUnicode format. .Parameter Default Uses the encoding of the system's current ANSI code page. .Parameter OEM Uses the current original equipment manufacturer code page identifier for the operating system. .Example ls *.ps1 | Set-Encoding -ASCII .Description Written to provide an easy method to perform easy batch encoding, calls on the command Out-File with the -Encoding parameter and the -Force switch. Primarily to fix UnknownError status received when trying to sign non-ascii format files with digital signatures. Don't use on your MP3's or other non-text files :) #> [CmdletBinding()] PARAM( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$true)] [ValidateScript({ if((resolve-path $_).Provider.Name -ne "FileSystem") { throw "Specified Path is not in the FileSystem: '$_'" } return $true })] [Alias("Fullname","Path")] [string]$FilePath, [switch]$Unicode, [switch]$UTF7, [switch]$UTF8, [switch]$UTF32, [switch]$ASCII, [switch]$BigEndianUnicode, [switch]$Default, [switch]$OEM ) BEGIN{ $Encoding = "" switch( $Unicode, $UTF7, $UTF8, $UTF32, $ASCII, $BigEndianUnicode, $Default, $OEM ){ $Unicode{$Encoding = "Unicode"} $UTF7{$Encoding = "UTF7"} $UTF8{$Encoding = "UTF8"} $UTF32{$Encoding = "UTF32"} $ASCII{$Encoding = "ASCII"} $BigEndianUnicode{$Encoding = "BigEndianUnicode"} $Default{$Encoding = "Default"} $OEM{$Encoding = "OEM"} } } PROCESS{ (Get-Content $FilePath) | Out-File -FilePath $FilePath -Encoding $Encoding -Force } }
combined_dataset/train/non-malicious/3513.ps1
3513.ps1
function Get-DataLakeStoreAccountName { return getAssetName } function Get-DataLakeAnalyticsAccountName { return getAssetName } function Get-ResourceGroupName { return getAssetName } function Invoke-HandledCmdlet { param ( [ScriptBlock] $Command, [switch] $IgnoreFailures ) try { &$Command } catch { if(!$IgnoreFailures) { throw; } } }
combined_dataset/train/non-malicious/finddupe_15.ps1
finddupe_15.ps1
function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } $starttime=[datetime]::now write-host "Usage: finddupe.ps1 <directory/file #1> <directory/file #2> ... <directory/file #N> [-delete] [-noprompt]" $matches = 0 # initialize number of matches for summary. $filesdeleted = 0 # number of files deleted. $bytesrec = 0 # Number of bytes recovered. $files=@() $del = $false # delete duplicates $noprompt = $false # delete without prompting toggle $currentdir = $true # work on current directory by default $args | ?{$_ -eq "-delete"} |%{$del=$true} $args | ?{$_ -eq "-noprompt"} | %{$noprompt=$true} $files=(dir -ea 0 -recurse ($args | ?{$_ -ne "-delete" -and $_ -ne "-noprompt"})|?{$_.psiscontainer -ne $true} ) if ($files -eq $null) {"No files found.`a";exit} for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files { if ($files[$i] -eq $null) {continue} $filecheck = $files[$i] $files[$i] = $null for ($c=0;$c -ne $files.count; $c++) { if ($files[$c] -eq $null) {continue} # write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline if ($filecheck.length -eq $files[$c].length) { #write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline if ($filecheck.md5 -eq $null) { $md5 = (get-md5 $filecheck.fullname) $filecheck = $filecheck | %{add-member -inputobject $_ -name MD5 -membertype noteproperty -value $md5 -passthru} } if ($files[$c].md5 -eq $null) { $md5 = (get-md5 $files[$c].fullname) $files[$c] = $files[$c] | %{add-member -inputobject $_ -name MD5 -membertype noteproperty -value $md5 -passthru} } if ($filecheck.md5 -eq $files[$c].md5) { write-host "Size and MD5 match: " -fore red -nonewline write-host "`"$($filecheck.fullname)`"" -nonewline write-host " and " -nonewline write-host "`"$($files[$c].fullname)`"" $matches++ if ($del -eq $true) { if ($noprompt -eq $true) { del $files[$c].fullname write-host "Deleted duplicate: " -f red -nonewline write-host "$($files[$c].fullname)." } else { del $files[$c].fullname -confirm } if ((get-item -ea 0 $files[$c].fullname) -eq $null) { $filesdeleted += 1 $bytesrec += $files[$c].length } } $files[$c] = $null } } } } write-host "" write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found. write-host "Number of duplicates found: $matches." Write-host "Number of duplicates deleted: $filesdeleted." # Display number of duplicate files deleted and bytes recovered. write-host "$bytesrec bytes recovered." write-host "" write-host "Time to run: $(([datetime]::now)-$starttime|select hours, minutes, seconds, milliseconds)" write-host ""
combined_dataset/train/non-malicious/3103.ps1
3103.ps1
param( [switch]$SkipCabs, [switch]$ShowProgress ) $global:ProgressPreference = 'SilentlyContinue' if ($ShowProgress) { $ProgressPreference = 'Continue' } [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12 $tempDir = [System.IO.Path]::GetTempPath() $panDocVersion = "2.7.3" $pandocSourceURL = "https://github.com/jgm/pandoc/releases/download/$panDocVersion/pandoc-$panDocVersion-windows-x86_64.zip" $pandocDestinationPath = New-Item (Join-Path $tempDir "pandoc") -ItemType Directory -Force $pandocZipPath = Join-Path $pandocDestinationPath "pandoc-$panDocVersion-windows-x86_64.zip" Invoke-WebRequest -Uri $pandocSourceURL -OutFile $pandocZipPath Expand-Archive -Path $pandocZipPath -DestinationPath $pandocDestinationPath -Force $pandocExePath = Join-Path (Join-Path $pandocDestinationPath "pandoc-$panDocVersion-windows-x86_64") "pandoc.exe" $threadJob = Get-Module ThreadJob -ListAvailable if ($null -eq $threadjob) { Install-Module ThreadJob -RequiredVersion 1.1.2 -Scope CurrentUser -Force } $ReferenceDocset = Join-Path $PSScriptRoot 'reference' $jobs = [System.Collections.Generic.List[object]]::new() $excludeList = 'module', 'media', 'docs-conceptual', 'mapping', 'bread', '7' Get-ChildItem $ReferenceDocset -Directory -Exclude $excludeList | ForEach-Object -Process { $job = Start-ThreadJob -Name $_.Name -ArgumentList @($SkipCabs,$pandocExePath,$PSScriptRoot,$_) -ScriptBlock { param($SkipCabs, $pandocExePath, $WorkingDirectory, $DocSet) $tempDir = [System.IO.Path]::GetTempPath() $workingDir = Join-Path $tempDir $DocSet.Name $workingDir = New-Item -ItemType Directory -Path $workingDir -Force Set-Location $WorkingDir function Get-ContentWithoutHeader { param( $path ) $doc = Get-Content $path -Encoding UTF8 $start = $end = -1 for ($x = 0; $x -lt 30; $x++) { if ($doc[$x] -eq '---') { if ($start -eq -1) { $start = $x } else { if ($end -eq -1) { $end = $x + 1 break } } } } if ($end -gt $start) { Write-Output ($doc[$end..$($doc.count)] -join "`r`n") } else { Write-Output ($doc -join "`r`n") } } $Version = $DocSet.Name Write-Verbose -Verbose "Version = $Version" $VersionFolder = $DocSet.FullName Write-Verbose -Verbose "VersionFolder = $VersionFolder" Get-ChildItem $VersionFolder -Directory | ForEach-Object -Process { $ModuleName = $_.Name Write-Verbose -Verbose "ModuleName = $ModuleName" $ModulePath = Join-Path $VersionFolder $ModuleName Write-Verbose -Verbose "ModulePath = $ModulePath" $LandingPage = Join-Path $ModulePath "$ModuleName.md" Write-Verbose -Verbose "LandingPage = $LandingPage" $MamlOutputFolder = Join-Path "$WorkingDirectory\maml" "$Version\$ModuleName" Write-Verbose -Verbose "MamlOutputFolder = $MamlOutputFolder" $CabOutputFolder = Join-Path "$WorkingDirectory\updatablehelp" "$Version\$ModuleName" Write-Verbose -Verbose "CabOutputFolder = $CabOutputFolder" if (-not (Test-Path $MamlOutputFolder)) { New-Item $MamlOutputFolder -ItemType Directory -Force > $null } $AboutFolder = Join-Path $ModulePath "About" if (Test-Path $AboutFolder) { Write-Verbose -Verbose "AboutFolder = $AboutFolder" Get-ChildItem "$aboutfolder/about_*.md" | ForEach-Object { $aboutFileFullName = $_.FullName $aboutFileOutputName = "$($_.BaseName).help.txt" $aboutFileOutputFullName = Join-Path $MamlOutputFolder $aboutFileOutputName $pandocArgs = @( "--from=gfm", "--to=plain+multiline_tables", "--columns=75", "--output=$aboutFileOutputFullName", "--quiet" ) Get-ContentWithoutHeader $aboutFileFullName | & $pandocExePath $pandocArgs } } try { New-ExternalHelp -Path $ModulePath -OutputPath $MamlOutputFolder -Force -WarningAction Stop -ErrorAction Stop if (-not $SkipCabs) { $cabInfo = New-ExternalHelpCab -CabFilesFolder $MamlOutputFolder -LandingPagePath $LandingPage -OutputFolder $CabOutputFolder if ($cabInfo.Count -eq 8) { $cabInfo[-1].FullName } } } catch { Write-Error -Message "PlatyPS failure: $ModuleName -- $Version" -Exception $_ } } Remove-Item $workingDir -Force -ErrorAction SilentlyContinue } Write-Verbose -Verbose "Started job for $($_.Name)" $jobs += $job } $null = $jobs | Wait-Job $allErrors = [System.Collections.Generic.List[string]]::new() foreach ($job in $jobs) { Write-Verbose -Verbose "$($job.Name) output:" if ($job.Verbose.Count -gt 0) { foreach ($verboseMessage in $job.Verbose) { Write-Verbose -Verbose $verboseMessage } } if ($job.State -eq "Failed") { $allErrors += "$($job.Name) failed due to unhandled exception" } if ($job.Error.Count -gt 0) { $allErrors += "$($job.Name) failed with errors:" $allErrors += $job.Error.ReadAll() } } if ($allErrors.Count -gt 0) { $allErrors throw "There are errors during platyPS run!`nPlease fix your markdown to comply with the schema: https://github.com/PowerShell/platyPS/blob/master/platyPS.schema.md" }
combined_dataset/train/non-malicious/Get-ProcedureCallTree.ps1
Get-ProcedureCallTree.ps1
#requires -version 2 #Uses SQLParser.ps1 script http://poshcode.org/1445 to return Stored Procedure Call Tree #Chad Miller #http://chadwickmiller.spaces.live.com/ param ($procedure, $server, $database, $schema='dbo') add-type -AssemblyName Microsoft.SqlServer.Smo #Only create the dynamic SQLParser type if it hasn't been created if (!($global:__SQLParser)) { $global:__SQLParser = ./SQLParser.ps1 } ####################### function Invoke-Coalesce { param ($expression1, $expression2) if ($expression1) { $expression1 } else { $expression2 } } #Invoke-Coalesce ####################### filter Get-StatementByType { param ($statementType) if ($_) { $statement = $_ } #If the statement of specify type is found send to output if ($statement | Get-Member -Type Property $statementType) { $_.$statementType } else { #If the statement type is StatementList (a collection of statements) recursively call filter Get-StatementByType $property = $statement | Get-Member | where {$_.Definition -like "Microsoft.Data.Schema.ScriptDom.Sql.StatementList*"} if ($property) { $property | foreach {$statement.$($_.Name)} | foreach {$_.Statements} | Get-StatementByType $statementType } } } ####################### function Get-ProcedureReference { param ($procedure, $procedureText, $server, $database, $schema) $srv = new-object ("Microsoft.SqlServer.Management.Smo.Server") $server #The sqlparser class needs the SQL version information to in order to use version specific parser #8 is 2000, 9 is 2005 and 10 is 2008. $sqlparser = switch ($srv.Version.Major) { 8 { new-object SQLParser Sql80,$false,$procedureText } 9 { new-object SQLParser Sql90,$false,$procedureText } 10 { new-object SQLParser Sql100,$false,$procedureText } default { new-object SQLParser Sql100,$false,$procedureText } } #Fragements => Batches => Statements. The statements will be one of many different types. In this case we are looking for #a statement type of ExecutableEntity i.e. an EXECUTE statement. Once the statement type if found output the specified properties $sqlparser.Fragment.Batches | foreach {$_.Statements} | Get-StatementByType 'ExecutableEntity' | foreach {$_.ProcedureReference.Name} | select @{n='Server';e={Invoke-Coalesce $_.ServerIdentifier.Value $server}}, ` @{n='Database';e={Invoke-Coalesce $_.DatabaseIdentifier.Value $database}}, ` @{n='Schema';e={Invoke-Coalesce $_.SchemaIdentifier.Value $schema}}, @{n='Procedure';e={$_.BaseIdentifier.Value}} | select *, @{n='Source';e={"{0}.{1}.{2}.{3}" -f $server,$database,$schema,$procedure}}, ` @{n='Target';e={"{0}.{1}.{2}.{3}" -f $_.Server,$_.Database,$_.Schema,$_.Procedure}} } #Get-ProcedureReference ####################### function Get-ProcedureText { param($server, $database, $schema, $procedure) #Use SMO to get a reference to server, database and procedure, then call SMO script method $srv = new-object ("Microsoft.SqlServer.Management.Smo.Server") $server $db= $srv.Databases[$database] $proc = $db.StoredProcedures | where {$_.Schema -eq $schema -and $_.Name -eq $procedure} $proc.Script() } #Get-ProcedureText ####################### # MAIN ####################### $procedureText = Get-ProcedureText $server $database $schema $procedure #SMO Script method returns a string collection, the first to elements [0] and [1] contain set statements #There is bug in SMO Script method where the statements are not terminated i.e. no ; or GO statement #Note: When script method is used with file output scripting option the statements are terminated. #In our case we don't need the SET statements, just the procedure text, which is element [2] $procedureReference = Get-ProcedureReference $procedure $procedureText[2] $server $database $schema $procedureReference #If a procedureReference object is returned recursively call the PowerShel script if ($procedureReference) { $procedureReference | foreach {./Get-ProcedureCallTree.ps1 $_.Procedure $_.Server $_.Database $_.Schema} }
combined_dataset/train/non-malicious/sample_3_16.ps1
sample_3_16.ps1
var OfficeaicopilotStrings={ChatContainerKeepItActionButtonText:"Conservar",ChatContainerUndoActionButtonText:"Desfacer",ChatContainerInsertActionButtonText:"Inserir",ChatContainerFeedbackNudgeContent:"Axúdanos a aprender e a adestrar os modelos marcando os resultados que xeren os LLM cun polgar cara arriba ou cara abaixo.",ChatContainerFeedbackNudgeContentTitle:"Contido da mensaxe de mandar un aviso para obter comentarios",ChatContainerFeedbackNudgeHeader:"Fornecer comentarios",ChatContainerFeedbackNudgeHeaderTitle:"USO INTERNO DE MICROSOFT",ChatCardFooterDisclaimer:"O contido que xera a IA pode ser incorrecto",AIGenerated:"Xerouse con IA",ChatCardFooterDisclaimerPowered:"As suxestións con tecnoloxía de IA poden ser pouco precisas",AIPowered:"Suxestión con tecnoloxía de IA",ChatCardSourceStockContent:"Da biblioteca de contido de Microsoft 365",ChatCardSourceEnterprise:"Da biblioteca de marcas de %s",ChatCardSourceDALLE:"Con tecnoloxía de DALL-E 3",ChatInputDefaultPlaceholder:"Escolle unha indicación inicial ou escribe unha ti mesmo",FREHeaderText:"Copilot está aquí para axudar",FREButtonText:"Empezar",StarterPromptMenuItemDefaultPrefix:"Menú da guía de indicacións",ShowMeButtonText:"Mostrarme",HelpButtonText:"Axuda",ShowMeChatMessage:'Non podo incorporar esa información á conversa polo momento, pero podes atopar a funcionalidade "$1(commandName)" na pestana $2(tabName) da fita',ShowMeUpdatedMessage:'Podes atopar a función "$1(commandName)" no separador $2(tabName) da fita, pero non podo acceder directamente a ela. Queres que che mostre onde está?',ShowMeErrorMessage:"Síntoo, non sei de xeito facelo. Tenta reformular a túa solicitude ou preguntarme sobre outra función.",ShowMeUpdatedMessageWithoutAction:'Podes atopar a función "$1(commandName)" no separador $2(tabName) da fita, pero non podo acceder directamente a ela.',ChatContainerTitle:"Contedor do chat",ChatContainerDefaultMessageTitle:"Mensaxe de chat predefinida",ChatContainerListEmbeddedMessageTitle:"Anotar a mensaxe de chat integrada",ChatContainerLinkEmbeddedMessageTitle:"Ligar a mensaxe de chat integrada",ChatInputTitle:"Área de indicacións",StarterPromptMenuTitle:"Guía de indicacións",SubmitButtonTitle:"Enviar",FREHeaderTextLabel:"Texto da cabeceira de EPE compartida",FREDescriptionTextLabel:"Descrición de EPE compartida",HintCardHeaderTextLabel:"Texto da cabeceira do cartón de suxestión",HintCardDescriptionTextLabel:"Texto da descrición do cartón de suxestión",LoadingUiTextLabel:"Texto de Cargando IU",ZQMHeaderTextLabel:"Texto da cabeceira de cero mensaxes de consulta",ChatMessagesLabel:"Mensaxes de chat",RegenerateButtonLabel:"Volver xerar",CopyButtonLabel:"Copiar",LikeButtonLabel:"Gústame",DislikeButtonLabel:"Non me gusta",SuggestionPaneLabel:"Indicacións suxeridas",SuggestionPaneRefreshButtonLabel:"Actualizar",StopGeneratingButtonLabel:"Parar de xerar",InputToolTipSuggestion:"Engade detalles como lonxitude, ton e estilo para rematar o aviso",MicrophonPermissionErrorTitle:"Non hai permiso para o micrófono",MicrophonPermissionErrorText:"Copilot non pode acceder ao seu micrófono. Prema na icona de bloqueo na barra de enderezos do navegador anterior, configure os permisos para permitir o acceso ao micrófono e, a seguir, téntao de novo.",NeedHelpLink:"Precisas axuda?",NotNowMicrophoneButton:"Agora non",TryAgainMicrophoneButton:"Tentar de novo",MicrophoneTooltip:"Micrófono",MicrophonPermissionErrorTitleWin32:"Non se puido capturar o audio",MicrophonPermissionErrorTextWin32:"Hai un problema co teu micrófono. Comproba a configuración de permisos do teu micrófono.",MicrophonePausedStatus:"Micrófono en pausa",MicrophoneListeningStatus:"Micrófono escoitando",MicrophoneDisabledStatus:"Micrófono desactivado",MicrophoneLoadingStatus:"Micrófono cargando",ImagePickerHeader:"Aquí tes {0} posibilidades...",ImagePickerInsert:"Engadiu unha imaxe.",AddImageButton:"Engadir unha imaxe",PasteImageSuggestion:"Pegar imaxe",UploadImageButton:"Cargar desde este dispositivo",UploadImageUnsupportedTypeError:"Por desgraza non podo traballar con ese tipo de imaxes. Téntao de novo cun BMP, JPG ou PNG.",UploadImageFileTooBigErrorFormat:"O tamaño desa imaxe está fóra do meu límite de {0}MB. Téntao de novo cunha imaxe máis pequena.",UploadImageBadContentError:"Parece que hai algún contido aquí co que non podo traballar. Tenta usar unha imaxe diferente.",ChatInputAttachmentAltTextFormat:"Anexo {0}",ImageChatDefaultPrompt:"Describe this image",DesignerDialogHeader:"Designer",DesignerFallbackToStockApologyMessage:"Aínda non podo facer isto. Aquí tes algunhas imaxes de arquivo que coinciden coa túa busca e poden resultarche útiles.",DesignerFallbackToDalleApologyMessage:"Aínda non podo facer isto. Aquí tes algunhas imaxes que se xeraron que coinciden coa busca e que poden ser útiles.",ImageInsertionSuccessAnnouncement:"Inseriuse a imaxe.",DesignerBrandImagesNotFound:"Non puiden atopar nada na túa biblioteca de marcas que coincida con esa descrición. Téntao de novo usando outras palabras clave ou pídeme que te axude con outra cousa.",DesignerBrandLibraryNotConfigured:"Parece que aínda non creaches unha biblioteca de marcas para Copilot. Ponte en contacto co teu administrador de TI para acceder ás imaxes de marca.",CopilotSwitcherMenuTriggerTitle:"Mudar copilots",CopilotPromptLibraryHeader:"Indicacións de Copilot Lab",CopilotLabLaunchertext:"Vexa todas as indicacións en Copilot Lab",CopilotLabMenuSubItem:"Ver máis indicacións",PromptGuideMenuSectionHeader:"Exemplos para axudarche a %s",CitationTitleReference:"Referencia",CitationTitleReferences:"Referencias",DefaultCIQButtonTitle:"Anexar",DefaultGroundingButtonTitle:"Xestionar a busca e os complementos",DefaultMenuButtonTitle:"Ver indicacións",DefaultGhostText:"Faime unha pregunta ou dime o que queres facer. Para obter ideas sobre como podo axudarche, seleccione a guía de indicacións.",ErrorOffensiveInputContent:"Síntoo, non podo usar iso. Tenta facer unha solicitude nova",ErrorOffensiveOutputContent:"Síntoo, non podo xerar contido para isto. Tenta facer unha solicitude nova.",ErrorInputBlockedByDynamicGuardList:"Parece que hai algún contido aquí co que non podo traballar. Tenta pedirme que faga outra cousa.",ErrorInvalidSignal:"Produciuse un erro. Téntao de novo nun intre.",ErrorTimeout:"Non podo tramitar a túa solicitude neste momento. Téntao de novo en pouco tempo. ",ErrorThrottled:"Alcanzouse o número máximo de solicitudes por hora. Téntao de novo en pouco tempo.",ErrorUserThrottled:"Só se permite un determinado número de solicitudes por segundo. Téntao de novo en pouco tempo.",ErrorInputTooLong:"Non podo procesar tanta información. Téntao de novo cunha solicitude de menos de 15 000 palabras.",ErrorInvalidLanguage:"A solicitude inclúe un idioma que non é compatible actualmente.",ChatHistoryHydrationError:"Se isto é unha continuación dun chat anterior e queres historial de chat, tenta pechar e reabrir o panel.",DisengagedError:"Non podo falar diso. Para gardar o chat e iniciar outro, selecciona Chat novo.",LearnMoreString:"Obter máis información",CopyButtonPopover:"Copiouse no portapapeis",MicrophoneListeningGhostText:"Escoitando...",ChangeTopicButtonLabel:"Modificar tema",ManageChatsButtonLabel:"Xestionar chats",LoadingUIStringLoadingConversation:"Cargando conversa...",LoadingUIStringCreateNewConversation:"Crear unha nova conversa...",ChatHistoryPanelTitle:"Chats de Copilot",ChatHistoryPanelEmptyConversationName:"Chat baleiro",BackButtonText:"Volver",DeleteAllChatHistoryButtonText:"Eliminar todo o historial de Copilot",NewConversationButtonText:"Crear nova conversa",NewChatButtonText:"Novo chat",ShowChatHistoryButtonText:"Historial de chat",ChatHistoryHeaderAriaLabel:"Chats de Copilot",ChatHistoryMenuTriggerButtonText:"Abrir historial de conversas",EmptyConversationListText:"Non hai chats de Copilot anteriores neste documento",ConversationListErrorStateText:"Estamos a ter problemas para mostrar os chats de Copilot. Téntao de novo máis tarde.",ConversationListErrorStateTitle:"Produciuse un erro",ChatHistoryBackButtonAriaLabel:"Volver ao inicio",ChatHistoryNewConversationAriaLabel:"Iniciar nova conversa",ChatHistoryDeleteAllAriaLabel:"Eliminar todo o historial de chat",ChatHistoryDeleteButtonAriaLabel:"Eliminar",ChatHistoryPanelAriaLabel:"Lista de documentos recentes do chat",WorkingOnItString:"Operación en curso...",TopicChangedResponseText:"Imos cambiar de temas. Sobre que queres falar?",DKEAndNotExtractLabelErrorString:"Copilot non pode facer referencia a este contido porque a política da súa organización non o permite.",BlockingCookiesErrorMessage:"A configuración do explorador bloquea cookies necesarias para usar Copilot. Usa un explorador diferente ou unha aplicación de escritorio.",LicenseValidationErrorMessage:"Atopamos un problema para validar a túa licenza de Copilot. Para máis información, ver https://aka.ms/copilotlicensecheck",RequestTooLongErrorMessage:"Non podo axudarche con isto porque a túa descrición é demasiado longa. Considere acurtar a súa solicitude e téntao de novo.",DesignerPreviewLabel:"Previsualización de Designer",CseSelfHelpSkillContentRetrievedMultipleArticles:"Isto é o que atopei:",CseSelfHelpSkillContentRetrievedQuickAnswer:"Isto é o que atopei:",CseSelfHelpSkillContentRetrievedSingleArticle:"Isto é o que atopei:",CseSelfHelpSkillErrorOrNoContentRetrieved:"Teño problemas para atopar información sobre iso. Reformula a túa solicitude e téntao de novo.",CseSelfHelpSkillLaunchHelpPaneTextArticle:"Ver artigo",LoadingUIStringFinishingUp:"Finalizando...",LoadingUIStringGettingReady:"Preparándose...",LoadingUIStringGettingEverythingReady:"Preparando todo...",LoadingUIStringCraftingContent:"Dándolle forma ao contido...",LoadingUIStringFinishingTouches:"Aplicando os últimos retoques...",LoadingUIStringWorkingOnRequest:"Traballando na solicitude...",LoadingUIStringGatheringResources:"Recompilando recursos...",PaneLoadingUIString:"Agarda a que o panel remate de cargarse",GroundingSearchAndPlugins:"Busca e complementos",GroundingPluginFlyoutInfoTooltip:"Os datos de Microsoft 365 Enterprise inclúen aplicacións de Office, sitios de SharePoint, ficheiros na nube ou comunicacións, entre outros. O teu administrador de TI encargouse da configuración completa.",GroundingPluginFlyoutInfo:"Os complementos permiten que Copilot faga referencia a aplicacións no teu nome. É posible que Copilot comparta algúns dos datos de Microsoft 365 Enterprise cos complementos que activaches.",GroundingPluginFlyoutInfoLabel:"Información",PreviewFlagLabel:"Versión preliminar",AdminBlockedPluginInfoTooltipLabel:"O servizo necesario para usar este complemento está desactivado para a súa organización.",WorkPluginLabel:"Datos de Microsoft 365",WebContentPluginLabel:"Contido web",CIQDefaultPlaceholder:"Comeza a escribir para buscar",ProactiveSuggestionTitleText:"Destacar datos",ProactiveSuggestionIconText:"Idea",ProactiveSuggestionBodyText:"Para unha presentación máis atractiva, velaquí un deseño que podería destacar mellor as estatísticas da diapositiva.",ProactiveSuggestionApplyBtnText:"Aplicar",ProactiveSuggestionImageAltText:"imaxe do cartón de suxestións proactivo",RestrictiveSearchMessageTitleText:"O administrador da túa organización restrinxiu o acceso de Copilot a determinados sitios de SharePoint.",RestrictiveSearchMessageBodyText:"Isto limita o contido que Copilot pode buscar e facer referencia ao responder ás solicitudes.",ChatInputCharacterLimitExceededMessage:"Superouse o límite máximo de caracteres.",InActiveChatSessionErrorString:"Esta sesión de chat rematou. Pecha e reabre esta aplicación para unha nova sesión.",BadTokenErrorMessage:"Houbo un problema ao iniciar a sesión. Proba a pechar e reabrir o panel de Copilot e sigue as instrucións para iniciar sesión.",PersonalizationSuggestionText:"Quero obter mellores respostas creando o meu perfil de Copilot.",PersonalizationSuggestionResponse1:'O perfil de Copilot debería incluír as túas instrucións para min sobre como queres que conteste. Para crealas, escribe: "Crear o meu perfil de Copilot: [seguido das instrucións]".\n\n',PersonalizationSuggestionResponse2:"**Por exemplo:** \n\n**Crear o meu perfil de Copilot: inclúe as persoas clave, os números e as datas ao responder unha pregunta ou resumir un documento.**\n\n",PersonalizationSuggestionResponse3:'Unha vez que crees o perfil, poderei adaptarche as miñas respostas e xerar resumos e respostas personalizadas. Para actualizar o perfil, escribe "Actualizar o meu perfil de Copilot: [seguido das instrucións]". Sempre podes pedirme que elimine o perfil.\n\n',PersonalizationSuggestionResponse4:"Esta funcionalidade está dispoñible en Word e PowerPoint no ambiente Inner Ring (Dogfood). Usa os polgares cara arriba/abaixo para enviar comentarios ao Equipo de funcionalidades.",PromptGuideMenuItemWhatCanCopilotProfileDo:"Que pode facer o meu perfil de Copilot?",PromptGuideMenuItemCreateMyCopilotProfile:"Establecer o meu perfil de Copilot: [indícalle a Copilot como responder ás solicitudes]",PromptGuideMenuSectionCustomize:"Personalizar",ErrorBoundaryHeader:"Produciuse un erro",ErrorBoundaryBody:"Actualiza o panel Copilot para tentalo de novo.",ErrorBoundaryButton:"Actualizar",ErrorBoundaryActionButton:"Copiar código de erro",ConfirmButtonLabel:"Confirmar",DeleteButtonLabel:"Eliminar",AssistantStorytellerNERBlockingMessageSentence1Option1:"Se queres engadir imaxes, atopei algúns lugares que poderían funcionar:",AssistantStorytellerNERBlockingMessageSentence1Option2:"Mentres revisas estas diapositivas, pensa onde queres engadir imaxes.",AssistantStorytellerNERBlockingMessageSlideListItem:"Diapositiva {0}",AssistantStorytellerNERBlockingMessageSentence2Part1:"Para explorar imaxes na fita superior, selecciona ",AssistantStorytellerNERBlockingMessageSentence2Part2:"Inserir separador > Imaxes.",PersonalizationProfileErrorResponse:"Produciuse un erro. Téntao de novo máis tarde ou pídeme axuda con outra cousa.",MeetingSuggestionNotAvailable:"As suxestións de reunións non están dispoñibles",FileSuggestionNotAvailable:"As suxestións de ficheiros non están dispoñibles",PeopleSuggestionNotAvailable:"As suxestións de persoas non están dispoñibles",EmailSuggestionNotAvailable:"As suxestións de correos non están dispoñibles",SignInButtonLabel:"Continuar",SignInButtonPopover:"Inicio de sesión",ErrorAuthenticationWithFix:"Hai un problema coa túa conta ou dispositivo. Imos arranxalo.",MicrophoneTooltipListening:"Micrófono escoitando",MicrophoneTooltipPaused:"Micrófono en pausa",MicrophoneTooltipDisabled:"Micrófono desactivado",MicrophoneTooltipLoading:"Micrófono cargando",VerifyAccessButtonLabel:"Verificar o acceso",VerifyAccessButtonPopover:"Verificar o acceso",ClaimChallengeUserMessage:"Teño unha resposta para ti, pero a política da túa organización require verificación adicional para acceder a ela.",ClaimChallengeChatMessage:"A política da túa organización require verificación adicional para acceder a Copilot.",ApplyLabelUnsupportedCrossTenantError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade que só se pode aplicar dentro da organización onde se almacena o ficheiro.",ApplyLabelDocumentReadOnlyError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade que non se pode aplicar cando un ficheiro só se le.",ApplyLabelInsufficientPermissionError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade que só pode ser aplicada polos usuarios que teñen permiso para cambiar a etiqueta neste ficheiro.",ApplyLabelLabelDisabledError:"Non podo completar esta solicitude porque este contido precisa de unha etiqueta de confidencialidade que non está dispoñible na conta.",ApplyLabelUnsupportedUdpError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade con permisos definidos polo usuario.",ApplyLabelLabelingDisabledError:"Non podo completar esta solicitude porque este contido precisa de unha etiqueta de confidencialidade que non está dispoñible na conta.",ApplyLabelUnsupportedContentTypeError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade, e este tipo de ficheiros non soportan etiquetas de sensibilidade.",ApplyLabelUnsupportedDkeError:"Non podo completar esta solicitude porque este contido está protexido con Double Key Encryption.",ApplyLabelLabelNotFoundError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade que non se pode aplicar a este ficheiro.",OsfControlContainerError:"Non podo completar esta solicitude porque houbo un problema aplicando unha etiqueta de sensibilidade.",OMWorkflowUserNotFoundError:"Non podo completar esta solicitude porque houbo un problema aplicando unha etiqueta de sensibilidade.",OMOfficePerpetualNotSupportedError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade, e esta versión de Microsoft 365 non soporta etiquetas de sensibilidade.",LabelingDisabledProtectedViewError:"Non podo completar esta solicitude porque este ficheiro está en Vista Protexida.",LabelingDisabledAppguardError:"Non podo completar esta solicitude porque este ficheiro está aberto en Protección de aplicacións.",LabelingDisabledPrivacySettingsError:"Non podo completar esta solicitude porque a túa configuración de privacidade impide o acceso a contidos que teñen unha etiqueta de sensibilidade.",LabelingDisabledUnsupportedLabelClientError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade, e esta versión de Microsoft 365 non soporta etiquetas de sensibilidade.",LabelingDisabledNoSignedInClpCompatibleUsersError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade, pero a etiquetaxe de sensibilidade non está activada para a súa conta.",OMOfficeClientNotLicensedForLabelingError:"Non podo completar esta solicitude porque este contido require unha etiqueta de sensibilidade, pero a etiquetaxe de sensibilidade non está activada para a súa conta.",OutOfCreditsError:"Por desgraza, non podo completar esa solicitude porque xa gastaches todos os créditos de IA deste mes. Os créditos repoñeranse ao inicio do mes que vén."},OfficeaicopilotStringsEnum=OfficeaicopilotStrings,OfficeaicopilotStringsArray=[],OfficeaicopilotStringsManager=("undefined"==typeof window||!0!==window.g_NewStringsInfra&&"True"!==window.g_NewStringsInfra||(OfficeaicopilotStringsEnum=Object.keys(OfficeaicopilotStrings).reduce((function(e,o,a){return e[o]=a,e}),{}),OfficeaicopilotStringsArray=Object.values(OfficeaicopilotStrings)),{OfficeaicopilotStringsArray,get:function(e){return"undefined"==typeof window||!0!==window.g_NewStringsInfra&&"True"!==window.g_NewStringsInfra?e:OfficeaicopilotStringsArray[e]}});
combined_dataset/train/non-malicious/sample_59_97.ps1
sample_59_97.ps1
<# .SYNOPSIS Common Reporting functions across all modules/scenarios .DESCRIPTION Logging, Reporting .INPUTS Inputs (if any) .OUTPUTS Output (if any) .NOTES General notes #> function Set-AzStackHciOutputPath { param ($Path, $Source='AzStackHciEnvironmentChecker/Diagnostic') if ([string]::IsNullOrEmpty($Path)) { $Path = Join-Path -Path $HOME -ChildPath ".AzStackHci" } $Global:AzStackHciEnvironmentLogFile = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentChecker.log' $Global:AzStackHciEnvironmentReport = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentReport.json' $Global:AzStackHciEnvironmentReportXml = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentReport.xml' Assert-EventLog -source $Source Set-AzStackHciIdentifier } Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1 function Get-AzStackHciEnvProgress { <# .SYNOPSIS Look for existing progress or create new progress. .DESCRIPTION Finds either the latest progress XML file or creates a new progress XML file .EXAMPLE PS C:\> <example usage> Explanation of what the example does .INPUTS Clean switch, in case the user wants to start fresh Path to search for progress run. .OUTPUTS PSCustomObject of progress. .NOTES #> param ([switch]$clean, $path = $PSScriptRoot) $latestReport = Get-Item -Path $Global:AzStackHciEnvironmentReportXml -ErrorAction SilentlyContinue try { $report = Import-Clixml $latestReport.FullName } catch {} if (-not $clean -and $latestReport -and $report) { Log-Info -Message ('Found existing report: {0}' -f $report.FilePath) } else { $hash = @{ FilePath = $Global:AzStackHciEnvironmentReportXml Version = $MyInvocation.MyCommand.Module.Version.ToString() Jobs = @{} } $report = New-Object PSObject -Property $hash Log-Info -Message ('Creating new report {0}' -f $report.FilePath) } $report } function Write-AzStackHciEnvProgress { <# .SYNOPSIS Write report output to JSON .DESCRIPTION After all processing, take results object and convert to JSON report. Any file already existing will be overwritten. .EXAMPLE Write-AzStackHciEnvProgress -report $report Writes $report to JSON file .INPUTS [psobject] .OUTPUTS XML file on disk (path on disk is expected to be embedded in psobject) .NOTES General notes #> param ([psobject]$report) try { $report | Export-Clixml -Depth 10 -Path $report.FilePath -Force Log-Info -Message ('AzStackHCI progress written: {0}' -f $report.FilePath) } Catch { Log-Info -Message ('Writing XML progress to disk error {0}' -f $_.exception.message) -Type Error throw $_.exception } } function Add-AzStackHciEnvJob { <# .SYNOPSIS Adds a 'Job' to the progress object. .DESCRIPTION If a user runs the tool multiple time to check different assets e.g. Certificates on one execution and Registration details on the next execution Those executions are added to the progress for tracking purposes. Execution/Job details include: start time, parameters, parameterset (indicating what is being checked, certificates or Azure Accounts), Placeholders for EndTime and Duration (later filled in by Close-AzStackHciEnvJob) .EXAMPLE Add-AzStackHciEnvJob -report $report Adds execution job to progress object ($report) .INPUTS Report - psobject - containing all progress to date .OUTPUTS Report - psobject - updated with execution job log. .NOTES General notes #> param ($report) $allJobs = @{} $alljobs = $report.Jobs # Index for jobs must be a string for json conversion later if ($alljobs.Count) { $jobCount = ($alljobs.Count++).tostring() } else { $jobCount = '0' } # Record current job $currentJob = @{ Index = $jobCount StartTime = (Get-Date -f 'yyyy/MM/dd HH:mm:ss') EndTime = $null Duration = $null } Log-Info -Message ('Adding current job to progress: {0}' -f $currentJob) # Add current job $allJobs += @{"$jobcount" = $currentJob } $report.Jobs = $allJobs $report } function Close-AzStackHciEnvJob { <# .SYNOPSIS Writes endtime and duration for jobs .DESCRIPTION Find latest job entry and update time and calculates duration calls function to update xml on disk and updates and returns report object .EXAMPLE Close-AzStackHciEnvJob -report $report .INPUTS Report - psobject - containing all progress to date .OUTPUTS Report - psobject - updated with finished execution job log. .NOTES General notes #> param ($report) try { $latestJob = $report.jobs.Keys -match '[0-9]' | ForEach-Object { [int]$_ } | Sort-Object -Descending | Select-Object -First 1 $report.jobs["$latestJob"].EndTime = (Get-Date -f 'yyyy/MM/dd HH:mm:ss') $duration = (([dateTime]$report.jobs["$latestJob"].EndTime) - ([dateTime]$report.jobs["$latestJob"].StartTime)).TotalSeconds $report.jobs["$latestJob"].Duration = $duration Log-Info -Message ('Updating current job to progress with endTime: {0} and duration {1}' -f $report.jobs["$latestJob"].EndTime, $duration) } Catch { Log-Info -Message ('Updating current job to progress failed with exception: {0}' -f $_.exception) -Type Error } Write-AzStackHciEnvProgress -report $report $report } function Write-AzStackHciEnvReport { <# .SYNOPSIS Writes progress to disk in JSON format .DESCRIPTION Write progress object to disk in JSON format, overwriting as neccessary. The resulting blob is intended to be a portable record of what has been checked including the results of that check .EXAMPLE Write-AzStackHciEnvReport -report $report .INPUTS Report - psobject - containing all progress to date .OUTPUTS JSON - file - named AzStackEnvReport.json .NOTES General notes #> param ([psobject]$report) try { ConvertTo-Json -InputObject $report -Depth 8 -WarningAction SilentlyContinue | Out-File $AzStackHciEnvironmentReport -Force -Encoding UTF8 Log-Info -Message ('JSON report written to {0}' -f $AzStackHciEnvironmentReport) } catch { Log-Info -Message ('Writing JSON report failed:' -f $_.exception.message) -Type Error throw $_.exception } } function Log-Info { <# .SYNOPSIS Write verbose logging to disk .DESCRIPTION Formats and writes verbose logging to disk under scriptroot. Log type (or severity) is essentially cosmetic to the verbose log file, no action should be inferred, such as termination of the script. .EXAMPLE Write-AzStackHciEnvironmentLog -Message ('Script messaging include data {0}' -f $data) -Type 'Info|Warning|Error' -Function 'FunctionName' .INPUTS Message - a string of the body of the log entry Type - a cosmetic type or severity for the message, must be info, warning or error Function - ideally the name of the function or the script writing the log entry. .OUTPUTS Appends Log entry to AzStackHciEnvironmentChecker.log under the script root. .NOTES General notes #> [cmdletbinding()] param( [string] $Message, [ValidateSet('INFO', 'INFORMATIONAL', 'WARNING', 'CRITICAL', 'ERROR', 'SUCCESS')] [string] $Type = 'INFORMATIONAL', [ValidateNotNullOrEmpty()] [string]$Function = ((Get-PSCallStack)[0].Command), [switch]$ConsoleOut, [switch]$Telemetry ) $Message = RunMask $Message if ($ConsoleOut) { #if ($PSEdition -eq 'desktop') if ($true) { switch -wildcard ($function) { '*-AzStackHciEnvironment*' { $foregroundcolor = 'DarkYellow' } default { $foregroundcolor = "White" } } switch ($Type) { 'SUCCESS' { $foregroundcolor = 'Green' } 'WARNING' { $foregroundcolor = 'Yellow' } 'CRITICAL' { $foregroundcolor = 'Red' } 'ERROR' { $foregroundcolor = 'Red' } default { $foregroundcolor = "White" } } Write-Host $message -ForegroundColor $foregroundcolor } else { Write-Host $message } } else { Write-Verbose $message } if (-not [string]::IsNullOrEmpty($message)) { # Log to ETW if ($Telemetry) { $source = "AzStackHciEnvironmentChecker/Telemetry" $EventId = 17201 } else { $source = "AzStackHciEnvironmentChecker/Operational" $EventId = 17203 } $logName = 'AzStackHciEnvironmentChecker' $EventType = switch ($Type) { "ERROR" { "Error" } "CRITICAL" { "Error" } "WARNING" { 'Warning' } "SUCCESS" { "Information" } "INFORMATIONAL" { "Information" } Default { "Information" } } # Only write telemetry or non-info entries to the eventlog to save time and noise. if ($Telemetry -or $EventType -ne "Information") { Write-ETWLog -Source $Source -logName $logName -Message $Message -EventType $EventType -EventId $EventId } # Log to file $entry = "[{0}] [{1}] [{2}] {3}" -f ([datetime]::now).tostring(), $type.ToUpper(), $function, ($Message -replace "`n|`t", "") # If the log file path doesnt exist, create it if ([string]::IsNullOrEmpty($AzStackHciEnvironmentLogFile)) { Set-AzStackHciOutputPath } if (-not (Test-Path $AzStackHciEnvironmentLogFile)) { New-Item -Path $AzStackHciEnvironmentLogFile -Force | Out-Null } $retries = 3 for ($i = 1; $i -le $retries; $i++) { try { $entry | Out-File -FilePath $AzStackHciEnvironmentLogFile -Append -Force -Encoding UTF8 $writeFailed = $false break } catch { $writeFailed = "Log-info $i/$retries failed: $($_.ToString())" start-sleep -Seconds 5 } } if ($writeFailed) { throw $writeFailed } } } function RunMask { [cmdletbinding()] [OutputType([string])] Param ( [Parameter(ValueFromPipeline = $True)] [string] $in ) Begin {} Process { try { <#$in | Get-PIIMask | Get-GuidMask#> $in | Get-GuidMask } catch { $_.exception } } End {} } function Get-PIIMask { [cmdletbinding()] [OutputType([string])] Param ( [Parameter(ValueFromPipeline = $True)] [string] $in ) Begin { $pii = $($ENV:USERDNSDOMAIN), $($ENV:COMPUTERNAME), $($ENV:USERNAME), $($ENV:USERDOMAIN) | ForEach-Object { if ($null -ne $PSITEM) { $PSITEM } } $r = $pii -join '|' } Process { try { return [regex]::replace($in, $r, "[*redacted*]") } catch { $_.exception } } End {} } function Get-GuidMask { [OutputType([string])] [CmdletBinding()] param ( [Parameter(ValueFromPipeline = $True)] [String] $guid ) Begin { $r = [regex]::new("(-([a-fA-F0-9]{4}-){3})") } Process { try { return [regex]::replace($guid, $r, "-xxxx-xxxx-xxxx-") } catch { $_.exception } } End {} } function Write-AzStackHciHeader { <# .SYNOPSIS Write invocation and system information into log and writes cmdlet name and version to screen. #> param ( [Parameter()] [System.Management.Automation.InvocationInfo] $invocation, [psobject] $params, [switch] $PassThru ) try { $paramToString = (($params | Protect-SensitiveProperties).GetEnumerator() | ForEach-Object { "$($_.Key)=$($_.Value)" }) -join ';' $cmdLetName = Get-CmdletName $cmdletVersion = (Get-Command $cmdletName -ErrorAction SilentlyContinue).version.tostring() Log-Info -Message '' Log-Info -Message ('{0} v{1} started.' -f ` $cmdLetName, $cmdletVersion) ` -ConsoleOut:(-not $PassThru) Log-Info -Telemetry -Message ('{0} started version: {1} with parameters: {2}. Id:{3}' ` -f $cmdLetName, (Get-Module AzStackHci.EnvironmentChecker).Version.ToString(), $paramToString, $ENV:EnvChkrId) Log-Info -Message ('OSVersion: {0} PSVersion: {1} PSEdition: {2} Security Protocol: {3} Lanaguage Mode: {4}' -f ` [environment]::OSVersion.Version.tostring(), $PSVersionTable.PSVersion.tostring(), $PSEdition, [Net.ServicePointManager]::SecurityProtocol, $ExecutionContext.SessionState.LanguageMode) Write-PsSessionInfo -params $params } catch { if (-not $PassThru) { Log-Info ("Unable to write header to screen. Error: {0}" -f $_.exception.message) } } } function Write-AzStackHciFooter { <# .SYNOPSIS Writes report, log and cmdlet to screen. #> param ( [Parameter()] [System.Management.Automation.InvocationInfo] $invocation, [switch] $failed, [switch] $PassThru ) Log-Info -Message ("`nLog location: $AzStackHciEnvironmentLogFile") -ConsoleOut:(-not $PassThru) Log-Info -Message ("Report location: $AzStackHciEnvironmentReport") -ConsoleOut:(-not $PassThru) Log-Info -Message ("Use -Passthru parameter to return results as a PSObject.") -ConsoleOut:(-not $PassThru) if ($failed) { Log-Info -Message ("{0} failed" -f (Get-CmdletName)) -ConsoleOut:(-not $PassThru) -Type Error -Telemetry } else { Log-Info -Message ("{0} completed. Id:{1} " -f (Get-CmdletName),$ENV:EnvChkrId) -Telemetry } } function Get-CmdletName { try { foreach ($c in (Get-PSCallStack).Command) { $functionCalled = Select-String -InputObject $c -Pattern "Invoke-AzStackHci(.*)Validation" if ($functionCalled) { break } } $functionCalled } catch { throw "Hci Validation" } } function Write-AzStackHciResult { <# .SYNOPSIS Displays results to screen .DESCRIPTION Displays test results to screen, highlighting failed tests. #> param ( [Parameter()] [string] $Title, [Parameter()] [psobject] $result, $seperator = ' -> ', [switch] $Expand, [switch] $ShowFailedOnly ) try { if (-not $result) { throw "Results missing. Ensure tests ran successfully." } Log-Info ("`n{0}:" -f $Title) -ConsoleOut foreach ($r in ($result | Sort-Object Status, Title, Description)) { if ($r.status -ne 'SUCCESS' -or $Expand) { Write-StatusSymbol -Status $r.Status -Severity $r.Severity Write-Host " " -NoNewline Write-Host @expandDownSymbol Write-Host " " -NoNewline if ($r.status -ne 'SUCCESS') { switch ($r.Severity) { Critical { Write-Host @needsRemediation } Warning { Write-Host @needsAttention } Informational { Write-Host @forInformation } Default { Write-Host @Critical } } } Write-Host " " -NoNewline Write-Host ($r.TargetResourceType + " - " + $r.Title + " " + $r.Description) foreach ($detail in ($r.AdditionalData | Sort-Object Status -Descending)) { if ($ShowFailedOnly -and $detail.Status -eq 'SUCCESS') { continue } else { Write-Host " " -NoNewline Write-StatusSymbol -Status $detail.Status -Severity $r.Severity Write-Host " " -NoNewline Write-Host " " -NoNewline Write-Host ("{0}{1}{2}" -f $detail.Source, $seperator, $detail.Resource) } } if ($detail.Status -ne 'SUCCESS') { Write-Host " " -NoNewline Write-Host @helpSymbol Write-Host (" Help URL: {0}" -f $r.Remediation) Write-Host "" } } else { if (-not $ShowFailedOnly) { Write-Host @expandOutSymbol Write-Host " " -NoNewline Write-Host @greenTickSymbol Write-Host " " -NoNewline Write-Host @isHealthy Write-Host " " -NoNewline Write-Host ($r.TargetResourceType + " " + $r.Title + " " + $r.Description) } } } } catch { Log-Info "Unable to write results. Error: $($_.exception.message)" -Type Warning } } function Write-ETWLog { [CmdletBinding()] param ( [Parameter()] [string] $source = 'AzStackHciEnvironmentChecker/Diagnostic', [Parameter()] [string] $logName = 'AzStackHciEnvironmentChecker', [Parameter(Mandatory = $true)] [string] $Message, [Parameter()] [string] $EventId = 0, [Parameter()] [string] $EventType = 'Information' ) try { Write-EventLog -LogName $LogName -Source $Source -EntryType $EventType -Message $Message -EventId $EventId } catch { throw "Creating event log failed. Error $($_.exception.message)" } } function Assert-EventLog { param ( [Parameter()] [string] $source = 'AzStackHciEnvironmentChecker/Diagnostic' ) try { $eventLog = Get-EventLog -LogName AzStackHciEnvironmentChecker -Source $Source -ErrorAction SilentlyContinue } catch {} # Try to create the log if (-not $eventLog) { New-AzStackHciEnvironmentCheckerLog } } function Write-ETWResult { <# .SYNOPSIS Write result to telemetry channel #> [CmdletBinding()] param ( [Parameter()] [psobject] $Result ) try { $source = 'AzStackHciEnvironmentChecker/Telemetry' if (![string]::IsNullOrEmpty($ENV:EnvChkrId)) { $Result | Add-Member -MemberType NoteProperty -Name 'HealthCheckSource' -Value $ENV:EnvChkrId -Force -ErrorAction SilentlyContinue } $Message = $Result | ConvertTo-Json -Depth 5 $EventId = 17205 $EventType = if ($Result.Status -ne 'SUCCESS') { 'WARNING' } else { 'Information' } Write-ETWLog -Source $Source -EventType $EventType -Message $Message -EventId $EventId } catch { Log-Info "Failed to write result to telemetry channel. Error: $($_.Exception.message)" -Type Warning } } function Get-AzStackHciEnvironmentCheckerEvents { <# .SYNOPSIS Retrieve AzStackHCI Environment Checker events from event log .EXAMPLE Get-AzStackHciEnvironmentCheckerEvents -Verbose Retrieve AzStackHCI Environment Checker events from event log .EXAMPLE $results = Get-AzStackHciEnvironmentCheckerEvents | ? EventId -eq 17205 | Select -last 1 | Select -expand Message | Convertfrom-Json Write-AzStackHciResult -result $results Get last result and write to screen #> [CmdletBinding()] param ( [Parameter()] [ValidateSet('Operational', 'Diagnostic', 'Telemetry')] [string] $Source ) try { $sourceFilter = switch ($source) { Operational { "AzStackHciEnvironmentChecker/Operational" } Diagnostic { "AzStackHciEnvironmentChecker/Diagnostic" } Telemetry { "AzStackHciEnvironmentChecker/Telemetry" } Default { "*" } } try { Get-EventLog -LogName AzStackHciEnvironmentChecker -Source $SourceFilter } catch {} } catch { throw "Failed to retrieve AzStackHCI environment checker logs. Error: $($_.exception.message)" } } function New-AzStackHciEnvironmentCheckerLog { try { $scriptBlock = { $logName = 'AzStackHciEnvironmentChecker' $sources = @('AzStackHciEnvironmentChecker/Operational', 'AzStackHciEnvironmentChecker/Diagnostic', 'AzStackHciEnvironmentChecker/Telemetry', 'AzStackHciEnvironmentChecker/RemoteSupport', 'AzStackHciEnvironmentChecker/StandaloneObservability') foreach ($source in $sources) { New-EventLog -LogName $logName -Source $Source -ErrorAction SilentlyContinue Limit-EventLog -LogName $logName -MaximumSize 250MB Write-EventLog -Message ('Initializing log provider {0}' -f $source) -EventId 0 -EntryType Information -Source $source -LogName $logName -ErrorAction Stop } } if (Test-Elevation) { Invoke-Command -ScriptBlock $scriptBlock } else { $psProcess = if (Join-Path -Path $PSHOME -ChildPath powershell.exe -Resolve -ErrorAction SilentlyContinue) { Join-Path -Path $PSHOME -ChildPath powershell.exe } elseif (Join-Path -Path $PSHOME -ChildPath pwsh.exe -Resolve -ErrorAction SilentlyContinue) { Join-Path -Path $PSHOME -ChildPath pwsh.exe } else { throw "Cannot find powershell process. Please run powershell elevated and run the following command: 'New-EventLog -LogName $logName -Source $sourceName'" } Write-Warning "We need to run an elevated process to register our event log. `nPlease continue and accept the UAC prompt to continue. `nAlternatively, run: `nNew-EventLog -LogName $logName -Source $source `nmanually and restart this command." if (Grant-UACConcent) { Start-Process $psProcess -Verb Runas -ArgumentList "-command (Invoke-Command -ScriptBlock {$scriptBlock})" -Wait } else { throw "Unable to elevate and register event log provider." } } } catch { throw "Failed to create Environment Checker log. Error: $($_.Exception.Message)" } } function Remove-AzStackHciEnvironmentCheckerEventLog { <# .SYNOPSIS Remove AzStackHCI Environment Checker event log .EXAMPLE Remove-AzStackHciEnvironmentCheckerEventLog -Verbose Remove AzStackHCI Environment Checker event log #> [cmdletbinding()] param() Remove-EventLog -LogName "AzStackHciEnvironmentChecker" } function Grant-UACConcent { $concentAnswered = $false $concent = $false while ($false -eq $concentAnswered) { $promptResponse = Read-Host -Prompt "Register the event log. (Y/N)" if ($promptResponse -imatch '^y$|^yes$') { $concentAnswered = $true $concent = $true } elseif ($promptResponse -imatch '^n$|^no$') { $concentAnswered = $true $concent = $false } else { Write-Warning "Unexpected response" } } return $concent } function Write-Summary { param ($result, $property1, $property2, $property3, $seperator = '->') try { $summary = Get-Summary @PSBoundParameters # Write percentage Write-Host "`nSummary" Write-Host $lTxt.Summary if (-not ([string]::IsNullOrEmpty($summary.FailedResourceCritical))) { Write-Host " " -NoNewline Write-StatusSymbol -status 'FAILURE' -Severity Critical Write-Host (" {0} Critical Issue(s)" -f @($summary.FailedResourceCritical).Count) } if (-not ([string]::IsNullOrEmpty($summary.FailedResourceWarning))) { Write-Host " " -NoNewline Write-StatusSymbol -status 'FAILURE' -Severity Warning Write-Host (" {0} Warning Issue(s)" -f @($summary.FailedResourceWarning).Count) } if (-not ([string]::IsNullOrEmpty($summary.FailedResourceInformational))) { Write-Host " " -NoNewline Write-StatusSymbol -status 'FAILURE' -Severity Informational Write-Host (" {0} Informational Issue(s)" -f @($summary.FailedResourceInformational).Count) } if ($Summary.successCount -gt 0) { Write-Host " " -NoNewline Write-StatusSymbol -status 'SUCCESS' Write-Host (" {0} successes" -f ($Summary.successCount)) } <#Write-Host @expandDownSymbol Write-Host " " -NoNewline switch ($Severity) { 'CRITICAL' { Write-Host @redCrossSymbol } 'WARNING' { Write-Host @warningSymbol } Default { Write-Host @redCrossSymbol } }#> #Write-Host (" {0} / {1} ({2}%)" -f $summary.SuccessCount, $Result.AdditionalData.Resource.Count, $summary.SuccessPercentage) # Write issues by severity foreach ($severity in 'CRITICAL', 'WARNING', 'INFORMATIONAL') { $SeverityProp = "FailedResource{0}" -f $severity $failedResources = $summary.$SeverityProp | Sort-Object | Get-Unique if ($failedResources -gt 0) { Write-Host "" Write-Severity -severity $Severity Write-Host "" #Write-Host "`n$Severity Issues:" $failedResources | Sort-Object | Get-Unique | ForEach-Object { Write-Host " " -NoNewline switch ($Severity) { 'CRITICAL' { Write-Host @redCrossSymbol } 'WARNING' { Write-Host @warningSymbol } Default { Write-Host @redCrossSymbol } } Write-Host " $PSITEM" } } } if ($Summary.HelpLinks) { Write-Host "`nRemediation: " $Summary.HelpLinks | ForEach-Object { Write-Host " " -NoNewline Write-Host @helpSymbol Write-Host " $PSITEM" } } if (-not $summary.FailedResourceCritical -and -not $summary.FailedResourceWarning -and -not $summary.FailedResourceInformational) { Write-Host "`nSummary" Write-Host @expandOutSymbol Write-Host " " -NoNewline Write-Host @greenTickSymbol Write-Host (" {0} / {1} ({2}%) resources test successfully." -f $summary.SuccessCount, $Result.AdditionalData.Resource.Count, $summary.SuccessPercentage) } } catch { Log-Info -Message "Summary failed. $($_.Exception.Message)" -ConsoleOut -Type Warning } } function Get-Summary { param ($result, $property1, $property2, $property3, $seperator = '->') try { if (-not $result) { throw "Unable to write summary. Check tests run successfully." } [array]$success = $result | Select-Object -ExpandProperty AdditionalData | Where-Object Status -EQ 'SUCCESS' [array]$HelpLinks = $result | Where-Object Status -NE 'SUCCESS' | Select-Object -ExpandProperty Remediation | Sort-Object | Get-Unique [array]$nonSuccess = $result | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS' [array]$nonSuccessCritical = $result | Where-Object Severity -EQ Critical | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS' [array]$nonSuccessWarning = $result | Where-Object Severity -EQ Warning | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS' [array]$nonSuccessInformational = $result | Where-Object Severity -EQ Informational | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS' $successPercentage = if ($success.count -gt 0) { [Math]::Round(($success.Count / $result.AdditionalData.Resource.count) * 100) } else { 0 } $sourceDestsb = { if ([string]::IsNullOrEmpty($_.$property2) -and [string]::IsNullOrEmpty($_.$property3)) { "{0}" -f $_.$property1 } elseif ([string]::IsNullOrEmpty($_.$property3)) { "{0}{1}{2}" -f $_.$property1, $seperator, $_.$property2 } else { "{0}{1}{2}({3})" -f $_.$property1, $seperator, $_.$property2, $_.$property3 } } $FailedResourceCritical = $nonSuccessCritical | Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue | Select-Object -ExpandProperty SourceDest | Sort-Object | Get-Unique $FailedResourceWarning = $nonSuccessWarning | Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue | Select-Object -ExpandProperty SourceDest | Sort-Object | Get-Unique $FailedResourceInformational = $nonSuccessInformational | Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue | Select-Object -ExpandProperty SourceDest | Sort-Object | Get-Unique $summary = New-Object -Type PsObject -Property @{ successCount = $success.Count nonSuccessCount = $nonSuccess.Count successPercentage = $successPercentage HelpLinks = $HelpLinks FailedResourceCritical = $FailedResourceCritical FailedResourceWarning = $FailedResourceWarning FailedResourceInformational = $FailedResourceInformational } return $summary } catch { throw "Unable to calculate summary. Error $($_.exception.message)" } } # Symbols $global:greenTickSymbol = @{ Object = [Char]0x2713 #8730 ForegroundColor = 'Green' NoNewLine = $true } $global:redCrossSymbol = @{ Object = [Char]0x2622 #0x00D7 ForegroundColor = 'Red' NoNewLine = $true } $global:WarningSymbol = @{ Object = [char]0x26A0 ForegroundColor = 'Yellow' NoNewLine = $true } $global:bulletSymbol = @{ Object = [Char]0x25BA NoNewLine = $true } # Text $global:needsAttention = @{ object = $lTxt.NeedsAttention; ForegroundColor = 'Yellow' NoNewLine = $true } $global:needsRemediation = @{ object = $lTxt.NeedsRemediation; ForegroundColor = 'Red' NoNewLine = $true } $global:ForInformation = @{ object = $lTxt.ForInformation; NoNewLine = $true } $global:expandDownSymbol = @{ object = [Char]0x25BC # expand down NoNewLine = $true } $global:expandOutSymbol = @{ object = [Char]0x25BA # expand out NoNewLine = $true } $global:helpSymbol = @{ object = [char]0x270E #0x263C # sunshine NoNewLine = $true #ForegroundColor = 'Yellow' } $global:Critical = @{ object = $lTxt.Critical; ForegroundColor = 'Red' NoNewLine = $true } $global:Warning = @{ object = $lTxt.Warning; ForegroundColor = 'Yellow' NoNewLine = $true } $global:Information = @{ object = $lTxt.Informational; NoNewLine = $true } $global:isHealthy = @{ object = $lTxt.Healthy NoNewLine = $true } function Write-StatusSymbol { param ($status, $severity) switch ($status) { "SUCCESS" { Write-Host @greenTickSymbol } "FAILURE" { switch ($Severity) { 'CRITICAL' { Write-Host @redCrossSymbol } 'WARNING' { Write-Host @warningSymbol } Default { Write-Host @redCrossSymbol } } } Default { Write-Host @bulletSymbol } } } function Write-Severity { param ($severity) switch ($severity) { 'CRITICAL' { Write-Host @needsRemediation } 'WARNING' { Write-Host @needsAttention } 'INFORMATIONAL' { Write-Host @ForInformation } Default { Write-Host @Critical } } } function Set-AzStackHciIdentifier { $ENV:EnvChkrId = $null if ([string]::IsNullOrEmpty($ENV:EnvChkrOp)) { $ENV:EnvChkrOp = 'Manual' } $validatorCmd = Get-CmdletName if(-not [string]::IsNullOrWhiteSpace($validatorCmd)) { $ENV:EnvChkrId = "{0}\{1}\{2}" -f $ENV:EnvChkrOp, $validatorCmd.matches.groups[1], (([system.guid]::newguid()) -split '-' | Select-Object -first 1) } } function Write-PsSessionInfo { <# .SYNOPSIS Write some pertainent information to the log about any PsSessions passed #> [CmdletBinding()] param ( $params ) try { if ($params['PsSession']) { foreach ($session in $params['PsSession']) { Log-Info -Message ("PsSession info: {0}, {1}, {2}, {3}, {4}, {5}" -f $session.ComputerName, $session.Name, $session.Id, $session.Runspace.ConnectionInfo.credential.username, $session.Runspace.SessionStateProxy.LanguageMode, $session.Runspace.ConnectionInfo.AuthenticationMechanism) } } else { Log-Info -Message "No PsSession info to write" } } catch { Log-Info -Message "Failed to write PsSession info: $($_.exception.message)" } } function Log-CimData { [CmdletBinding()] param ( $cimData, [array]$properties ) try { # Use properties provided or all properties if none provided $selectProperties = @() $selectProperties += if ($null -eq $Properties) { "*" } else { foreach ($property in $Properties) { if ($property -is [hashtable]) { $property.Keys } else { $property } } } # For each server log the cimdata foreach ($serverName in ($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique)) { $sData = $cimData | Where-Object {$_.CimSystemProperties.ServerName -eq $ServerName } [string]$className = $sData.CimClass.CimClassName | Sort-Object | Get-Unique Log-Info ("{0} cim instance data for {1}" -f $className, $serverName) $sData | Select-Object -Property $selectProperties | ConvertTo-Csv | Out-String -Stream | ForEach-Object { if (![string]::IsNullOrEmpty($_)) { Log-Info $_ } } } } catch { Log-Info "Failed to write cimdata to log file. Error: $($_.Exception.Message)" -Type Error } } function New-AzStackHciResultObject { [CmdletBinding()] param ( [Parameter()] [String] $Name, [Parameter()] [String] $DisplayName, [Parameter()] [String] $Title, [Parameter()] [Hashtable] $Tags, [Parameter()] [String] $Status, [Parameter()] [String] $Severity, [Parameter()] [String] $Description, [Parameter()] [String] $Remediation, [Parameter()] [String] $TargetResourceID, [Parameter()] [String] $TargetResourceName, [Parameter()] [String] $TargetResourceType, [Parameter()] [datetime] $Timestamp, [Parameter()] [Hashtable] $AdditionalData, [Parameter()] [string] $HealthCheckSource ) # load the assembly as an array of bytes to avoid locking the dll. $bytes = [system.io.file]::ReadAllBytes("$PsScriptRoot\Schema\Microsoft.EnvironmentReadiness.Validator.Client.dll") $assembly = [Reflection.Assembly]::Load($bytes) $type = $assembly.GetType("Microsoft.EnvironmentReadiness.Client.Models.EnvironmentReadinessTestResult") $resultObj = New-Object -TypeName $type.FullName # Set properties from PSBoundParameters foreach ($param in $PSBoundParameters.Keys) { if ($PSBoundParameters[$param]) { if ($PSBoundParameters[$param] -is [System.Collections.Hashtable]) { $resultObj.$param = ConvertTo-Dictionary -hashTable $PSBoundParameters[$param] } else { $resultObj.$param = $PSBoundParameters[$param] } } } return $resultObj } # Convert hashtable to dictionary function ConvertTo-Dictionary { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [hashtable]$hashTable ) begin { $dictionary = New-Object 'system.collections.generic.dictionary[string,string]' } process { foreach ($key in $hashTable.Keys) { if ([string]::IsNullOrEmpty($hashTable[$key])) { $value = "" } else { $value = $hashTable[$key] } $dictionary.Add($key, $value) } } end { return ,$dictionary } } # function to get psobject from pipeline and redact sensitive property values function Protect-SensitiveProperties { param ( [Parameter(ValueFromPipeline = $true)] [psObject] $params ) BEGIN { $array = @() } PROCESS { try { $ret = @{} foreach($key in $_.Keys) { # Redact sensitive parameters if($Key -match "ArmAccessToken|Account|PsSession") { $ret += @{$Key = '[redacted]'} } else { $ret += @{$Key = $_[$Key]} } } $array += $ret } catch { Log-Info "Error occurred trying to remove sensitive parameters. Error: $($_.Exception.Message)" -Type ERROR } } END { return $array } } Export-ModuleMember -function Add-AzStackHciEnvJob Export-ModuleMember -function Close-AzStackHciEnvJob Export-ModuleMember -function Get-AzStackHciEnvironmentCheckerEvents Export-ModuleMember -function Get-AzStackHciEnvProgress Export-ModuleMember -function Log-Info Export-ModuleMember -function Set-AzStackHciOutputPath Export-ModuleMember -function Write-AzStackHciEnvReport Export-ModuleMember -function Write-AzStackHciFooter Export-ModuleMember -function Write-AzStackHciHeader Export-ModuleMember -function Write-AzStackHciResult Export-ModuleMember -function Write-ETWLog Export-ModuleMember -function Write-ETWResult Export-ModuleMember -function Write-Summary Export-ModuleMember -function Log-CimData Export-ModuleMember -function New-AzStackHciResultObject # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfahi9Y7Vn6GUG # HMXGeAzJ+4uOtB2oWL8pTWsSIwAFBqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFADUnd1c6EBFthmvL9vzk/X # toz9TLkkKcr++zHwGFGGMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAi8TANedxmTS0rmbuWN/38jBVnFzG1FaBG0bN4WMt8HguwDvgrC48XdHL # DwttrkneayGqRXIC20O33U9BqCkBPoqqffSQ7enkmgrphPCQNd+XeSRcb4RRMNi4 # 3PKRrLO1VtYmesrF36uAY6jG2ZukmidIux9ihBNtk4hzI23hwVoHvY8QQ4HojO/d # ZgUVblSVPJJXG8nmR+drU0EWEP0JX+5q2xC07gfVXU1mf2L/B7APBs+l9iJp/FKU # dSOdXnDU44vg2HJ2J5bPu046fvRjIKNYQL41E6RA8fNwXEKt7JvYwRrRPCcnKXnm # 6SAvF+iO7zWaYm5sOVrrQAMZys+Kt6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBeXNQNaU+Fndb5HkOKQR5U0cIBr49Wymeoo9aiGGqe6wIGZjOp28Q3 # GBMyMDI0MDUxNjE4NDUyOS41OTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnAIwIhgPMjAyNDA1MTYyMjUxNDZaGA8yMDI0MDUxNzIyNTE0NlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCcAgIBADAHAgEAAgIRpjAHAgEAAgIRbzAKAgUA # 6fHtggIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAI4pnLR+QYde5f+qZ1u4 # h+ow3MB7jtruhTIST+f8uLk1SBLm0niiqCuxdSUDAch40loud3DfBZ54rDiV7Hu2 # mhY8FHfZXI273lSdVTsgc2/aGRpFoT66b7nNxxQdgs/ULZYKHpGw6pPOhPyWkG6B # S8tSffAJU3wB7PyOmV+K12zQMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgFwUun54mLybn3+yMZWleNQ38pXchox9me2NnKiM960owgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIMUK/484Qzmn64FWwcwP/fhtuvZmZGOkRd8YJwNgaiE8 # MA0GCSqGSIb3DQEBCwUABIICAA5WZ/e5ERznIPyWTqxx+TGvCSO5MILbn9mo1yps # bOoNiYEjzNN/DxK2sF+b1nincoTazYWBrk0g9IjrkALGTasoKc9LLX5QiYVFSj7S # ZkjSdlpM4SFFTd34obP/lxc31lrq4F8v7LmlL3PeuseCsNDtZ3yW7GrKKq7/64yf # 816BX+NTIEm6C1Nki4bNuQmviyrNVMiGqXD2k3BPt9y5UKEHvC8NAIEUh0xl3yEm # JJcunCtsDU9nVPVJeyUe5RwgGAOdj56KvrX6PBRUtPoLxjhAZPYdWQm+D6/R/Wae # S1E1odCfTNzskvTZLGcndty6DglDie8HSW4HzLcNfb3uNA0MdpwkpKORhrr0cAaC # 2K0lhBufzyzCuXTY63XhFV0yVpfHu3Kb9slLBS/+M/gKmV0NyMJ1fImBgelaV9oS # HLpootq3x0ptVuxMFzde+jugNeeU9fKkchnpOeSWm4nh8X9Qw/IfOMS9u4bh3KCt # gF09DsSttxo2ejmoFjsy5Ea6MkaaWn9rM/jwuAeAlQwnmLuBqJWCXDqMZWNMuFvQ # dJBpJyPq5dc9bUN+8MOxckJMTW9ugVgl33XXrH7GMf8MvG4n/BLMZ5OdZJMA9nGn # smLrg+RSGkyGKMLPNCFS33yBhY4WTnWqAYt6Ah9G/pkQusLfsy4v8l8V3xgppwy3 # 57Y9 # SIG # End signature block
combined_dataset/train/non-malicious/Get-NestedGroups v_2.ps1
Get-NestedGroups v_2.ps1
Function Global:Get-NestedGroups { <# .SYNOPSIS Enumerate all AD group memberships of an account (including nested membership). .DESCRIPTION This script will return the AD group objects for each group the user is a member of. .PARAMETER UserName The username whose group memberships to find. .EXAMPLE Get-NestedGroups johndoe | Out-GridView Get-NestedGroups johndoe, janedoe | % { $_ | Out-GridView } Get-ADUser -Filter "cn -like 'john*'" | % { Get-NestedGroups $_ | Sort-Object Name | Out-GridView -Title "Groupmembership for $($_)" } "johndoe","janedoe" | % { Get-NestedGroups $_ | Sort-Object Name | Export-CSV Groupmembership-$($_.Name).csv -Delimiter ";" } "johndoe","janedoe" | Get-NestedGroups | % { Sort-Object Name | Out-GridView } .NOTES ScriptName : Get-NestedGroups Created By : Gilbert van Griensven Date Coded : 06/17/2012 Updated : 08/11/2012 The script iterates through all nested groups and skips circular nested groups. .LINK #> [CmdletBinding(SupportsShouldProcess=$True)] Param ( [Parameter(Mandatory=$True,ValueFromPipeline=$True,HelpMessage="Please enter a username")] $UserName ) Begin { $PipelineInput = -not $PSBoundParameters.ContainsKey("UserName") Write-Verbose "Looking for ActiveDirectory module" $Script:ADModuleUnload = $False If (!(Get-Module ActiveDirectory)) { Write-Verbose "ActiveDirectory module not loaded - checking availability" If (Get-Module -ListAvailable | ? {$_.Name -eq "ActiveDirectory"}) { Write-Verbose "ActiveDirectory module is available - loading module" Import-Module ActiveDirectory } Else { Write-Verbose "ActiveDirectory Module is not available" $Script:ADModuleUnload = $True } } Else { Write-Verbose "ActiveDirectory Module is already loaded" $Script:ADModuleUnload = $True } Function GetNestedGroups { Get-ADGroup $_ -Properties MemberOf | Select-Object -ExpandProperty MemberOf | % { If (!(($Script:GroupMembership | Select-Object -ExpandProperty DistinguishedName) -contains (Get-ADGroup $_).DistinguishedName)) { $Script:GroupMembership += (Get-ADGroup $_) GetNestedGroups $_ } } } Function GetDirectGroups { $InputType = $_.GetType().Name If (($InputType -ne "ADUser") -and ($InputType -ne "String")) { Write-Error "Invalid input type `'$($_.GetType().FullName)`'" -Category InvalidType -TargetObject $_ Break } If ($InputType -eq "String") { Try { Write-Verbose "Querying Active Directory for user `'$($_)`'" $UserObject = Get-ADUser $_ } Catch { Write-Verbose "$_" Write-Error $_ -Category ObjectNotFound -TargetObject $_ Break } } Else { $UserObject = $_ } $Script:GroupMembership = @() $Script:GroupMembership += (Get-ADGroup "Domain Users") Get-ADUser $UserObject -Properties MemberOf | Select-Object -ExpandProperty MemberOf | % { $Script:GroupMembership += (Get-ADGroup $_) } $Script:GroupMembership | ForEach-Object {GetNestedGroups $_} } } Process { If ($PipelineInput) { GetDirectGroups $_ , $Script:GroupMembership } Else { $UserName | ForEach-Object { GetDirectGroups $_ $Script:GroupMembership } } } End { If (!($Script:ADModuleUnload)) { Write-Verbose "Removing module ActiveDirectory" Remove-Module ActiveDirectory -ErrorAction SilentlyContinue } } }
combined_dataset/train/non-malicious/Test if file is writable.ps1
Test if file is writable.ps1
function get-IsWritable(){ <# .Synopsis Command tests if a file is present and writable. .Description Command to test if a file is writeable. Returns true if file can be opened for write access. .Example get-IsWritable -path $foo Test if file $foo is accesible for write access. .Example $bar | get-IsWriteable Test if each file object in $bar is accesible for write access. .Parameter Path Psobject containing the path or object of the file to test for write access. #> [CmdletBinding()] param([Parameter(Mandatory=$true,ValueFromPipeline=$true)][psobject]$path) process{ Write-Verbose "Test if file $path is writeable" if (Test-Path -Path $path -PathType Leaf){ Write-Verbose "File is present" $target = Get-Item $path -Force Write-Verbose "File is readable" try{ Write-Verbose "Trying to openwrite" $writestream = $target.Openwrite() Write-Verbose "Openwrite succeded" $writestream.Close() | Out-Null Write-Verbose "Closing file" Remove-Variable -Name writestream Write-Verbose "File is writable" Write-Output $true } catch{ Write-Verbose "Openwrite failed" Write-Verbose "File is not writable" Write-Output $false } Write-Verbose "Tidying up" Remove-Variable -Name target } else{ Write-Verbose "File $path does not exist or is a directory" Write-Output $false } } }
combined_dataset/train/non-malicious/sample_67_25.ps1
sample_67_25.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIImEQYJKoZIhvcNAQcCoIImAjCCJf4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIaBTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1 # fU+wYXo6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALywn # CRgZ5Jbg9T+JXSXA/emxhO33D9HzChrgFT70wCgrW7tp1/URokTk75IG/8HGbtLX # iL3IXSOgyFttU/ir4H3aOcQeBjCqxkq6ssZdxADkj64m94v+te26Z+9T9k8IyiKf # t5AqbStTJwNPmNkJUhlsm5pl5IN/g/wrJRWAXz++Ljx1xx8fNNra6cECguorDdyQ # 5B6v+1hh2DQsxis+NcroiP9zsUgnq1TDIt7BZKF3sRQfiMn2NCvx1isCSIDCnJ4o # tPziMcJNVrXWBlNGDXdRJxIqiASkQ18u4R7PswEF2ObElDQc0qgx2fa7exbebIRh # EXe75cdB8DQWpA+ZgqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3 # DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRAB # BKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCi # mZCYuTux/SyAj/Wn6eH50nA2Xh+qWnS2SofY6yKtOgIGZkYbQF1AGBMyMDI0MDYw # NjA2MjY0NC4xMDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVy # YXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcx # JTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCC # BQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0BAQsFADB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAz # MDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1A # DBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt # 3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs # /EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDn # ZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq4wDkcAwitCZ5 # BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu4vi887FWxm54 # kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70WdsgDU/P5c0L8vYI # skUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLfDoKw5hak5G6M # WF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybIc6ufT0ilazKY # ZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ6U50K9dbhnMa # DcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tDEwIDAQABo4IB # STCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8GA1UdIwQYMBaA # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh # bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH # MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC # MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG # SIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+QtDGgeT5F3ro7P # sIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL # +7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjL # GSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+ISUMXBf835CuV # NfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf4rxUAfrEbV6a # j8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7 # s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBf # Ya+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYB # q39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDB # r2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+owaXr5RJjryDq9 # ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiVQNriZYCHIDCC # B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw # gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT # KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx # MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry # IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT # cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx # XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ # HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1 # KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s # 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg # fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3 # Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je # 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY # hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY # P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC # NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w # HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB # BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD # CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T # AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV # HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w # cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE # TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC # AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a # ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp # 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq # 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB # woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG # +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B # FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77 # IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ # fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K # 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx # yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB # +aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEl # MCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn # 2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6gufETAiGA8yMDI0MDYwNjAyMzYwMVoYDzIwMjQw # NjA3MDIzNjAxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqC58RAgEAMAcCAQAC # AhjeMAcCAQACAhRzMAoCBQDqDPCRAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBAAEzv/HZbWFs5qfygdYsCoW3YaEcFAm4o1Q4Ww/r7b/BkvDVxTvqOA0keaiG # YwnVJKRnD5UQfFOpa231sj6YB3Mpv12qVv6mFDcijs6JuorMxo46AcEDdEcu0ehl # G2v60rFIe/rmdewsr709wnRUcrOeEDZ28vvI52eu2BePBjJpd/2yZeKtNYlHulif # eLqbBrc1r6vhf32Yzf28a3ooQpKTqIU71mnIvS9BbArwMJneaMaNDldWD7EUMXcx # Rt/LnLza4KytQ1rnsTB3i8blHj2R/c9GKm/UdWmkZwa/UsaQFVREk3PWui8U11+p # IZzNMxhJjqQZktzmaA1zsC/NYJ0xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCDBBf5/Rj94DNffk4LFueMlCI6IzAFD5zVCjL8QkiVtlTCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJT2J3U8W1Sc8H # +OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHo # ULCAzytymU0AAQAAAegwIgQgyGLnrlRakkpandg+P1zqbs/BQnvZdHN0FVBxmYGV # MRgwDQYJKoZIhvcNAQELBQAEggIAWrRIzxR2ljRjI0Cc/ES9NoAiQtZh89qQSlOD # 3lIs7npPOcR0+TWSAczyMYVTDDvAXyXt96k5kp6joEd30QFSc6EWf03OlQ8wmPh2 # 9NHW6kdZn9c6qDqwU0Rf1vQdpU/7pSCklV0X9CpcHv75iQMmIqQ7lo5OiaW2Gqgg # 5QOFa1+Y+q3oxM8pDb9attogI0oqT+c+0gBfdt114GpbMsQXVwJjQ0YM5Q4Ndgu3 # kD3IsB/LVdel7pAGgXheuhtztnxXw48ayhkYWuT2zq0XJZCfnfhdY7AJVmVD/hiC # 6xYB9toZI23lxzYQpXxd0GiYXsExXcl7QAxC4kv48AV41fCpDkQO4i6ZqmKnEytr # si064hP9SO6xZbE1s/xd3HSWCPWbbYOt0J10LAPdsNIDIwOxRVJD/9DgFdvPRO2T # 0a4sY/iyk7FwhHFlhwLfp1d6KU1f00cli9eOvBXAovfvSjPOV5BtyBUkAlxgE/no # xxp5Qi33JpgZd3Du0gbS+hXYVmhtaEIZJ4mqYUxs8gmj73xGMa1bG7Hz7gDW37iV # mSl6yo8bqHZJasV7wc8a2zikV5sBoXQadi4yi1yQK7oYjpxiWNbIaKKb7d3aD861 # I9awuIcy2BlNOSuc2CVHRyzz35uNqhB61edMSlxrn5MhHIj/mmW54sFyjmUjJ9Gq # bzVJ5TY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_30_93.ps1
sample_30_93.ps1
# # Module manifest for module 'OCI.PSModules.Streaming' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Streaming.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Streaming Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIStreamingConnectHarness', 'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup', 'Get-OCIStreamingMessages', 'Get-OCIStreamingStream', 'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList', 'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit', 'Invoke-OCIStreamingConsumerHeartbeat', 'Move-OCIStreamingConnectHarnessCompartment', 'Move-OCIStreamingStreamCompartment', 'Move-OCIStreamingStreamPoolCompartment', 'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor', 'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream', 'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness', 'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool', 'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup', 'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool', 'Write-OCIStreamingMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_27_75.ps1
sample_27_75.ps1
# # Module manifest for module 'OCI.PSModules.Governancerulescontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Governancerulescontrolplane.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '96ae80bb-9cf9-48b1-b722-28d177d3da7a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Governancerulescontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Governancerulescontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRule', 'Get-OCIGovernancerulescontrolplaneEnforcedGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneGovernanceRule', 'Get-OCIGovernancerulescontrolplaneGovernanceRulesList', 'Get-OCIGovernancerulescontrolplaneInclusionCriteriaList', 'Get-OCIGovernancerulescontrolplaneInclusionCriterion', 'Get-OCIGovernancerulescontrolplaneTenancyAttachment', 'Get-OCIGovernancerulescontrolplaneTenancyAttachmentsList', 'Get-OCIGovernancerulescontrolplaneWorkRequest', 'Get-OCIGovernancerulescontrolplaneWorkRequestErrorsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestLogsList', 'Get-OCIGovernancerulescontrolplaneWorkRequestsList', 'Invoke-OCIGovernancerulescontrolplaneRetryGovernanceRule', 'Invoke-OCIGovernancerulescontrolplaneRetryTenancyAttachment', 'New-OCIGovernancerulescontrolplaneGovernanceRule', 'New-OCIGovernancerulescontrolplaneInclusionCriterion', 'Remove-OCIGovernancerulescontrolplaneGovernanceRule', 'Remove-OCIGovernancerulescontrolplaneInclusionCriterion', 'Stop-OCIGovernancerulescontrolplaneWorkRequest', 'Update-OCIGovernancerulescontrolplaneGovernanceRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Governancerulescontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_0_25.ps1
sample_0_25.ps1
ConvertFrom-StringData @' id_ctsgrouppolicyclient=GroupPolicy Client id_ctsgrouppolicyclientdescription=Collects information about GroupPolicy Client. '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAcJGsbRBXcM0ro # vTCkDXKZWmJOiQO/aT/fV9iyzCHRl6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOY4 # 88o1nCIOQgiAZ1gO1Kwjl2rtpmIVTzGqxHMdp5jjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgy8K5MEl0/ormVPrY3OOqeTm3mLv4QEzTB0s # Wl33QhbLVDYypg+IEXuynE3FYo/6FifM1SdLMB7TWKP7nt0C9VO2mUDDjlqWP07n # SVWZi4lgi1hH5GilVt6e/+ZQwz6sr6tprf5rFVxpRtqecZ5lL0m0jRM4wbklY1cB # afrp5ayvbk1/MCF1AfTxVvCHx5lSYnSmBarMkM486LaJMaQPsEQeHlwElz4KcBFU # +S3lv+qIM4OvSyp7qRP75zZ81VtQK1ixNlVFfwiYMTeb0ZNnMCaPrN5iw5fev6h/ # uNGFaRwomyTpgrfQHT+otjrCFA0wHJAyUNQRSs13w6uxkNU2/KGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCPu8MvZJErFGBywH2bzn219VD+U8eiJbvT # 2+FawpmUiwIGZutgsUnxGBMyMDI0MTAyODExNDA0Mi4wODlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG # hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV # zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm # XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE # xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu # o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu # e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW # OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp # MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2 # 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+ # Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX # Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3 # gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi # Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1 # 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC # egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8 # jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh # 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5 # A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld # yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6 # XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF # HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X # ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0 # MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA # AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe # 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs # FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB # 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S # 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn # +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVb3xVISiD6MGEZvcX9GlR95pJoDCcJ5dtJQXMMX19M8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60 # RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN # J5IJMA0GCSqGSIb3DQEBCwUABIICAElgrUEt5Ba005bXKPsUNnMqjSaCLJaca1O5 # Z0qTeFZ3WIQrCcuKdFgU4452/WBcff23+hq5m+tzj1cBumweB5+M2Bic/ciZxPf6 # +NI+PKHeUs3+41fL6rWHmtBmgLqgrD+zm1do1gzL+yf6j0+zlyI8xeWERq/3SyTd # oDq0kBXSmoT8qSbxyQaS5AuOsXi2EKFjRYFmqNxNkG47qKZes1RGQ7XUmN8G0vxt # zNYGBZJuG+I32Yz4kZYRa/NFW5PBjROyge02NQSGscU0Hxs/QbY2LBm9H6YsVL1G # ErUHh6GTzTdMdkz+U4VIUOIaWvZ6GJIANKPxIuUCGBLPo6n6dc2hQdKqTVBDJZtA # SY+lT9LXEYgLTfa0nD4m0Lr/6/PcHjcRKuzdHIVk7M3cQhkfjF/BJfdZ8OD4jLck # uYRA0+mCBQlGWe3wWXYl0nfs177XPTPdf6ThWf3/CEJa2LELkD4IIj1fZ1h/ej97 # +SapgP4kZZDb5x6oRDeXCRQT3CmxJnhm5h2StBtIsgevIG8HvR3rGKm1QMpw4/8g # RlvUOTYD6sdUL595porAyCjL2dXDso42UCnrQGM3ZOt/i5j3RDI7c9bmWqc2MH4U # AuoU0Msv0mF1niaA311hk4u/3aMnGsFCvL3xaheMKML5SFlYQpQsM178OBDiharI # DFM6jGXx # SIG # End signature block
combined_dataset/train/non-malicious/sample_37_88.ps1
sample_37_88.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .SYNOPSIS Starts the language and debug services from the PowerShellEditorServices module. .DESCRIPTION PowerShell Editor Services Bootstrapper Script ---------------------------------------------- This script contains startup logic for the PowerShell Editor Services module when launched by an editor. It handles the following tasks: - Verifying the existence of dependencies like PowerShellGet - Verifying that the expected version of the PowerShellEditorServices module is installed - Installing the PowerShellEditorServices module if confirmed by the user - Creating named pipes for the language and debug services to use (if using named pipes) - Starting the language and debug services from the PowerShellEditorServices module .INPUTS None .OUTPUTS None .NOTES If editor integration authors make modifications to this script, please consider contributing changes back to the canonical version of this script at the PowerShell Editor Services GitHub repository: https://github.com/PowerShell/PowerShellEditorServices/blob/main/module/PowerShellEditorServices/Start-EditorServices.ps1' #> [CmdletBinding(DefaultParameterSetName="NamedPipe")] param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $HostName, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $HostProfileId, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $HostVersion, [ValidateNotNullOrEmpty()] [string] $BundledModulesPath, [ValidateNotNullOrEmpty()] $LogPath, [ValidateSet("Diagnostic", "Verbose", "Normal", "Warning", "Error")] $LogLevel, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $SessionDetailsPath, [switch] $EnableConsoleRepl, [switch] $UseLegacyReadLine, [switch] $DebugServiceOnly, [switch] $LanguageServiceOnly, [string[]] $AdditionalModules, [string[]] $FeatureFlags, [switch] $WaitForDebugger, [switch] $ConfirmInstall, [Parameter(ParameterSetName="Stdio", Mandatory=$true)] [switch] $Stdio, [Parameter(ParameterSetName="NamedPipe")] [string] $LanguageServicePipeName = $null, [Parameter(ParameterSetName="NamedPipe")] [string] $DebugServicePipeName = $null, [Parameter(ParameterSetName="NamedPipeSimplex")] [switch] $SplitInOutPipes, [Parameter(ParameterSetName="NamedPipeSimplex")] [string] $LanguageServiceInPipeName, [Parameter(ParameterSetName="NamedPipeSimplex")] [string] $LanguageServiceOutPipeName, [Parameter(ParameterSetName="NamedPipeSimplex")] [string] $DebugServiceInPipeName = $null, [Parameter(ParameterSetName="NamedPipeSimplex")] [string] $DebugServiceOutPipeName = $null ) Import-Module -Name "$PSScriptRoot/PowerShellEditorServices.psd1" Start-EditorServices @PSBoundParameters # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/QMbiqvJR/TvV # N+fN/bYNYpy9Y6i8jKThMvqToh5EQ6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHtK5Q0Nz/mzdVrvny/BciPw # XtXH1Ci2sU+lLPODi8hBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkOrU0WulYUb7dKUKa2q6MZ3lbe1RMh+eBtsCxQiTl2/Ys7fRLa7Mz60R # 0cIyZXaNCd+XpShH64g8a0HN/28mRI7Wm0E4VJntGthXwZ+WbZLTWRC4ph7BUtPW # 97bs8mW63+dR1HRBAjPQIWjgH71vcGu5/s/72OGWg+gLKlAfZ2wX4CtzZnrpPIT4 # Nw0eK7gs8JLT1f8MITVJqeBdM6DA/yL6Bm9gvedvsBb7qL7b6JQIClkjsdp/okFA # IMWQZRfqf2//aZIDX2tYqwpLL61ZIypJJP0TpwixeCCtTD+RGgH+xZAw+/qqCY9S # R3gGrzZb7tvjHYREazzW+ulg8KI/CKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCknn+DwcS0YHBzEaMco4IwbngYmRy0sUvG+aEPbbZBGAIGZaAAuK4P # GBMyMDI0MDEyNjAyMjcxMi41OThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAdIhJDFKWL8tEQABAAAB0jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MjFaFw0yNDAyMDExOTEyMjFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDcYIhC0QI/SPaT5+nYSBsSdhBPO2SXM40Vyyg8Fq1T # PrMNDzxChxWUD7fbKwYGSsONgtjjVed5HSh5il75jNacb6TrZwuX+Q2++f2/8CCy # u8TY0rxEInD3Tj52bWz5QRWVQejfdCA/n6ZzinhcZZ7+VelWgTfYC7rDrhX3TBX8 # 9elqXmISOVIWeXiRK8h9hH6SXgjhQGGQbf2bSM7uGkKzJ/pZ2LvlTzq+mOW9iP2j # cYEA4bpPeurpglLVUSnGGQLmjQp7Sdy1wE52WjPKdLnBF6JbmSREM/Dj9Z7okxRN # UjYSdgyvZ1LWSilhV/wegYXVQ6P9MKjRnE8CI5KMHmq7EsHhIBK0B99dFQydL1vd # uC7eWEjzz55Z/DyH6Hl2SPOf5KZ4lHf6MUwtgaf+MeZxkW0ixh/vL1mX8VsJTHa8 # AH+0l/9dnWzFMFFJFG7g95nHJ6MmYPrfmoeKORoyEQRsSus2qCrpMjg/P3Z9WJAt # FGoXYMD19NrzG4UFPpVbl3N1XvG4/uldo1+anBpDYhxQU7k1gfHn6QxdUU0TsrJ/ # JCvLffS89b4VXlIaxnVF6QZh+J7xLUNGtEmj6dwPzoCfL7zqDZJvmsvYNk1lcbyV # xMIgDFPoA2fZPXHF7dxahM2ZG7AAt3vZEiMtC6E/ciLRcIwzlJrBiHEenIPvxW15 # qwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCC2n7cnR3ToP/kbEZ2XJFFmZ1kkMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCw5iq0Ey0LlAdz2PcqchRwW5d+fitNISCv # qD0E6W/AyiTk+TM3WhYTaxQ2pP6Or4qOV+Du7/L+k18gYr1phshxVMVnXNcdjecM # tTWUOVAwbJoeWHaAgknNIMzXK3+zguG5TVcLEh/CVMy1J7KPE8Q0Cz56NgWzd9ur # G+shSDKkKdhOYPXF970Mr1GCFFpe1oXjEy6aS+Heavp2wmy65mbu0AcUOPEn+hYq # ijgLXSPqvuFmOOo5UnSV66Dv5FdkqK7q5DReox9RPEZcHUa+2BUKPjp+dQ3D4c9I # H8727KjMD8OXZomD9A8Mr/fcDn5FI7lfZc8ghYc7spYKTO/0Z9YRRamhVWxxrIsB # N5LrWh+18soXJ++EeSjzSYdgGWYPg16hL/7Aydx4Kz/WBTUmbGiiVUcE/I0aQU2U # /0NzUiIFIW80SvxeDWn6I+hyVg/sdFSALP5JT7wAe8zTvsrI2hMpEVLdStFAMqan # FYqtwZU5FoAsoPZ7h1ElWmKLZkXk8ePuALztNY1yseO0TwdueIGcIwItrlBYg1Xp # Pz1+pMhGMVble6KHunaKo5K/ldOM0mQQT4Vjg6ZbzRIVRoDcArQ5//0875jOUvJt # Yyc7Hl04jcmvjEIXC3HjkUYvgHEWL0QF/4f7vLAchaEZ839/3GYOdqH5VVnZrUIB # QB6DTaUILDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # ptLCZsE06NtmHQzB5F1TroFSBqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6VzzMTAiGA8yMDI0MDEyNTE0NDgx # N1oYDzIwMjQwMTI2MTQ0ODE3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpXPMx # AgEAMAoCAQACAhnVAgH/MAcCAQACAhNnMAoCBQDpXkSxAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAHdcz3NJR3OdsR1I0V4sn8xt3xZgDGOWAcC9BNVmdMws # uuVa7KKfLrcsV2z85zHvI/QIvCAXqUnXKLHx4RZ+km+KgJdmpL4fxDqufF7w2v/S # 879q3n2YPk/5lhG6G5ByuJpD8S+DL/KfZ2Yh8F5HGDFiRjy2K8lokQoaZk06Z8ND # HMSRS0s0nba5cMvuHIcJuX6jT6P9JQiRaDBU+GECP+hhXGKEuFh4jzAUnjkjBjgk # NcvajOFqbC4eesU8G0N8xa7krpXTNyLZZU5SvTSVkd4C3dkix1WMqG8egzZ5Yz4t # qKW0h+UHpvqX+aMEeFbf0ze5vMAehDdjnoQY1VZrKgQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdIhJDFKWL8tEQABAAAB # 0jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDOOR5dTXdDY78/Uap62g3aLY98kIQpAYxiPZdIiC9a # QjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMeAIJPf30i9ZbOExU557GwW # NaLH0Z5s65JFga2DeaROMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHSISQxSli/LREAAQAAAdIwIgQgOAtIakcosCxacTLstZOz8HdG # sVCN4+5KbMT24Vs9LEcwDQYJKoZIhvcNAQELBQAEggIAg2KFFB2eCiOyWyRt3NZH # vqSRRNNNe9TJ2yYFidlXdWotn5Cn8w6pf3vv74z3O856wxaMI/qAUpMaNcrpeMnF # n0HonbThfi0LNtKmaUBUvrzv5W5nebc+qzt8QeId9Cfz9CAZWtILtGN16JXiYu0a # FR1MjierdLuOK2kizpd8dIjzjPiIkx7Qp0xO0dbIV2pxyLbmvwXuqE5KGheHUfPK # BD04aii5hE162eZOG0cIWiHrMb/d4SUZifl7v/wu5z7TZBo8jn0TwDVAplRdCYSj # 7Slr1H3VBNr8VNU+saSXgUxb+KNczdRMFANpii8qr+oPENJo/UTl7qZOpP09VPQG # ZaU42PI+iI6v/QofOqZeP3c6gYzoNmYJA879NH5E+sMqYlmd656gEccY00kHHoW2 # b/xx5tLrCSPcPa2/p9/bGyFwmyKXYZ2vwMm1Manb95JB3joswGxHCA5/eXlSWl67 # 3KkP6nV3YaeGnSjLbj8whYYZxKqNVIZInnMt2Z80xGSB+L4DfGVjsiiGTMoqv28R # Vp7XZj4TJXZou8t1Ufe6xzljiDffaFyq97AVwXbVj/UFiUm7I2sA1nfDFBoP0pEn # psbAHCRfJNi2Fs0NsnRFBgzf56iNy1ZKGx3GgYjRPp590bCH9IaEpExujxjz1uyX # ioMoqb+2HIJtIcu3m9gmqYo= # SIG # End signature block
combined_dataset/train/non-malicious/2508.ps1
2508.ps1
param( $SQLServer = 'PSQLRPT2', [string]$ScriptDir = 'C:\Users\MMessano\Desktop\DMartInterum', $Beta = 0, [String[]] $DatabaseList, $FilePrefix = 'Log', [switch]$Log ) $DQuery = "SELECT CDCReportDB FROM ClientConnectionCDC WHERE Beta = " + $Beta + " ORDER BY 1" $Databases = Invoke-Sqlcmd -ServerInstance $SQLServer -Database PA_DMart -Query $DQuery $DataScripts = Get-ChildItem -Path $ScriptDir -Filter *Data*.sql | sort-object -desc cls if ($Databases) { foreach ($DB IN $Databases) { Write-Host "Begin" $DB[0] if ($DataScripts) { foreach ( $DataScript IN $DataScripts ) { Invoke-SQLCMD -ServerInstance $SQLServer -Database $DB[0] -InputFile $DataScript.FullName -QueryTimeout 120 Write-Host "`tApplied " $DataScript.FullName "to the" $DB[0]"database"on" $SQLServer." } } } Write-Host "End" $DB[0] }
combined_dataset/train/non-malicious/sample_48_46.ps1
sample_48_46.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # culture = "en-US" ConvertFrom-StringData -StringData @' ###PSLOC InValidUri = InValid Uri: '{0}'. A sample valid uri: https://www.powershellgallery.com/api/v2/. PathDoesNotExist = Path: '{0}' does not exist. VersionError = MinimumVersion should be less than the MaximumVersion. The MinimumVersion or MaximumVersion cannot be used with the RequiredVersion in the same command. UnexpectedArgument = Unexpected argument type: '{0}'. SourceNotFound = Source '{0}' not found. Please make sure you register it. CallingFunction = Calling function '{0}'. PropertyTypeInvalidForDesiredValues = Property 'DesiredValues' must be either a [System.Collections.Hashtable], [CimInstance] or [PSBoundParametersDictionary]. The type detected was {0}. PropertyTypeInvalidForValuesToCheck = If 'DesiredValues' is a CimInstance, then property 'ValuesToCheck' must contain a value. PropertyValidationError = Expected to find an array value for property {0} in the current values, but it was either not present or was null. This has caused the test method to return false. PropertiesDoesNotMatch = Found an array for property {0} in the current values, but this array does not match the desired state. Details of the changes are below. PropertyThatDoesNotMatch = {0} - {1} ValueOfTypeDoesNotMatch = {0} value for property {1} does not match. Current state is '{2}' and desired state is '{3}'. UnableToCompareProperty = Unable to compare property {0} as the type {1} is not handled by the Test-SQLDSCParameterState cmdlet. ###PSLOC '@ # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIoCdfhdi5Cjss # ngqx6qsfpPMDALYWOvgm/jaEU9DaSKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEbTTZW1RXZZDCAMvCbdAXkp # ZIMZ0d5LRefvFGsW4itYMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAxlIJEd/4ywEjLzBQjZtm0ReuzLg8gjy9UtilR4ciXo6LNoDEZIS6/YTv # OX+jm0zRRyAtstC5MW9qSIjqU+d64B0kBWbW43bQI95olJ98X02oHnRO6Q+oQGT/ # bT+bIm0o0slFFdfKE70ACnkdSpEEf5Ik+u/VLbfqGM6B4jHib1V5bNXTfrfJsT3w # 2+1KN/DmUFRF6qqTpzLkvkrRfIUCe9ywf2JADw1tR/HjLa7ZgiLuw0ai50pyf0EU # rGyDAqTyfYUKtOdJlWSdDPhF6xYTf81l48Ikbq+Ir+oFaq37Jhpaiv+I1QuFutLr # EI704JUUPHJALdD0Oix45jNsO6K71KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB/pRajXaNW3lEaGvn3yHdA3xmbojPK+p/idElQP1YJRAIGZdXka4Yi # GBMyMDI0MDIyNjAzMDQxMy45MzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA # 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf # 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq # bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw # h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgkRJdZ8nbDduYQPn7AvPBxymZ7HpLO1mr87FNBmm/cQUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X # MA0GCSqGSIb3DQEBCwUABIICAICXEEy9uzMosdxkoqnUnT4Y5krSWPZuPpLXJfQC # bbgEa+XPrL639/Fk5/FXz6pgQb2uSvchO/ZPzigWxDJKT7auu0N7w0weg2J9HpfF # kcx4Sb4S+9PJTTTBDc7reT5x5OEQAheeBtMgg+zEyJUkhTMtCYJhG0NGcGIwazym # Amxv4l6i/e1dTm4E0yj7pz+Gc8slNR0tZldIqy7pYTaRA1RJwkfBEn6aeHoj5mI+ # WPgHyf8XPxDO2PIHoQKjGWRkebYzrQjC9Q9eEqiFSTrfEIxnF615CzfBDB++nI3B # K4cwDUP/jEVyUQKeNy81vAN62lxBxSk/A8MsdxSox/eNWhbAKQAE6acgV7uRKR8p # aIZwq+n4OkZrwgZT5fEDbVWbpZVLZymccCBqqX06yLVeZrDQcZ4F/GQuUpdNYeZ/ # Kkd/9gMbHC0NUgSJBOlMUHE+VWjkQjoYBZnoGktMlPfHllIo6ja9+S4f+5jvmZDI # cOYq0vXzIkhoabbosXLPA7dIWnoD3BTAcV3fqk+5y5NG+kGT6jvFcmvwDzDRtnzU # tgeR2wNzTgi+WfILfCZP3mwLorklHNgPvbJmqxKWq6MscD9Ak5ADk4CFngqGfpcs # RFyAkPv21sKuv5Kvm5eG9dsS8da1sit5XLg6D6Fio8XH6ygzuIZT0hPYHni/Mgmh # MBvh # SIG # End signature block
combined_dataset/train/non-malicious/1610.ps1
1610.ps1
$a1 = New-Object System.Collections.ArrayList $a2 = New-Object System.Collections.ArrayList $a3 = New-Object System.Collections.ArrayList 1..10 | % { [void]$a1.add((Measure-Command { @(dir C:\temp -Recurse).where{$_.basename} }).ticks) [void]$a2.add((Measure-Command { dir C:\temp -Recurse | ? basename }).ticks) [void]$a3.add((Measure-Command { dir C:\temp -Recurse | ? {$_.basename} }).ticks) } $a1 | measure -Sum | % {$_.sum} $a2 | measure -Sum | % {$_.sum} $a3 | measure -Sum | % {$_.sum}
combined_dataset/train/non-malicious/sample_40_78.ps1
sample_40_78.ps1
# Localized 05/08/2024 05:10 AM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Sí PromptNoString=&No BundleFound=Agrupación encontrada: {0} PackageFound=Paquete encontrado: {0} EncryptedBundleFound=Se ha encontrado un conjunto cifrado: {0} EncryptedPackageFound=Se ha encontrado un paquete cifrado: {0} CertificateFound=Certificado encontrado: {0} DependenciesFound=Paquetes de dependencia encontrados: GettingDeveloperLicense=Adquiriendo licencia de desarrollador... InstallingCertificate=Instalando certificado... InstallingPackage=\nInstalando la aplicación... AcquireLicenseSuccessful=Se ha adquirido correctamente una licencia de desarrollador. InstallCertificateSuccessful=El certificado se ha instalado correctamente. Success=\nCorrecto: la aplicación se instaló correctamente. WarningInstallCert=\nEstá a punto de instalar un certificado digital en el almacén de certificados de personas de confianza de su equipo. Esta operación entraña un riesgo de seguridad importante, por lo que solo deberá realizarla si confía en el emisor de este certificado digital.\n\nCuando termine de usar la aplicación, deberá quitar manualmente el certificado digital asociado. Aquí encontrará instrucciones para realizar esta operación: http://go.microsoft.com/fwlink/?LinkId=243053\n\n¿Está seguro de que desea continuar?\n\n ElevateActions=\nAntes de instalar esta aplicación, es necesario realizar lo siguiente: ElevateActionDevLicense=\t- Adquiera una licencia de desarrollador ElevateActionCertificate=\t- Instale el certificado de firma ElevateActionsContinue=Se requieren credenciales de administrador para continuar. Acepte la solicitud de UAC e indique su contraseña de administrador si así se le solicita. ErrorForceElevate=Debe indicar las credenciales de administrador para continuar. Ejecute este script sin el parámetro -Force o desde una ventana PowerShell elevada. ErrorForceDeveloperLicense=La adquisición de una licencia de desarrollador requiere la interacción del usuario. Vuelva a ejecutar el script sin el parámetro -Force. ErrorLaunchAdminFailed=Error: no se puede iniciar un nuevo proceso como administrador. ErrorNoScriptPath=Error: debe iniciar este script desde un archivo. ErrorNoPackageFound=Error: no se encontró ningún paquete o agrupación en el directorio del script. Asegúrese de que el paquete o agrupación que desea instalar se encuentre en el mismo directorio que este script. ErrorManyPackagesFound=Error: se encontró más de un paquete o agrupación en el directorio del script. Asegúrese de que solo el paquete o agrupación que desea instalar se encuentre en el mismo directorio que este script. ErrorPackageUnsigned=Error: el paquete o agrupación no tiene signatura digital o la signatura está dañada. ErrorNoCertificateFound=Error: no se encuentran certificados en el directorio del script. Asegúrese de que el certificado usado para firmar el paquete o agrupación que está instalando se encuentre en el mismo directorio que este script. ErrorManyCertificatesFound=Error: se encontró más de un certificado en el directorio del script. Asegúrese de que solo el certificado usado para firmar el paquete o agrupación que está instalando se encuentre en el mismo directorio que este script. ErrorBadCertificate=Error: el archivo "{0}" no es un certificado digital válido. CertUtil devolvió el código de error {1}. ErrorExpiredCertificate=Error: el certificado de desarrollador "{0}" ha expirado. Una causa posible es que el reloj del sistema no esté establecido en la fecha y la hora correctas. Si la configuración del sistema es correcta, póngase en contacto con el propietario de la aplicación para volver a crear un paquete o agrupación con un certificado válido. ErrorCertificateMismatch=Error: el certificado no coincide con el que se usó para firmar el paquete o agrupación. ErrorCertIsCA=Error: el certificado no puede ser una entidad de certificación. ErrorBannedKeyUsage=Error: el certificado no puede tener el siguiente uso de clave: {0}. El uso de clave no debe estar especificado, o debe ser igual a "DigitalSignature". ErrorBannedEKU=Error: el certificado no puede tener el siguiente uso mejorado de clave: {0}. Solo se permiten los EKU Firma de código y Firma de vigencia. ErrorNoBasicConstraints=Error: no se encuentra la extensión de restricciones básicas del certificado. ErrorNoCodeSigningEku=Error: no se encuentra el uso mejorado de clave de Firma de código. ErrorInstallCertificateCancelled=Error: se canceló la instalación del certificado. ErrorCertUtilInstallFailed=Error: no se puede instalar el certificado. CertUtil devolvió el código de error {0}. ErrorGetDeveloperLicenseFailed=Error: no se puede adquirir una licencia de desarrollador. Para obtener más información, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Error: no se puede instalar el certificado. Estado: {0}. Para obtener más información, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Error: no se puede instalar la aplicación. ErrorAddPackageFailedWithCert=Error: no se puede instalar la aplicación. para garantizar la seguridad, considere desinstalar el certificado de signatura hasta que pueda instalar la aplicación. Encontrará instrucciones al respecto aquí:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/sample_22_12.ps1
sample_22_12.ps1
function Get-WACMOCounters { <# .SYNOPSIS Gets all the Counters for a particular Object for Performance Monitor tool. .DESCRIPTION Gets all the Counters for a particular Object for Performance Monitor tool. .ROLE Readers #> param( [Parameter(Mandatory = $true)] [String] $ObjectName ) $Category = New-Object System.Diagnostics.PerformanceCounterCategory -ArgumentList $ObjectName; $Instances = $Category.GetInstanceNames(); $FirstName = ""; $Counters = @(); if (($Instances.Length -gt 0) -or ($Category.CategoryType -eq "SingleInstance")) { $FirstName = ""; if ($Instances.Length -gt 0) { $FirstName = $Instances[0]; } $RawCounters = $Category.GetCounters($FirstName); foreach ($Counter in $RawCounters) { $c = New-Object -TypeName PSObject; $c | Add-Member -MemberType NoteProperty -Name CategoryName -Value $Counter.CategoryName; $c | Add-Member -MemberType NoteProperty -Name CounterHelp -Value $Counter.CounterHelp; $c | Add-Member -MemberType NoteProperty -Name CounterName -Value $Counter.CounterName; $c | Add-Member -MemberType NoteProperty -Name CounterType -Value $Counter.CounterType.value__; $Counters += $c; } } return $Counters; } ## [END] Get-WACMOCounters ## function Get-WACMOInstances { <# .SYNOPSIS Gets all the Instances for a particular Object for Performance Monitor tool. .DESCRIPTION Gets all the Instances for a particular Object for Performance Monitor tool. .ROLE Readers #> param( [Parameter(Mandatory = $true)] [String] $ObjectName ) $Category = New-Object System.Diagnostics.PerformanceCounterCategory -ArgumentList $ObjectName; $Instances = $Category.GetInstanceNames(); return $Instances; } ## [END] Get-WACMOInstances ## function Get-WACMOObjects { <# .SYNOPSIS Gets all the objects for Performance Monitor tool. .DESCRIPTION Gets all the objects for Performance Monitor tool. .ROLE Readers #> $Objects = [System.Diagnostics.PerformanceCounterCategory]::GetCategories(); $Objects | ForEach-Object { try { $_ | Add-Member -MemberType NoteProperty -Name InstanceCount -Value $_.GetInstanceNames().Length -ErrorAction Ignore; } catch { } } return $Objects; } ## [END] Get-WACMOObjects ## function Get-WACMOPerformanceCounterValues { <# .SYNOPSIS Gets values for all instances and all counters of a particular object for Performance Monitor tool. .DESCRIPTION Gets values for all instances and all counters of a particular object for Performance Monitor tool. .ROLE Readers #> param( [Parameter(Mandatory = $true)] [String] $ObjectName, [Parameter(Mandatory = $true)] [AllowNull()] [AllowEmptyCollection()] [String[]] $Instances, [Parameter(Mandatory = $true)] [AllowNull()] [AllowEmptyCollection()] [String[]] $Counters ) $members = @' public static UInt64 ToUInt64(Int64 value) { unchecked { return (UInt64)value; } } '@; $type = Add-Type -Name "Convert" -Namespace "Helpers" ` -MemberDefinition $members -PassThru -ErrorAction SilentlyContinue; $category = New-Object System.Diagnostics.PerformanceCountercategory -ArgumentList $ObjectName; $categoryData = $category.ReadCategory(); $sb = [System.Text.StringBuilder]::new(); $buf = [byte[]]::new(60); function Write-LongValue ([int]$Offset, [UInt64]$Value) { for($i = 0; $i -lt 8; $i++) { $buf[$Offset + $i] = $Value -band 0xFF; $Value = $Value -shr 8; } } function Write-IntValue ([int]$Offset, [UInt32]$Value) { for($i = 0; $i -lt 4; $i++) { $buf[$Offset + $i] = $Value -band 0xFF; $Value = $Value -shr 8; } } if ($Instances -and ($Instances.Length -gt 0)) { foreach ($Instance in $Instances) { foreach ($Counter in $Counters) { if ($categoryData.Contains($Counter) -and $categoryData[$Counter].Contains($Instance)) { $sample = $categoryData[$Counter][$Instance].Sample; Write-LongValue -Offset 0 -Value ([Helpers.Convert]::ToUInt64($sample.RawValue)); Write-LongValue -Offset 8 -Value ([Helpers.Convert]::ToUInt64($sample.BaseValue)); Write-LongValue -Offset 16 -Value ([Helpers.Convert]::ToUInt64($sample.TimeStamp)); Write-LongValue -Offset 24 -Value ([Helpers.Convert]::ToUInt64($sample.CounterFrequency)); Write-LongValue -Offset 32 -Value ([Helpers.Convert]::ToUInt64($sample.TimeStamp100nSec)); Write-LongValue -Offset 40 -Value ([Helpers.Convert]::ToUInt64($sample.SystemFrequency)); Write-LongValue -Offset 48 -Value ([Helpers.Convert]::ToUInt64($sample.CounterTimeStamp)); Write-IntValue -Offset 56 -Value ([UInt32] $sample.CounterType.value__); } else { # If fail use system frequency to report failure Write-LongValue -Offset 40 -Value 0; } $b64 = [System.Convert]::ToBase64String($buf); [void]$sb.Append($b64); } } } else { foreach ($Counter in $Counters) { if ($categoryData.Contains($Counter) -and $categoryData[$Counter].Contains("systemdiagnosticsperfcounterlibsingleinstance")) { $sample = $categoryData[$Counter]["systemdiagnosticsperfcounterlibsingleinstance"].Sample; Write-LongValue -Offset 0 -Value ([Helpers.Convert]::ToUInt64($sample.RawValue)); Write-LongValue -Offset 8 -Value ([Helpers.Convert]::ToUInt64($sample.BaseValue)); Write-LongValue -Offset 16 -Value ([Helpers.Convert]::ToUInt64($sample.TimeStamp)); Write-LongValue -Offset 24 -Value ([Helpers.Convert]::ToUInt64($sample.CounterFrequency)); Write-LongValue -Offset 32 -Value ([Helpers.Convert]::ToUInt64($sample.TimeStamp100nSec)); Write-LongValue -Offset 40 -Value ([Helpers.Convert]::ToUInt64($sample.SystemFrequency)); Write-LongValue -Offset 48 -Value ([Helpers.Convert]::ToUInt64($sample.CounterTimeStamp)); Write-IntValue -Offset 56 -Value ([UInt32] $sample.CounterType.value__); } else { # If fail use system frequency to report failure Write-LongValue -Offset 40 -Value 0; } $b64 = [System.Convert]::ToBase64String($buf); [void]$sb.Append($b64); } } $sb.ToString(); } ## [END] Get-WACMOPerformanceCounterValues ## function Get-WACMOCimWin32LogicalDisk { <# .SYNOPSIS Gets Win32_LogicalDisk object. .DESCRIPTION Gets Win32_LogicalDisk object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_LogicalDisk } ## [END] Get-WACMOCimWin32LogicalDisk ## function Get-WACMOCimWin32NetworkAdapter { <# .SYNOPSIS Gets Win32_NetworkAdapter object. .DESCRIPTION Gets Win32_NetworkAdapter object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_NetworkAdapter } ## [END] Get-WACMOCimWin32NetworkAdapter ## function Get-WACMOCimWin32PhysicalMemory { <# .SYNOPSIS Gets Win32_PhysicalMemory object. .DESCRIPTION Gets Win32_PhysicalMemory object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_PhysicalMemory } ## [END] Get-WACMOCimWin32PhysicalMemory ## function Get-WACMOCimWin32Processor { <# .SYNOPSIS Gets Win32_Processor object. .DESCRIPTION Gets Win32_Processor object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_Processor } ## [END] Get-WACMOCimWin32Processor ## function Get-WACMOClusterInventory { <# .SYNOPSIS Retrieves the inventory data for a cluster. .DESCRIPTION Retrieves the inventory data for a cluster. .ROLE Readers #> Import-Module CimCmdlets -ErrorAction SilentlyContinue # JEA code requires to pre-import the module (this is slow on failover cluster environment.) Import-Module FailoverClusters -ErrorAction SilentlyContinue Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Get the name of this computer. .DESCRIPTION Get the best available name for this computer. The FQDN is preferred, but when not avaialble the NetBIOS name will be used instead. #> function getComputerName() { $computerSystem = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object Name, DNSHostName if ($computerSystem) { $computerName = $computerSystem.DNSHostName if ($null -eq $computerName) { $computerName = $computerSystem.Name } return $computerName } return $null } <# .SYNOPSIS Are the cluster PowerShell cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell cmdlets installed on this server? #> function getIsClusterCmdletAvailable() { $cmdlet = Get-Command "Get-Cluster" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Get the MSCluster Cluster CIM instance from this server. .DESCRIPTION Get the MSCluster Cluster CIM instance from this server. #> function getClusterCimInstance() { $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { return Get-CimInstance -Namespace root/mscluster MSCluster_Cluster -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object fqdn, S2DEnabled } return $null } <# .SYNOPSIS Determines if the current cluster supports Failover Clusters Time Series Database. .DESCRIPTION Use the existance of the path value of cmdlet Get-StorageHealthSetting to determine if TSDB is supported or not. #> function getClusterPerformanceHistoryPath() { $storageSubsystem = Get-StorageSubSystem clus* -ErrorAction SilentlyContinue $storageHealthSettings = Get-StorageHealthSetting -InputObject $storageSubsystem -Name "System.PerformanceHistory.Path" -ErrorAction SilentlyContinue return $null -ne $storageHealthSettings } <# .SYNOPSIS Get some basic information about the cluster from the cluster. .DESCRIPTION Get the needed cluster properties from the cluster. #> function getClusterInfo() { $returnValues = @{} $returnValues.Fqdn = $null $returnValues.isS2DEnabled = $false $returnValues.isTsdbEnabled = $false $cluster = getClusterCimInstance if ($cluster) { $returnValues.Fqdn = $cluster.fqdn $isS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -eq 1) $returnValues.isS2DEnabled = $isS2dEnabled if ($isS2DEnabled) { $returnValues.isTsdbEnabled = getClusterPerformanceHistoryPath } else { $returnValues.isTsdbEnabled = $false } } return $returnValues } <# .SYNOPSIS Are the cluster PowerShell Health cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell Health cmdlets installed on this server? s#> function getisClusterHealthCmdletAvailable() { $cmdlet = Get-Command -Name "Get-HealthFault" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Are the Britannica (sddc management resources) available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) available on the cluster? #> function getIsBritannicaEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual machine available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual machine available on the cluster? #> function getIsBritannicaVirtualMachineEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualMachine -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual switch available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual switch available on the cluster? #> function getIsBritannicaVirtualSwitchEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualSwitch -ErrorAction SilentlyContinue) } ########################################################################### # main() ########################################################################### $clusterInfo = getClusterInfo $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $clusterInfo.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2DEnabled' -Value $clusterInfo.isS2DEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsTsdbEnabled' -Value $clusterInfo.isTsdbEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsClusterHealthCmdletAvailable' -Value (getIsClusterHealthCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value (getIsBritannicaEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualMachineEnabled' -Value (getIsBritannicaVirtualMachineEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualSwitchEnabled' -Value (getIsBritannicaVirtualSwitchEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsClusterCmdletAvailable' -Value (getIsClusterCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'CurrentClusterNode' -Value (getComputerName) $result } ## [END] Get-WACMOClusterInventory ## function Get-WACMOClusterNodes { <# .SYNOPSIS Retrieves the inventory data for cluster nodes in a particular cluster. .DESCRIPTION Retrieves the inventory data for cluster nodes in a particular cluster. .ROLE Readers #> import-module CimCmdlets # JEA code requires to pre-import the module (this is slow on failover cluster environment.) import-module FailoverClusters -ErrorAction SilentlyContinue ############################################################################### # Constants ############################################################################### Set-Variable -Name LogName -Option Constant -Value "Microsoft-ServerManagementExperience" -ErrorAction SilentlyContinue Set-Variable -Name LogSource -Option Constant -Value "SMEScripts" -ErrorAction SilentlyContinue Set-Variable -Name ScriptName -Option Constant -Value $MyInvocation.ScriptName -ErrorAction SilentlyContinue <# .SYNOPSIS Are the cluster PowerShell cmdlets installed? .DESCRIPTION Use the Get-Command cmdlet to quickly test if the cluster PowerShell cmdlets are installed on this server. #> function getClusterPowerShellSupport() { $cmdletInfo = Get-Command 'Get-ClusterNode' -ErrorAction SilentlyContinue return $cmdletInfo -and $cmdletInfo.Name -eq "Get-ClusterNode" } <# .SYNOPSIS Get the cluster nodes using the cluster CIM provider. .DESCRIPTION When the cluster PowerShell cmdlets are not available fallback to using the cluster CIM provider to get the needed information. #> function getClusterNodeCimInstances() { # Change the WMI property NodeDrainStatus to DrainStatus to match the PS cmdlet output. return Get-CimInstance -Namespace root/mscluster MSCluster_Node -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object @{Name="DrainStatus"; Expression={$_.NodeDrainStatus}}, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Get the cluster nodes using the cluster PowerShell cmdlets. .DESCRIPTION When the cluster PowerShell cmdlets are available use this preferred function. #> function getClusterNodePsInstances() { return Get-ClusterNode -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object DrainStatus, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Use DNS services to get the FQDN of the cluster NetBIOS name. .DESCRIPTION Use DNS services to get the FQDN of the cluster NetBIOS name. .Notes It is encouraged that the caller add their approprate -ErrorAction when calling this function. #> function getClusterNodeFqdn([string]$clusterNodeName) { return ([System.Net.Dns]::GetHostEntry($clusterNodeName)).HostName } <# .SYNOPSIS Writes message to event log as warning. .DESCRIPTION Writes message to event log as warning. #> function writeToEventLog([string]$message) { Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Warning ` -Message $message -ErrorAction SilentlyContinue } <# .SYNOPSIS Get the cluster nodes. .DESCRIPTION When the cluster PowerShell cmdlets are available get the information about the cluster nodes using PowerShell. When the cmdlets are not available use the Cluster CIM provider. #> function getClusterNodes() { $isClusterCmdletAvailable = getClusterPowerShellSupport if ($isClusterCmdletAvailable) { $clusterNodes = getClusterNodePsInstances } else { $clusterNodes = getClusterNodeCimInstances } $clusterNodeMap = @{} foreach ($clusterNode in $clusterNodes) { $clusterNodeName = $clusterNode.Name.ToLower() try { $clusterNodeFqdn = getClusterNodeFqdn $clusterNodeName -ErrorAction SilentlyContinue } catch { $clusterNodeFqdn = $clusterNodeName writeToEventLog "[$ScriptName]: The fqdn for node '$clusterNodeName' could not be obtained. Defaulting to machine name '$clusterNodeName'" } $clusterNodeResult = New-Object PSObject $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FullyQualifiedDomainName' -Value $clusterNodeFqdn $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'Name' -Value $clusterNodeName $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DynamicWeight' -Value $clusterNode.DynamicWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'NodeWeight' -Value $clusterNode.NodeWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FaultDomain' -Value $clusterNode.FaultDomain $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'State' -Value $clusterNode.State $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DrainStatus' -Value $clusterNode.DrainStatus $clusterNodeMap.Add($clusterNodeName, $clusterNodeResult) } return $clusterNodeMap } ########################################################################### # main() ########################################################################### getClusterNodes } ## [END] Get-WACMOClusterNodes ## function Get-WACMODecryptedDataFromNode { <# .SYNOPSIS Gets data after decrypting it on a node. .DESCRIPTION Decrypts data on node using a cached RSAProvider used during encryption within 3 minutes of encryption and returns the decrypted data. This script should be imported or copied directly to other scripts, do not send the returned data as an argument to other scripts. .PARAMETER encryptedData Encrypted data to be decrypted (String). .ROLE Readers #> param ( [Parameter(Mandatory = $true)] [String] $encryptedData ) Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function DecryptDataWithJWKOnNode { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { $rsaProvider = (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value $decryptedBytes = $rsaProvider.Decrypt([Convert]::FromBase64String($encryptedData), [System.Security.Cryptography.RSAEncryptionPadding]::OaepSHA1) return [System.Text.Encoding]::UTF8.GetString($decryptedBytes) } # If you copy this script directly to another, you can get rid of the throw statement and add custom error handling logic such as "Write-Error" throw [System.InvalidOperationException] "Password decryption failed. RSACryptoServiceProvider Instance not found" } } ## [END] Get-WACMODecryptedDataFromNode ## function Get-WACMOEncryptionJWKOnNode { <# .SYNOPSIS Gets encrytion JSON web key from node. .DESCRIPTION Gets encrytion JSON web key from node. .ROLE Readers #> Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function Get-RSAProvider { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { return (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value } $Global:RSA = New-Object System.Security.Cryptography.RSACryptoServiceProvider -ArgumentList 4096 return $RSA } function Get-JsonWebKey { $rsaProvider = Get-RSAProvider $parameters = $rsaProvider.ExportParameters($false) return [PSCustomObject]@{ kty = 'RSA' alg = 'RSA-OAEP' e = [Convert]::ToBase64String($parameters.Exponent) n = [Convert]::ToBase64String($parameters.Modulus).TrimEnd('=').Replace('+', '-').Replace('/', '_') } } $jwk = Get-JsonWebKey ConvertTo-Json $jwk -Compress } ## [END] Get-WACMOEncryptionJWKOnNode ## function Get-WACMOServerInventory { <# .SYNOPSIS Retrieves the inventory data for a server. .DESCRIPTION Retrieves the inventory data for a server. .ROLE Readers #> Set-StrictMode -Version 5.0 Import-Module CimCmdlets Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Converts an arbitrary version string into just 'Major.Minor' .DESCRIPTION To make OS version comparisons we only want to compare the major and minor version. Build number and/os CSD are not interesting. #> function convertOsVersion([string]$osVersion) { [Ref]$parsedVersion = $null if (![Version]::TryParse($osVersion, $parsedVersion)) { return $null } $version = [Version]$parsedVersion.Value return New-Object Version -ArgumentList $version.Major, $version.Minor } <# .SYNOPSIS Determines if CredSSP is enabled for the current server or client. .DESCRIPTION Check the registry value for the CredSSP enabled state. #> function isCredSSPEnabled() { Set-Variable credSSPServicePath -Option Constant -Value "WSMan:\localhost\Service\Auth\CredSSP" Set-Variable credSSPClientPath -Option Constant -Value "WSMan:\localhost\Client\Auth\CredSSP" $credSSPServerEnabled = $false; $credSSPClientEnabled = $false; $credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue if ($credSSPServerService) { $credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value) } $credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue if ($credSSPClientService) { $credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value) } return ($credSSPServerEnabled -or $credSSPClientEnabled) } <# .SYNOPSIS Determines if the Hyper-V role is installed for the current server or client. .DESCRIPTION The Hyper-V role is installed when the VMMS service is available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVRoleInstalled() { $vmmsService = Get-Service -Name "VMMS" -ErrorAction SilentlyContinue return $vmmsService -and $vmmsService.Name -eq "VMMS" } <# .SYNOPSIS Determines if the Hyper-V PowerShell support module is installed for the current server or client. .DESCRIPTION The Hyper-V PowerShell support module is installed when the modules cmdlets are available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVPowerShellSupportInstalled() { # quicker way to find the module existence. it doesn't load the module. return !!(Get-Module -ListAvailable Hyper-V -ErrorAction SilentlyContinue) } <# .SYNOPSIS Determines if Windows Management Framework (WMF) 5.0, or higher, is installed for the current server or client. .DESCRIPTION Windows Admin Center requires WMF 5 so check the registey for WMF version on Windows versions that are less than Windows Server 2016. #> function isWMF5Installed([string] $operatingSystemVersion) { Set-Variable Server2016 -Option Constant -Value (New-Object Version '10.0') # And Windows 10 client SKUs Set-Variable Server2012 -Option Constant -Value (New-Object Version '6.2') $version = convertOsVersion $operatingSystemVersion if (-not $version) { # Since the OS version string is not properly formatted we cannot know the true installed state. return $false } if ($version -ge $Server2016) { # It's okay to assume that 2016 and up comes with WMF 5 or higher installed return $true } else { if ($version -ge $Server2012) { # Windows 2012/2012R2 are supported as long as WMF 5 or higher is installed $registryKey = 'HKLM:\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine' $registryKeyValue = Get-ItemProperty -Path $registryKey -Name PowerShellVersion -ErrorAction SilentlyContinue if ($registryKeyValue -and ($registryKeyValue.PowerShellVersion.Length -ne 0)) { $installedWmfVersion = [Version]$registryKeyValue.PowerShellVersion if ($installedWmfVersion -ge [Version]'5.0') { return $true } } } } return $false } <# .SYNOPSIS Determines if the current usser is a system administrator of the current server or client. .DESCRIPTION Determines if the current usser is a system administrator of the current server or client. #> function isUserAnAdministrator() { return ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") } <# .SYNOPSIS Get some basic information about the Failover Cluster that is running on this server. .DESCRIPTION Create a basic inventory of the Failover Cluster that may be running in this server. #> function getClusterInformation() { $returnValues = @{ } $returnValues.IsS2dEnabled = $false $returnValues.IsCluster = $false $returnValues.ClusterFqdn = $null $returnValues.IsBritannicaEnabled = $false $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { $cluster = Get-CimInstance -Namespace root/MSCluster -ClassName MSCluster_Cluster -ErrorAction SilentlyContinue if ($cluster) { $returnValues.IsCluster = $true $returnValues.ClusterFqdn = $cluster.Fqdn $returnValues.IsS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -gt 0) $returnValues.IsBritannicaEnabled = $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } } return $returnValues } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. #> function getComputerFqdnAndAddress($computerName) { $hostEntry = [System.Net.Dns]::GetHostEntry($computerName) $addressList = @() foreach ($item in $hostEntry.AddressList) { $address = New-Object PSObject $address | Add-Member -MemberType NoteProperty -Name 'IpAddress' -Value $item.ToString() $address | Add-Member -MemberType NoteProperty -Name 'AddressFamily' -Value $item.AddressFamily.ToString() $addressList += $address } $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $hostEntry.HostName $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $addressList return $result } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. #> function getHostFqdnAndAddress($computerSystem) { $computerName = $computerSystem.DNSHostName if (!$computerName) { $computerName = $computerSystem.Name } return getComputerFqdnAndAddress $computerName } <# .SYNOPSIS Are the needed management CIM interfaces available on the current server or client. .DESCRIPTION Check for the presence of the required server management CIM interfaces. #> function getManagementToolsSupportInformation() { $returnValues = @{ } $returnValues.ManagementToolsAvailable = $false $returnValues.ServerManagerAvailable = $false $namespaces = Get-CimInstance -Namespace root/microsoft/windows -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespaces) { $returnValues.ManagementToolsAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ManagementTools" }) $returnValues.ServerManagerAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ServerManager" }) } return $returnValues } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> function isRemoteAppEnabled() { Set-Variable key -Option Constant -Value "HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Terminal Server\\TSAppAllowList" $registryKeyValue = Get-ItemProperty -Path $key -Name fDisabledAllowList -ErrorAction SilentlyContinue if (-not $registryKeyValue) { return $false } return $registryKeyValue.fDisabledAllowList -eq 1 } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> <# c .SYNOPSIS Get the Win32_OperatingSystem information as well as current version information from the registry .DESCRIPTION Get the Win32_OperatingSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. Included in the results are current version information from the registry #> function getOperatingSystemInfo() { $operatingSystemInfo = Get-CimInstance Win32_OperatingSystem | Microsoft.PowerShell.Utility\Select-Object csName, Caption, OperatingSystemSKU, Version, ProductType, OSType, LastBootUpTime, SerialNumber $currentVersion = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | Microsoft.PowerShell.Utility\Select-Object CurrentBuild, UBR, DisplayVersion $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name CurrentBuild -Value $currentVersion.CurrentBuild $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name UpdateBuildRevision -Value $currentVersion.UBR $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name DisplayVersion -Value $currentVersion.DisplayVersion return $operatingSystemInfo } <# .SYNOPSIS Get the Win32_ComputerSystem information .DESCRIPTION Get the Win32_ComputerSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. #> function getComputerSystemInfo() { return Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object TotalPhysicalMemory, DomainRole, Manufacturer, Model, NumberOfLogicalProcessors, Domain, Workgroup, DNSHostName, Name, PartOfDomain, SystemFamily, SystemSKUNumber } <# .SYNOPSIS Get SMBIOS locally from the passed in machineName .DESCRIPTION Get SMBIOS locally from the passed in machine name #> function getSmbiosData($computerSystem) { <# Array of chassis types. The following list of ChassisTypes is copied from the latest DMTF SMBIOS specification. REF: https://www.dmtf.org/sites/default/files/standards/documents/DSP0134_3.1.1.pdf #> $ChassisTypes = @{ 1 = 'Other' 2 = 'Unknown' 3 = 'Desktop' 4 = 'Low Profile Desktop' 5 = 'Pizza Box' 6 = 'Mini Tower' 7 = 'Tower' 8 = 'Portable' 9 = 'Laptop' 10 = 'Notebook' 11 = 'Hand Held' 12 = 'Docking Station' 13 = 'All in One' 14 = 'Sub Notebook' 15 = 'Space-Saving' 16 = 'Lunch Box' 17 = 'Main System Chassis' 18 = 'Expansion Chassis' 19 = 'SubChassis' 20 = 'Bus Expansion Chassis' 21 = 'Peripheral Chassis' 22 = 'Storage Chassis' 23 = 'Rack Mount Chassis' 24 = 'Sealed-Case PC' 25 = 'Multi-system chassis' 26 = 'Compact PCI' 27 = 'Advanced TCA' 28 = 'Blade' 29 = 'Blade Enclosure' 30 = 'Tablet' 31 = 'Convertible' 32 = 'Detachable' 33 = 'IoT Gateway' 34 = 'Embedded PC' 35 = 'Mini PC' 36 = 'Stick PC' } $list = New-Object System.Collections.ArrayList $win32_Bios = Get-CimInstance -class Win32_Bios $obj = New-Object -Type PSObject | Microsoft.PowerShell.Utility\Select-Object SerialNumber, Manufacturer, UUID, BaseBoardProduct, ChassisTypes, Chassis, SystemFamily, SystemSKUNumber, SMBIOSAssetTag $obj.SerialNumber = $win32_Bios.SerialNumber $obj.Manufacturer = $win32_Bios.Manufacturer $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct if ($null -ne $computerSystemProduct) { $obj.UUID = $computerSystemProduct.UUID } $baseboard = Get-CimInstance Win32_BaseBoard if ($null -ne $baseboard) { $obj.BaseBoardProduct = $baseboard.Product } $systemEnclosure = Get-CimInstance Win32_SystemEnclosure if ($null -ne $systemEnclosure) { $obj.SMBIOSAssetTag = $systemEnclosure.SMBIOSAssetTag } $obj.ChassisTypes = Get-CimInstance Win32_SystemEnclosure | Microsoft.PowerShell.Utility\Select-Object -ExpandProperty ChassisTypes $obj.Chassis = New-Object -TypeName 'System.Collections.ArrayList' $obj.ChassisTypes | ForEach-Object -Process { $obj.Chassis.Add($ChassisTypes[[int]$_]) } $obj.SystemFamily = $computerSystem.SystemFamily $obj.SystemSKUNumber = $computerSystem.SystemSKUNumber $list.Add($obj) | Out-Null return $list } <# .SYNOPSIS Get the azure arc status information .DESCRIPTION Get the azure arc status information #> function getAzureArcStatus() { $LogName = "Microsoft-ServerManagementExperience" $LogSource = "SMEScript" $ScriptName = "Get-ServerInventory.ps1 - getAzureArcStatus()" $AzcmagentExecutable = "$env:ProgramFiles\AzureConnectedMachineAgent\azcmagent.exe" Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue $service = Get-Service -Name himds -ErrorVariable Err -ErrorAction SilentlyContinue if (!!$Err) { $Err = "Failed to retrieve HIMDS service. Details: $Err" Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information ` -Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue return "NotInstalled" } elseif ($service.Status -ne "Running") { $Err = "The Azure arc agent is not running. Details: HIMDS service is $($service.Status)" Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information ` -Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue return "Disconnected" } $rawStatus = Invoke-Command { & $AzcmagentExecutable show --json --log-stderr } -ErrorVariable Err 2>$null if (!!$Err) { $Err = "The Azure arc agent failed to communicate. Details: $rawStatus" Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Error ` -Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue return "Disconnected" } if (!$rawStatus) { $Err = "The Azure arc agent is not connected. Details: $rawStatus" Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Information ` -Message "[$ScriptName]: $Err" -ErrorAction SilentlyContinue return "Disconnected" } return ($rawStatus | ConvertFrom-Json -ErrorAction Stop).status } <# .SYNOPSIS Gets an EnforcementMode that describes the system lockdown policy on this computer. .DESCRIPTION By checking the system lockdown policy, we can infer if PowerShell is in ConstrainedLanguage mode as a result of an enforced WDAC policy. Note: $ExecutionContext.SessionState.LanguageMode should not be used within a trusted (by the WDAC policy) script context for this purpose because the language mode returned would potentially not reflect the system-wide lockdown policy/language mode outside of the execution context. #> function getSystemLockdownPolicy() { return [System.Management.Automation.Security.SystemPolicy]::GetSystemLockdownPolicy().ToString() } <# .SYNOPSIS Determines if the operating system is HCI. .DESCRIPTION Using the operating system 'Caption' (which corresponds to the 'ProductName' registry key at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion) to determine if a server OS is HCI. #> function isServerOsHCI([string] $operatingSystemCaption) { return $operatingSystemCaption -eq "Microsoft Azure Stack HCI" } ########################################################################### # main() ########################################################################### $operatingSystem = getOperatingSystemInfo $computerSystem = getComputerSystemInfo $isAdministrator = isUserAnAdministrator $fqdnAndAddress = getHostFqdnAndAddress $computerSystem $hostname = [Environment]::MachineName $netbios = $env:ComputerName $managementToolsInformation = getManagementToolsSupportInformation $isWmfInstalled = isWMF5Installed $operatingSystem.Version $clusterInformation = getClusterInformation -ErrorAction SilentlyContinue $isHyperVPowershellInstalled = isHyperVPowerShellSupportInstalled $isHyperVRoleInstalled = isHyperVRoleInstalled $isCredSSPEnabled = isCredSSPEnabled $isRemoteAppEnabled = isRemoteAppEnabled $smbiosData = getSmbiosData $computerSystem $azureArcStatus = getAzureArcStatus $systemLockdownPolicy = getSystemLockdownPolicy $isHciServer = isServerOsHCI $operatingSystem.Caption $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'IsAdministrator' -Value $isAdministrator $result | Add-Member -MemberType NoteProperty -Name 'OperatingSystem' -Value $operatingSystem $result | Add-Member -MemberType NoteProperty -Name 'ComputerSystem' -Value $computerSystem $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $fqdnAndAddress.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $fqdnAndAddress.AddressList $result | Add-Member -MemberType NoteProperty -Name 'Hostname' -Value $hostname $result | Add-Member -MemberType NoteProperty -Name 'NetBios' -Value $netbios $result | Add-Member -MemberType NoteProperty -Name 'IsManagementToolsAvailable' -Value $managementToolsInformation.ManagementToolsAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsServerManagerAvailable' -Value $managementToolsInformation.ServerManagerAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsWmfInstalled' -Value $isWmfInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCluster' -Value $clusterInformation.IsCluster $result | Add-Member -MemberType NoteProperty -Name 'ClusterFqdn' -Value $clusterInformation.ClusterFqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2dEnabled' -Value $clusterInformation.IsS2dEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value $clusterInformation.IsBritannicaEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVRoleInstalled' -Value $isHyperVRoleInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVPowershellInstalled' -Value $isHyperVPowershellInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCredSSPEnabled' -Value $isCredSSPEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsRemoteAppEnabled' -Value $isRemoteAppEnabled $result | Add-Member -MemberType NoteProperty -Name 'SmbiosData' -Value $smbiosData $result | Add-Member -MemberType NoteProperty -Name 'AzureArcStatus' -Value $azureArcStatus $result | Add-Member -MemberType NoteProperty -Name 'SystemLockdownPolicy' -Value $systemLockdownPolicy $result | Add-Member -MemberType NoteProperty -Name 'IsHciServer' -Value $isHciServer $result } ## [END] Get-WACMOServerInventory ## # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6P8nShx9qoIFB # LR0jMw6e6UV2X+mOJVCcVIbj0pmXJaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM+L # duF2/nnOSYqA1YQPTnh7hV1GbVnd/gHsKiNkfMlZMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEApydUq5YfF29n3UTTWjORqlC94y/d7P1couUt # MH5Df3GI9hgcfGJ1zf/C4A3sjtw3FtzYQPRHyYGo8T3XfFHLJHMXknRCzmDnZ5JS # 9nHNED1Xa0o9EXe8vmtBgMYFvVZ1Qrkr+Xl43RTBQM4UeQbkVmqtnK2Ku5jmo+Lf # 7mY6Sy8mSPu0pPAHTgy7Axa5GE8MLptZPwGwQlq050vmGo8O0bSD11SCTLeDyJvk # NZiZN6NjHjOvmXlBDRXJRLj4dLR7VCIbLn34Hx67mKAtqxy74ePVzaObApgWlLdc # Bu6Ff/YRzpEsjOgJG8QBGKe0y9pOSkcud4bqDeq3qifQak4DNaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB9PVAN+efjSj5OAEM2HVOxD6Ljfn43Hitq # H5AmOhw/PAIGZaAQA/f1GBMyMDI0MDEyOTIwMDYwNy43NjlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdMdMpoXO0AwcwAB # AAAB0zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMjRaFw0yNDAyMDExOTEyMjRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC0jquTN4g1xbhXCc8MV+dO # u8Uqc3KbbaWti5vdsAWM1D4fVSi+4NWgGtP/BVRYrVj2oVnnMy0eazidQOJ4uUsc # BMbPHaMxaNpgbRG9FEQRFncAUptWnI+VPl53PD6MPL0yz8cHC2ZD3weF4w+uMDAG # nL36Bkm0srONXvnM9eNvnG5djopEqiHodWSauRye4uftBR2sTwGHVmxKu0GS4fO8 # 7NgbJ4VGzICRyZXw9+RvvXMG/jhM11H8AWKzKpn0oMGm1MSMeNvLUWb31HSZekx/ # NBEtXvmdo75OV030NHgIXihxYEeSgUIxfbI5OmgMq/VDCQp2r/fy/5NVa3KjCQoN # qmmEM6orAJ2XKjYhEJzop4nWCcJ970U6rXpBPK4XGNKBFhhLa74TM/ysTFIrEXOJ # G1fUuXfcdWb0Ex0FAeTTr6gmmCqreJNejNHffG/VEeF7LNvUquYFRndiCUhgy624 # rW6ptcnQTiRfE0QL/gLF41kA2vZMYzcc16EiYXQQBaF3XAtMduh1dpXqTPPQEO3M # s5/5B/KtjhSspMcPUvRvb35IWN+q+L+zEwiphmnCGFTuyOMqc5QE0ruGN3Mx0Vv6 # x/hcOmaXxrHQGpNKI5Pn79Yk89AclqU2mXHz1ZHWp+KBc3D6VP7L32JlwxhJx3as # a085xv0XPD58MRW1WaGvaQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFNLHIIa4FAD4 # 94z35hvzCmm0415iMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBAYlhYoUQ+4aaQ # 54MFNfE6Ey8v4rWv+LtDRSjMM2X9g4uanA9cU7VitdpIPV/zE6v4AEhe/Vng2UAR # 5qj2SV3sz+fDqN6VLWUZsKR0QR2JYXKnFPRVj16ezZyP7zd5H8IsvscEconeX+aR # HF0xGGM4tDLrS84vj6Rm0bgoWLXWnMTZ5kP4ownGmm0LsmInuu0GKrDZnkeTVmfk # 8gTTy8d1y3P2IYc2UI4iJYXCuSaKCuFeO0wqyscpvhGQSno1XAFK3oaybuD1mSoQ # xT9q77+LAGGQbiSoGlgTjQQayYsQaPcG1Q4QNwONGqkASCZTbzJlnmkHgkWlKSLT # ulOailWIY4hS1EZ+w+sX0BJ9LcM142h51OlXLMoPLpzHAb6x22ipaAJ5Kf3uyFaO # KWw4hnu0zWs+PKPd192ndeK2ogWfaFdfnEvkWDDH2doL+ZA5QBd8Xngs/md3Brnl # l2BkZ/giZE/fKyolriR3aTAWCxFCXKIl/Clu2bbnj9qfVYLpAVQEcPaCfTAf7OZB # lXmluETvq1Y/SNhxC6MJ1QLCnkXSI//iXYpmRKT783QKRgmo/4ztj3uL9Z7xbbGx # ISg+P0HTRX15y4TReBbO2RFNyCj88gOORk+swT1kaKXUfGB4zjg5XulxSby3uLNx # QebE6TE3cAK0+fnY5UpHaEdlw4e7ijCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBSx23cMcNB1IQws/LYkRXa7I5JsKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6WJHnTAi # GA8yMDI0MDEyOTE1NDk0OVoYDzIwMjQwMTMwMTU0OTQ5WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpYkedAgEAMAcCAQACAj0uMAcCAQACAhLCMAoCBQDpY5kdAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAGkpzZTbkNNfnV6Ddes84QeFoB5K # 1Vqku5i/uF8hpFwI8VgWjsF0x756YJmZt7i6wVCwxKBau1GdSWmy/Kn+xASZkQXW # P/Ga9tHyD4/Zw/pGu8xUkSgxif1dmWbmniEP5tDca/RGaPiJpxxthGlvs/MKqMA2 # 11ps0aBJXepVdBn03fsDRTpI6H4LbiNCF5dEI/ItxyJh04UryVjW4yCE3cHpCRPu # Upo5/4ygCFp7Z6pV0I8Xy+i6/bn8QZnrx3IUBGE1kc90r4WAs7fJPqXb9mdbdxvT # p6d+1pX2HLmCohWo0VOzEVdW0Kf+vVYwY0fauxxFk4/1/yfw8nwLU83UrvwxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdMd # MpoXO0AwcwABAAAB0zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCklnvNLJSwRAs4uXIJ2h47W76W # kerV6INcnwoyAGq/MDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIJJm9OrE # 4O5PWA1KaFaztr9uP96rQgEn+tgGtY3xOqr1MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHTHTKaFztAMHMAAQAAAdMwIgQgITOnVSdg # COMYB2NBiZnzAa5nugTYwjx9/ullhXGgHEcwDQYJKoZIhvcNAQELBQAEggIAqtQq # /Vq0ZNMZOCkZWfOrK4pvAAgggMPT+7wHBdSZ3S+SXSWV9wDdRE0DaqeCht40FWX/ # J5RkzwvEE49ZfP/YZMmA+oiT4PF+Ei/Z9meeLR01H2PlbxLLSgsjmIEERnNxo/cb # 6Y17qt/zLdzLwKvt56RxtdbAjRL5MQpxnb3wRHB/28EwJHYjdGoKh6tq7Y7bF390 # E5IZVQxPJbLA6Na763D+GQjxGgzj6P9rS61eza5Lv1CNIgOWZG6gQY5Cr+iDVkWk # rUeHaUf4P6f8TDJE89xCKnCJEoSX0SKQuY1MIoKcavH/UbrWz8u73IPY5LX4g6UB # E2fSIkvgGSCfFCbnOCtWgt2KJ5VHxIiUfQxqnk38B1kp2ghDXbSH/VczJzLGaebq # ANThacC2xnYXnPy78uS1yqDMzFYhy64V9T2SXVYcLFyPQmvzkD7J4zPdNbYUp6Kj # CfxxAYlsmGmOOk2aNWzCDalFC8kT6MNEVty5ujvcbdY9dahn0P/CQMXr9a8VhE1L # 8TtIq3DozLysKKpC+iUNRWILg8YtDCQtolpUgmMScnN+0y1AJb/GygWTPw0jI22/ # GygZxQlGWk5xtU/Iw1Uc6aCcxoU2TOefDRmxs44E7/QKvKvYceRjnZm65l4GFwzZ # ofJ2I8BzkSfCIjDttbO/Xkk5sKoBXIQuQaf/CVY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_29_7.ps1
sample_29_7.ps1
# # Module manifest for module 'OCI.PSModules.Apmtraces' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmtraces.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b8a6f9e5-94d6-4c39-9ded-9767df367b9b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmtraces Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmtraces.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmtracesAggregatedSnapshot', 'Get-OCIApmtracesQuickPicksList', 'Get-OCIApmtracesSpan', 'Get-OCIApmtracesTrace', 'Get-OCIApmtracesTraceSnapshot', 'Invoke-OCIApmtracesQuery' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmtraces' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_42_46.ps1
sample_42_46.ps1
function Stop-AzDataProtectionBackupInstanceProtection { [OutputType('System.Boolean')] [CmdletBinding(PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Description('This operation will stop protection of a backup instance and data will be held forever')] param( [Parameter(ParameterSetName="Stop", Mandatory=$false, HelpMessage='Subscription Id of the backup vault')] [System.String] ${SubscriptionId}, [Parameter(ParameterSetName="Stop", Mandatory, HelpMessage='The name of the resource group where the backup vault is present')] [System.String] ${ResourceGroupName}, [Parameter(ParameterSetName="Stop", Mandatory, HelpMessage='The name of the backup instance')] [System.String] ${BackupInstanceName}, [Parameter(ParameterSetName="Stop", Mandatory, HelpMessage='The name of the backup vault')] [System.String] ${VaultName}, [Parameter(ParameterSetName="StopViaIdentity", Mandatory, HelpMessage='Identity Parameter To construct, see NOTES section for INPUTOBJECT properties and create a hash table.', ValueFromPipeline=$true)] [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.IDataProtectionIdentity] ${InputObject}, [Parameter(Mandatory=$false, HelpMessage='Resource guard operation request in the format similar to <ResourceGuard-ARMID>/dppDisableStopProtectionRequests/default. Use this parameter when the operation is MUA protected.')] [System.String[]] ${ResourceGuardOperationRequest}, [Parameter(Mandatory=$false, HelpMessage='Parameter to authorize operations protected by cross tenant resource guard. Use command (Get-AzAccessToken -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx").Token to fetch authorization token for different tenant.')] [System.String] ${Token}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(HelpMessage='Run the command as a job')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(HelpMessage='Run the command asynchronously')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(HelpMessage='Returns true when the command succeeds')] [System.Management.Automation.SwitchParameter] ${PassThru}, [Parameter(DontShow)] [ValidateNotNull()] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $parameterSetName = $PsCmdlet.ParameterSetName if($parameterSetName -eq "StopViaIdentity"){ $Parameter = [Microsoft.Azure.PowerShell.Cmdlets.DataProtection.Models.Api20240401.StopProtectionRequest]::new() $hasResourceGuardOperationRequest = $PSBoundParameters.Remove("ResourceGuardOperationRequest") if($hasResourceGuardOperationRequest){ $Parameter.ResourceGuardOperationRequest = $ResourceGuardOperationRequest } $null = $PSBoundParameters.Add("Parameter", $Parameter) } if($PSBoundParameters.ContainsKey("Token")) { $null = $PSBoundParameters.Remove("Token") $null = $PSBoundParameters.Add("Token", "Bearer $Token") } Az.DataProtection.Internal\Stop-AzDataProtectionBackupInstanceProtection @PSBoundParameters } } # SIG # Begin signature block # MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA4GleMtGMpUrum # 8/Z9K2Cox5TwEZSM+hSPCOxF376q86CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOTg # l7Ps3FJDICvW85werye5crIhgzyUrBF2SdQuuuNWMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfUhTV0jsOMg+Z+XYMHN/88nnadOFuuuaCvKX # 8T67TshnPiJoTEVEHxWUng+FTwIfxY0Gt+OgaAbvah8fq4louxSUZzP6TtZIriWq # WouD2YbLpTBPG8KM48Wt05n83z+/FdGZmMFhMGtzEYLiEpu8gdHHjCmd6oei1/21 # q3zo2LGRKUpH1jmZqGuwUz8/HYqpLgvn5TLxD4LyHRzpOprygqP/3v4hLseGpDGu # 0lctSW+eZyjYTwVDjc5UVuFT9c6X14vatp70dOaDNWczasBq5hnf6jhq8MVXpClh # 2SS7D6GcHekOIPAyTv73uTNnKo6weHxJLWq2ATMbG9sj/791LqGCF5YwgheSBgor # BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBsmsReKB7fUEwq5FMEwABjqhwL2Pmm5uNJ # dEtNWg+E1QIGZhfd8eu0GBIyMDI0MDQyMzEzMTUxNC42OFowBIACAfSggdGkgc4w # gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT # HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjpBMDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB6+AYbLW27zjtAAEA # AAHrMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIzMTIwNjE4NDUzNFoXDTI1MDMwNTE4NDUzNFowgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBMDAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMEVaCHaVuBXd4mnTWiqJoUG # 5hs1zuFIqaS28nXk2sH8MFuhSjDxY85M/FufuByYg4abAmR35PIXHso6fOvGegHe # G6+/3V9m5S6AiwpOcC+DYFT+d83tnOf0qTWam4nbtLrFQMfih0WJfnUgJwqXoQbh # zEqBwMCKeKFPzGuglZUBMvunxtt+fCxzWmKFmZy8i5gadvVNj22el0KFav0QBG4K # jdOJEaMzYunimJPaUPmGd3dVoZN6k2rJqSmQIZXT5wrxW78eQhl2/L7PkQveiNN0 # Usvm8n0gCiBZ/dcC7d3tKkVpqh6LHR7WrnkAP3hnAM/6LOotp2wFHe3OOrZF+sI0 # v5OaL+NqVG2j8npuHh8+EcROcMLvxPXJ9dRB0a2Yn+60j8A3GLsdXyAA/OJ31NiM # w9tiobzLnHP6Aj9IXKP5oq0cdaYrMRc+21fMBx7EnUQfvBu6JWTewSs8r0wuDVdv # qEzkchYDSMQBmEoTJ3mEfZcyJvNqRunazYQlBZqxBzgMxoXUSxDULOAKUNghgbqt # SG518juTwv0ooIS59FsrmV1Fg0Cp12v/JIl+5m/c9Lf6+0PpfqrUfhQ6aMMp2Ohb # eqzslExmYf1+QWQzNvphLOvp5fUuhibc+s7Ul5rjdJjOUHdPPzg6+5VJXs1yJ1W0 # 2qJl5ZalWN9q9H4mP8k5AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUdJ4FrNZVzG7i # pP07mNPYH6oB6uEwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAIN03y+g93wL5VZk # /f5bztz9Bt1tYrSw631niQQ5aeDsqaH5YPYuc8lMkogRrGeI5y33AyAnzJDLBHxY # eAM69vCp2qwtRozg2t6u0joUj2uGOF5orE02cFnMdksPCWQv28IQN71FzR0ZJV3k # GDcJaSdXe69Vq7XgXnkRJNYgE1pBL0KmjY6nPdxGABhV9osUZsCs1xG9Ja9JRt4j # YgOpHELjEFtGI1D7WodcMI+fSEaxd8v7KcNmdwJ+zM2uWBlPbheCG9PNgwdxeKgt # Vij/YeTKjDp0ju5QslsrEtfzAeGyLCuJcgMKeMtWwbQTltHzZCByx4SHFtTZ3VFU # dxC2RQTtb3PFmpnr+M+ZqiNmBdA7fdePE4dhhVr8Fdwi67xIzM+OMABu6PBNrClr # MsG/33stEHRk5s1yQljJBCkRNJ+U3fqNb7PtH+cbImpFnce1nWVdbV/rMQIB4/71 # 3LqeZwKtVw6ptAdftmvxY9yCEckAAOWbkTE+HnGLW01GT6LoXZr1KlN5Cdlc/nTD # 4mhPEhJCru8GKPaeK0CxItpV4yqg+L41eVNQ1nY121sWvoiKv1kr259rPcXF+8Nm # jfrm8s6jOZA579n6m7i9jnM+a02JUhxCcXLslk6JlUMjlsh3BBFqLaq4conqW1R2 # yLceM2eJ64TvZ9Ph5aHG2ac3kdgIMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj # YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUw # LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB # ATAHBgUrDgMCGgMVAIAGiXW7XDDBiBS1SjAyepi9u6XeoIGDMIGApH4wfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp0izCMCIY # DzIwMjQwNDIzMTI0OTA2WhgPMjAyNDA0MjQxMjQ5MDZaMHcwPQYKKwYBBAGEWQoE # ATEvMC0wCgIFAOnSLMICAQAwCgIBAAICII4CAf8wBwIBAAICEukwCgIFAOnTfkIC # AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK # MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAvCdH74Xh69NHz/2JRUWIKEIA # fmwr4+wbjbNOVcDt+cN2T4zu4QuouVolftFTo9+vEAqTIwI377/Lv2Z8wm/CIMxh # 31U8nqIB4c9zzBupS4CdqbWy5+PcH+lj5qsvSsZJoZMFDgq+XyNNCmlRF4StbkpE # EVw58QsMTCwUtphMP8pbgB+GrLjzwMoNRRuQ63hp19heELUFCcepDNX6yTatpmP9 # yDzS+7KuQhHb0+VwkpV2gfbFnzgMwD97aAkkGfdSc9AA3JrDhvqiNoB0gy3zrvUn # 82bXPTh1w5furqjscowcRywLYQ570DebEELfT5iLBg3WaJQLYT5EpV+JyTPeZDGC # BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 6+AYbLW27zjtAAEAAAHrMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx # DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIO1TRsfv488IONIhKCxbCNOO # 48WMyB3Sy7xazUMSDZBZMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgzrdr # vl9pA+F/xIENO2TYNJSAht2LNezPvqHUl2EsLPgwgZgwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB6zAiBCB2nwmX # WzyIzXiWUqDZIIbXx2pQgZMcRSXZl0CFWE09gzANBgkqhkiG9w0BAQsFAASCAgCn # MU6XNCv0FtpoFyQ9iND2QfTeo+ciYEBYUPXQVk02sYzLzn2z+aaXXYfAVgim+hqX # ErAPSxAxVDMWxmRTt8waG9sJNKe/qHylzoe+l0DWs48/lKP8bmZOHNWmLe5HJiZ8 # F+1e5K/wNAyJBE4/rgRnD3GbJMvUGGgyWMofEIHlE5y96/XRneOo0FsHezsSdvkE # dE0BEFe0EuyIbfVEqJ2sOVtFwfRWBpORrxI4pM36rguwCHABTGQd/tSpHeXSLxGS # KMFvLtQIcAUZjV/hUnuGtv3BvtA2q+bDD03W78HfGz7yTMdDYbv/XgHvg+6D7jmk # LTYKHqnBDm/SdQy5IVhynVIVR3FJxVptu8L55PJmClh+dHzJxY4hh/26V3m496cx # NIivKHOOiOsjKFB2Xt1Ks6vWFYIHauKxlEyUQYU3AxV1FGwQggMqoSNft/5wsYj7 # 1zZaMbqwNqoDl1ZbFhzhE/uczJ4/bd09y+IuLViPIm6A5PClqymOClsYFZ18GIaJ # f8mVt1/NbQd9wEbVkPt++Cw0UVtzP1gfMtIl2DUxTVcDtF+7bla2ajwhH2CEPwQ3 # m+AEEo7IWqlXPkxk9I+DqwWO/GFipT9ofyUkbHjXvmzlQzWidDGX5iY4UIcqR2s5 # xkv2gTC5Ral3ez0rj2tKzc953krY/0Xs2KsfnffUdg== # SIG # End signature block
combined_dataset/train/non-malicious/3479.ps1
3479.ps1
function Test-CreateSqlVirtualMachineGroup { $location = Get-LocationForTest $rg = Create-ResourceGroupForTest $location $groupName = Get-SqlVirtualMachineGroupName $previousErrorActionPreferenceValue = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" try { $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location Assert-NotNull $group Assert-AreEqual $group.Name $groupName Assert-AreEqual $group.ResourceGroupName $rg.ResourceGroupName } finally { Remove-ResourceGroupForTest $rg $ErrorActionPreference = $previousErrorActionPreferenceValue } } function Test-GetSqlVirtualMachineGroup { $location = Get-LocationForTest $rg = Create-ResourceGroupForTest $location $groupName = Get-SqlVirtualMachineGroupName $previousErrorActionPreferenceValue = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" try { $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location $group1 = Get-AzSqlVMGroup -ResourceGroupName $group.ResourceGroupName -Name $groupName Validate-SqlVirtualMachineGroup $group $group1 $group1 = Get-AzSqlVMGroup -ResourceId $group.ResourceId Validate-SqlVirtualMachineGroup $group $group1 $groupList = Get-AzSqlVMGroup -ResourceGroupName $group.ResourceGroupName Assert-True {$group.Name -in $groupList.Name} } finally { Remove-ResourceGroupForTest $rg $ErrorActionPreference = $previousErrorActionPreferenceValue } } function Test-UpdateSqlVirtualMachineGroup { $location = Get-LocationForTest $rg = Create-ResourceGroupForTest $location $groupName = Get-SqlVirtualMachineGroupName $previousErrorActionPreferenceValue = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" try { $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location Assert-NotNull $group $key = 'key' $value = 'value' $tags = @{$key=$value} $group1 = Update-AzSqlVMGroup -InputObject $group -Tag $tags $group1 = Get-AzSqlVMGroup -ResourceGroupName $rg.ResourceGroupName -Name $groupName Validate-SqlVirtualMachineGroup $group $group1 Assert-NotNull $group1.Tags Assert-AreEqual $group1.Tags.count 1 Assert-AreEqual $group1.Tags[$key] $value } finally { Remove-ResourceGroupForTest $rg $ErrorActionPreference = $previousErrorActionPreferenceValue } } function Test-RemoveSqlVirtualMachineGroup { $location = Get-LocationForTest $rg = Create-ResourceGroupForTest $location $groupName = Get-SqlVirtualMachineGroupName $previousErrorActionPreferenceValue = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" try { $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location Remove-AzSqlVMGroup -ResourceGroupName $group.ResourceGroupName -Name $group.Name $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location Remove-AzSqlVMGroup -ResourceId $group.ResourceId $group = Create-SqlVMGroup $rg.ResourceGroupName $groupName $location Remove-AzSqlVMGroup -InputObject $group $groupList = Get-AzSqlVMGroup -ResourceGroupName $group.ResourceGroupName Assert-False {$group.Name -in $groupList.Name} } finally { Remove-ResourceGroupForTest $rg $ErrorActionPreference = $previousErrorActionPreferenceValue } }
combined_dataset/train/non-malicious/1134.ps1
1134.ps1
$tempDir = $null $identity = $null $dirPath = $null $filePath = $null $tempKeyPath = $null $keyPath = $null $childKeyPath = $null $privateKeyPath = Join-Path -Path $PSScriptRoot -ChildPath '..\Cryptography\CarbonTestPrivateKey.pfx' -Resolve function Start-TestFixture { & (Join-Path -Path $TestDir -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) $script:identity = $CarbonTestUser.UserName $tempDir = New-TempDirectoryTree -Prefix 'Carbon-Test-TestPermission' @' + Directory * File '@ $dirPath = Join-Path -Path $tempDir -ChildPath 'Directory' $filePath = Join-Path -Path $dirPath -ChildPath 'File' Grant-Permission -Identity $identity -Permission ReadAndExecute -Path $dirPath -ApplyTo 'ChildLeaves' $tempKeyPath = 'hkcu:\Software\Carbon\Test' $keyPath = Join-Path -Path $tempKeyPath -ChildPath 'Test-Permission' Install-RegistryKey -Path $keyPath $childKeyPath = Join-Path -Path $keyPath -ChildPath 'ChildKey' Grant-Permission -Identity $identity -Permission 'ReadKey','WriteKey' -Path $keyPath -ApplyTo 'ChildLeaves' } function Stop-TestFixture { Remove-Item -Path $tempDir -Recurse Remove-Item -Path $tempKeyPath -Recurse } function Test-ShouldHandleNonExistentPath { $Error.Clear() Assert-Null (Test-Permission -path 'C:\I\Do\Not\Exist' -Identity $identity -Permission 'FullControl' -ErrorAction SilentlyContinue) Assert-Equal 2 $Error.Count } function Test-ShouldCheckUngrantedPermissionOnFileSystem { Assert-False (Test-Permission -Path $dirPath -Identity $identity -Permission 'Write') } function Test-ShouldCheckGrantedPermissionOnFileSystem { Assert-True (Test-Permission -Path $dirPath -Identity $identity -Permission 'Read') } function Test-ShouldCheckExactPartialPermissionOnFileSystem { Assert-False (Test-Permission -Path $dirPath -Identity $identity -Permission 'Read' -Exact) } function Test-ShouldCheckExactPermissionOnFileSystem { Assert-True (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -Exact) } function Test-ShouldExcludeInheritedPermission { Assert-False (Test-Permission -Path $filePath -Identity $identity -Permission 'ReadAndExecute') } function Test-ShouldIncludeInheritedPermission { Assert-True (Test-Permission -Path $filePath -Identity $identity -Permission 'ReadAndExecute' -Inherited) } function Test-ShouldExcludeInheritedPartialPermission { Assert-False (Test-Permission -Path $filePath -Identity $identity -Permission 'ReadAndExecute' -Exact) } function Test-ShouldIncludeInheritedExactPermission { Assert-True (Test-Permission -Path $filePath -Identity $identity -Permission 'ReadAndExecute' -Inherited -Exact) } function Test-ShouldIgnoreInheritanceAndPropagationFlagsOnFile { $warning = @() Assert-True (Test-Permission -Path $filePath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo SubContainers -Inherited -WarningVariable 'warning' -WarningAction SilentlyContinue) Assert-NotNull $warning Assert-Like $warning[0] 'Can''t test inheritance/propagation rules on a leaf.*' } function Test-ShouldCheckUngrantedPermissionOnRegistry { Assert-False (Test-Permission -Path $keyPath -Identity $identity -Permission 'Delete') } function Test-ShouldCheckGrantedPermissionOnRegistry { Assert-True (Test-Permission -Path $keyPath -Identity $identity -Permission 'ReadKey') } function Test-ShouldCheckExactPartialPermissionOnRegistry { Assert-False (Test-Permission -Path $keyPath -Identity $identity -Permission 'ReadKey' -Exact) } function Test-ShouldCheckExactPermissionOnRegistry { Assert-True (Test-Permission -Path $keyPath -Identity $identity -Permission 'ReadKey','WriteKey' -Exact) } function Test-ShouldCheckUngrantedInheritanceFlags { Assert-False (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo ContainerAndSubContainersAndLeaves ) } function Test-ShouldCheckGrantedInheritanceFlags { Assert-True (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo ContainerAndLeaves) Assert-True (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo ChildLeaves ) } function Test-ShouldCheckExactUngrantedInheritanceFlags { Assert-False (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo ContainerAndLeaves -Exact) } function Test-ShouldCheckExactGrantedInheritanceFlags { Assert-True (Test-Permission -Path $dirPath -Identity $identity -Permission 'ReadAndExecute' -ApplyTo ChildLeaves -Exact) } function Test-ShouldCheckPermissionOnPrivateKey { $cert = Install-Certificate -Path $privateKeyPath -StoreLocation LocalMachine -StoreName My try { $certPath = Join-Path -Path 'cert:\LocalMachine\My' -ChildPath $cert.Thumbprint Grant-Permission -Path $certPath -Identity $identity -Permission 'GenericAll' Assert-True (Test-Permission -Path $certPath -Identity $identity -Permission 'GenericRead') Assert-False (Test-Permission -Path $certPath -Identity $identity -Permission 'GenericRead' -Exact) Assert-True (Test-Permission -Path $certPath -Identity $identity -Permission 'GenericAll','GenericRead' -Exact) } finally { Uninstall-Certificate -Thumbprint $cert.Thumbprint -StoreLocation LocalMachine -StoreName My } } function Test-ShouldCheckPermissionOnPublicKey { $cert = Get-ChildItem 'cert:\*\*' -Recurse | Where-Object { -not $_.HasPrivateKey } | Select-Object -First 1 Assert-NotNull $cert $certPath = Join-Path -Path 'cert:\' -ChildPath (Split-Path -NoQualifier -Path $cert.PSPath) Assert-True (Test-Permission -Path $certPath -Identity $identity -Permission 'FullControl') Assert-True (Test-Permission -Path $certPath -Identity $identity -Permission 'FullControl' -Exact) }
combined_dataset/train/non-malicious/Get-UserLogonLogoffScrip.ps1
Get-UserLogonLogoffScrip.ps1
##############################################################################\n##\n## Get-UserLogonLogoffScript\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nGet the logon or logoff scripts assigned to a specific user\n\n.EXAMPLE\n\nGet-UserLogonLogoffScript LEE-DESK\\LEE Logon\nGets all logon scripts for the user 'LEE-DESK\\Lee'\n\n#>\n\nparam(\n ## The username to examine\n [Parameter(Mandatory = $true)]\n $Username,\n\n [Parameter(Mandatory = $true)]\n [ValidateSet("Logon","Logoff")]\n $ScriptType\n)\n\nSet-StrictMode -Version Latest\n\n## Find the SID for the username\n$account = New-Object System.Security.Principal.NTAccount $username\n$sid =\n $account.Translate([System.Security.Principal.SecurityIdentifier]).Value\n\n## Map that to their group policy scripts\n$registryKey = "HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\" +\n "Group Policy\\State\\$sid\\Scripts"\n\nif(-not (Test-Path $registryKey))\n{\n return\n}\n\n## Go through each of the policies in the specified key\nforeach($policy in Get-ChildItem $registryKey\\$scriptType)\n{\n ## For each of the scripts in that policy, get its script name\n ## and parameters\n foreach($script in Get-ChildItem $policy.PsPath)\n {\n Get-ItemProperty $script.PsPath | Select Script,Parameters\n }\n}
combined_dataset/train/non-malicious/sample_25_15.ps1
sample_25_15.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\semver@7.5.4\node_modules\semver\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\semver@7.5.4\node_modules\semver\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\semver@7.5.4\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/semver@7.5.4/node_modules/semver/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/semver@7.5.4/node_modules/semver/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/semver@7.5.4/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../bin/semver.js" $args } else { & "$basedir/node$exe" "$basedir/../../bin/semver.js" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../bin/semver.js" $args } else { & "node$exe" "$basedir/../../bin/semver.js" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_11_87.ps1
sample_11_87.ps1
# # Module manifest for module 'OCI.PSModules.Jmsjavadownloads' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jmsjavadownloads.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a83f9369-1d29-4c1c-8c1d-33e3f88d0bf3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jmsjavadownloads Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jmsjavadownloads.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIJmsjavadownloadsJavaDownloadRecordsList', 'Get-OCIJmsjavadownloadsJavaDownloadReport', 'Get-OCIJmsjavadownloadsJavaDownloadReportContent', 'Get-OCIJmsjavadownloadsJavaDownloadReportsList', 'Get-OCIJmsjavadownloadsJavaDownloadToken', 'Get-OCIJmsjavadownloadsJavaDownloadTokensList', 'Get-OCIJmsjavadownloadsJavaLicense', 'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Get-OCIJmsjavadownloadsJavaLicenseAcceptanceRecordsList', 'Get-OCIJmsjavadownloadsJavaLicensesList', 'Get-OCIJmsjavadownloadsWorkRequest', 'Get-OCIJmsjavadownloadsWorkRequestErrorsList', 'Get-OCIJmsjavadownloadsWorkRequestLogsList', 'Get-OCIJmsjavadownloadsWorkRequestsList', 'Invoke-OCIJmsjavadownloadsRequestSummarizedJavaDownloadCounts', 'New-OCIJmsjavadownloadsArtifactDownloadUrl', 'New-OCIJmsjavadownloadsJavaDownloadReport', 'New-OCIJmsjavadownloadsJavaDownloadToken', 'New-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Remove-OCIJmsjavadownloadsJavaDownloadReport', 'Remove-OCIJmsjavadownloadsJavaDownloadToken', 'Remove-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord', 'Stop-OCIJmsjavadownloadsWorkRequest', 'Update-OCIJmsjavadownloadsJavaDownloadToken', 'Update-OCIJmsjavadownloadsJavaLicenseAcceptanceRecord' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jmsjavadownloads' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1601.ps1
1601.ps1
function Get-SNMPData { param ( [string]$ip ) begin { $ping = New-Object System.Net.NetworkInformation.Ping $snmp = New-Object -ComObject olePrn.OleSNMP } process { $info = [pscustomobject]@{ IP = $ip Name = '' Description = '' Addresses = '' Online = $false } if ($ping.Send($ip).Status -eq 'Success') { $info.Online = $true $snmp.Open($ip, 'public', 2, 3000) try { $info.Name = $snmp.Get('.1.3.6.1.2.1.1.5.0') $info.Description = $snmp.Get('.1.3.6.1.2.1.1.1.0') $info.Addresses = ($snmp.Gettree('.1.3.6.1.2.1.4.20.1.1') | ? {$_ -match '(?:[^\.]{1,3}\.){3}[^\.]{1,3}$' -and $_ -notmatch '127\.0\.0\.1'} | % {$i = $_.split('.'); "$($i[-4]).$($i[-3]).$($i[-2]).$($i[-1])"}) -join ';' } catch {} } Write-Output $info } }
combined_dataset/train/non-malicious/1384.ps1
1384.ps1
function Uninstall-CCertificate { [CmdletBinding(SupportsShouldProcess=$true,DefaultParameterSetName='ByThumbprint')] param( [Parameter(Mandatory=$true,ParameterSetName='ByThumbprint',ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true)] [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndCustomStoreName')] [string] $Thumbprint, [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndCustomStoreName')] [Security.Cryptography.X509Certificates.X509Certificate2] $Certificate, [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndCustomStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndCustomStoreName')] [Security.Cryptography.X509Certificates.StoreLocation] $StoreLocation, [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndStoreName')] [Security.Cryptography.X509Certificates.StoreName] $StoreName, [Parameter(Mandatory=$true,ParameterSetName='ByThumbprintAndCustomStoreName')] [Parameter(Mandatory=$true,ParameterSetName='ByCertificateAndCustomStoreName')] [string] $CustomStoreName, [Parameter(ParameterSetName='ByThumbprintAndStoreName')] [Parameter(ParameterSetName='ByThumbprintAndCustomStoreName')] [Parameter(ParameterSetName='ByCertificateAndStoreName')] [Parameter(ParameterSetName='ByCertificateAndCustomStoreName')] [Management.Automation.Runspaces.PSSession[]] $Session ) process { Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $PSCmdlet.ParameterSetName -like 'ByCertificate*' ) { $Thumbprint = $Certificate.Thumbprint } $invokeCommandParameters = @{} if( $Session ) { $invokeCommandParameters['Session'] = $Session } if( $PSCmdlet.ParameterSetName -eq 'ByThumbprint' ) { Get-ChildItem -Path 'Cert:\LocalMachine','Cert:\CurrentUser' -Recurse | Where-Object { -not $_.PsIsContainer } | Where-Object { $_.Thumbprint -eq $Thumbprint } | ForEach-Object { $cert = $_ $description = $cert.FriendlyName if( -not $description ) { $description = $cert.Subject } $certPath = $_.PSPath | Split-Path -NoQualifier Write-Verbose ('Uninstalling certificate ''{0}'' ({1}) at {2}.' -f $description,$cert.Thumbprint,$certPath) $_ } | Remove-Item return } Invoke-Command @invokeCommandParameters -ScriptBlock { [CmdletBinding()] param( [string] $Thumbprint, [Security.Cryptography.X509Certificates.StoreLocation] $StoreLocation, $StoreName, [string] $CustomStoreName ) Set-StrictMode -Version 'Latest' if( $CustomStoreName ) { $storeNamePath = $CustomStoreName } else { $storeNamePath = $StoreName if( $StoreName -eq [Security.Cryptography.X509Certificates.StoreName]::CertificateAuthority ) { $storeNamePath = 'CA' } } $certPath = Join-Path -Path 'Cert:\' -ChildPath $StoreLocation $certPath = Join-Path -Path $certPath -ChildPath $storeNamePath $certPath = Join-Path -Path $certPath -ChildPath $Thumbprint if( -not (Test-Path -Path $certPath -PathType Leaf) ) { Write-Debug -Message ('Certificate {0} not found.' -f $certPath) return } $cert = Get-Item -Path $certPath if( $CustomStoreName ) { $store = New-Object 'Security.Cryptography.X509Certificates.X509Store' $CustomStoreName,$StoreLocation } else { $store = New-Object 'Security.Cryptography.X509Certificates.X509Store' ([Security.Cryptography.X509Certificates.StoreName]$StoreName),$StoreLocation } $store.Open( ([Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) ) try { $target = $cert.FriendlyName if( -not $target ) { $target = $cert.Subject } if( $PSCmdlet.ShouldProcess( ("certificate {0} ({1})" -f $certPath,$target), "remove" ) ) { Write-Verbose ('Uninstalling certificate ''{0}'' ({1}) at {2}.' -f $target,$cert.Thumbprint,$certPath) $store.Remove( $cert ) } } finally { $store.Close() } } -ArgumentList $Thumbprint,$StoreLocation,$StoreName,$CustomStoreName } } Set-Alias -Name 'Remove-Certificate' -Value 'Uninstall-CCertificate'
combined_dataset/train/non-malicious/sample_0_38.ps1
sample_0_38.ps1
if($debug -eq $true){[void]$shell.popup("Run DC_FCInfo.ps1")} if ($OSArchitecture -eq 'ARM') { 'Skipping running {fcinfo.exe} since it is not supported in ' + $OSArchitecture + ' architecture.' | WriteTo-StdOut return } Import-LocalizedData -BindingVariable FCInfoStrings Write-DiagProgress -Activity $FCInfoStrings.ID_FCInfo -Status $FCInfoStrings.ID_FCInfoRunning #Rename binaries to the current processor architecture #$ProcArc = $Env:PROCESSOR_ARCHITECTURE #_# Rename-Item -Path "fcinfo_$ProcArc.exe" -NewName "fcinfo.exe" #_# Rename-Item -Path "hbaapi_$ProcArc.dll" -NewName "hbaapi.dll" #_# Rename-Item -Path "hbatapi_$ProcArc.dll" -NewName "hbatapi.dll" $fileDescription = $FCInfoStrings.ID_FCInfoOutput $sectionDescription = $FCInfoStrings.ID_FCInfoOutputDesc $OutputFile = $ComputerName + "_FCInfo.txt" $CommandToExecute = "cmd.exe /c fcinfo.exe /diag > $OutputFile" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription -BackgroundExecution # SIG # Begin signature block # MIIoRQYJKoZIhvcNAQcCoIIoNjCCKDICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBSnEgqSvdLK/hK # 8ET1rbhZEVm0Didls6ZioUSSvv2eoKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDKTq2/1Kokzbu9lrBlPfitU # v02ruA5YO6/lqt3dHiKDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEu/ij/hkwl2Ry9+hQHV+8+97V7+NrGnRgaBKpS+ovUCwKaWCfEUgLkW8 # +cj+EZk/E1s7DFXInD/kWCyawLB0ydXenYUB+wi0h8w6nPp/tbkp94s4gMe8qGO2 # FuRUTDQp/lBQVKOwqHGafr2PwSnEbZw9PYrdDRFwfylFJW4LtaiD5jKrjSNmJl+9 # uhmTs1SntWiwDNe4Pp5K9Z2hUME0wjiOCJ/u787KA0lZs1Xtd1zL6akWVAzLyllQ # 5elXGWKLvdR9Au5og+Obl3DmVKi0cDu4NFltYlo1BcbfU9hwW+e7xkHAC651J+Mh # i1t2KZKEdx9VjzcppqR6tmne0auUFaGCF68wgherBgorBgEEAYI3AwMBMYIXmzCC # F5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCQRJGXp5I/82xIobqxTl3GIEXHjG7ZoCpM+YfhCt1ClAIGZuto66Jt # GBIyMDI0MTAyODExNDA0My4zM1owBIACAfSggdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjQw # NzI1MTgzMTEzWhcNMjUxMDIyMTgzMTEzWjCB0zELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NTcxQS0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCowlZB5YCrgvC9KNiyM/RS # +G+bSPRoA4mIwuDSwt/EqhNcB0oPqgy6rmsXmgSI7FX72jHQf3lDx+GhmrfH2XGC # 5nJM4riXbG1yC0kK2NdGWUzZtOmM6DflFSsHLRwCWgFT0YkGzssE2txsfqsGI6+o # NA2Jw9FnCrXrHKMyJ1TUnUAm5q33Iufu1qJ+gPnxuVgRwG+SPl0fWVr3NTzjpAN4 # 6hE7o1yocuwPHz/NUpnE/fSZbpjtEyyq0HxwYKAbBVW6s6do0tezfWpNFPJUdfym # k52hKKEJd6p5uAkJHMbzMb97+TShoGMUUaX7y4UQvALKHjAr1nn5rNPN9rYYPinq # KG2yRezeWdbTlQp8MmEAAO3q+I5zRGT9zzM6KrOHSUql/95ZRjaj+G9wM9k2Atoe # /J8OpvwBZoq87fqJFlJeqFLDxLEmjRMKmxsKOa3HQukeeptvVQXtyrT2QJx9ZMM9 # w3XaltgupyTRsgh88ptzseeuQ1CSz+ZJtVlOcPJPc7zMX2rgMJ9Z6xKvVqTJwN24 # bEJ0oG+C0mHVjEOrWyRPB5jHmIBZecHsozKWzdZBltO5tMIsu3xefy36yVwqbkOS # +hu5uYdKuK5MDfBPIjLgXFqZMqbRUO72ZZ2zwy2NRIlXA1VWUFdpDdkxxWOKPJWh # Q1W4Fj0xzBhwhArrbBDbQQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFEdVIZhQ1DdH # A6XvXMgC5SMgqDUqMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDDOggo5jZ2dSN9 # a4yIajP+i+hzV7zpXBZpk0V2BGY6hC5F7ict21k421Mc2TdKPeeTIGzPPFJtkRDQ # N27Ioccjk/xXzuMW20aeVHTA8/bYUB5tu8Bu62QwxVAwXOFUFaJYPRUCe73HR+OJ # 8soMBVcvCi6fmsIWrBtqxcVzsf/QM+IL4MGfe1TF5+9zFQLKzj4MLezwJintZZel # nxZv+90GEOWIeYHulZyawHze5zj8/YaYAjccyQ4S7t8JpJihCGi5Y6vTuX8ozhOd # 3KUiKubx/ZbBdBwUTOZS8hIzqW51TAaVU19NMlSrZtMMR3e2UMq1X0BRjeuucXAd # PAmvIu1PggWG+AF80PeYvV55JqQp/vFMgjgnK3XlJeEd3mgj9caNKDKSAmtYDnus # acALuu7f9lsU0Iwr8mPpfxfgvqYE5hrY0YrAfgDftgYOt5wn+pddZRi98tiocZ/x # OFiXXZiDWvBIqlYuiUD8HV6oHDhNFy9VjQi802Lmyb7/8cn0DDo0m5H+4NHtfu8N # eJylcyVE2AUzIANvwAUi9A90epxGlGitj5hQaW/N4nH/aA1jJ7MCiRusWEAKwnYF # /J4vIISjoC7AQefnXU8oTx0rgm+WYtKgePtUVHc0cOTfNGTHQTGSYXxo52m+gqG7 # AELGhn8mFvNLOu9nvgZWMoojK3kUDTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAEcefs0Ia6xnPZF9VvK7BjA/KQFaCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6slPSzAiGA8yMDI0MTAyNzIzNDYxOVoYDzIwMjQxMDI4MjM0NjE5WjB3MD0G # CisGAQQBhFkKBAExLzAtMAoCBQDqyU9LAgEAMAoCAQACAg28AgH/MAcCAQACAhS/ # MAoCBQDqyqDLAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAI # AgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAK337vy04GTc # bsicVY15Ke/6A1/vzbs2h9wJcIistBrzfj5Zk4TpiNVwDwHjNFlZhC3rWvKOw/uc # 7hAr0BPu3DMF75xWGoUI766a230cguj/TZ8G9moaELRoAE0wQoq03mYctzRGrJGN # hV7IkmBbej4C4gCiY158wycyU8VsLN5XH5VZ+jC7ppkYh/bSiVwmvVR3HlPGadh2 # wqNDIMOXoua2XnhNt5YUXpRqLRFEcqoNld6JgrSedrNByEX0uWGdWnACtDXrSW6c # utiysChh2osL5fQHP4+bNKEwe50e9Smb0dJholKMEPD9IFkDdFXLYjQQwbBvrTwS # uKEXA6S1vxQxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAfvLy2w3Z+UwlQABAAAB+zANBglghkgBZQMEAgEFAKCCAUowGgYJ # KoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCZdlG7TnGP # Kkp1g63RQqS35jbgtoIPvHTqiyROwbNBQDCB+gYLKoZIhvcNAQkQAi8xgeowgecw # geQwgb0EIDnbAqv8oIWVU1iJawIuwHiqGMRgQ/fEepioO7VJJOUYMIGYMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAA # AfswIgQg5w4kz3nPWu0tE8iYj0ZwLFwtX+Vc9G+JJzioNGrZl4UwDQYJKoZIhvcN # AQELBQAEggIAV3RqX8hYunFoaWsK4f7tWHhG1Qgo3cWsSiSdtBCwgQw/RoY0Mgcl # F4gvtJmqgfirymiPfyvyD7mtCwzFo6E6Wv2qktrvLUdsBbhiSx/AwOD7ZAc8O1Y6 # hTzfblV5ywQ8g7apbnnvkU98DqoCWZOq5006lW2+xFHZS0fiIs2oB2Ubz4hzL1WM # IVWfYC4XpidkWIgiTLrfL8kLYp0YJA2eEUbFZ32MaCgPobvsVmVkke2zXuMpSVBr # Sbnaky+NK0jKhEr7CUFZNgRXsBVFYlVDvpRxKZGhvhIKhKAr5MoRcccm9qHE9L5P # tfal+bxXVN7eFIdwkBWVf3wCHF+FSHmsn2phECY7vSCDpBILm8hsiiSiUuG3OTo3 # trAO7yyXDaiADHd+aQ1VImvJVvun5hGTYQn4PBZiUFUbOSgLXz8PgSzrQqSAP3sI # bl/lQd63oAQJ8jw6R+1+PpfHLCs7PHDpSfx4UjZgEzHS+KYK76XR+5NxjrfcMecC # EddTw7uWoc31BMg1ndOMsVvo01Xe1a0S7QE+W6V4/NmUMAo4OsB3q1A79JszGHDF # Vzf/4OyzT1Uukq/LA+R2yE8IWKcCj32zOto9C/A2hHS09wZaYYVUieXkPsmQJYQr # ntSX1YUydVbkvLZvdt4gH1yC7jZsFOym758KVUcPouugLWnn0a8j820= # SIG # End signature block
combined_dataset/train/non-malicious/986.ps1
986.ps1
Param( [parameter(Mandatory=$true)] $CsvFilePath ) $ErrorActionPreference = "Stop" $scriptsPath = $PSScriptRoot if ($PSScriptRoot -eq "") { $scriptsPath = "." } . "$scriptsPath\asr_logger.ps1" . "$scriptsPath\asr_common.ps1" . "$scriptsPath\asr_csv_processor.ps1" Function ProcessItemImpl($processor, $csvItem, $reportItem) { $reportItem | Add-Member NoteProperty "UpdatePropertiesJobId" $null $reportItem | Add-Member NoteProperty "ProtectableStatus" $null $reportItem | Add-Member NoteProperty "ProtectionState" $null $reportItem | Add-Member NoteProperty "ProtectionStateDescription" $null $vaultName = $csvItem.VAULT_NAME $sourceMachineName = $csvItem.SOURCE_MACHINE_NAME $sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER $targetAvailabilitySet = $csvItem.AVAILABILITY_SET $targetPrivateIP = $csvItem.PRIVATE_IP $targetSubnet = $csvItem.TARGET_SUBNET $targetMachineSize = $csvItem.MACHINE_SIZE $targetPostFailoverResourceGroup = $csvItem.TARGET_RESOURCE_GROUP $vaultServer = $asrCommon.GetAndEnsureVaultContext($vaultName) $fabricServer = $asrCommon.GetFabricServer($sourceConfigurationServer) $protectionContainer = $asrCommon.GetProtectionContainer($fabricServer) $protectableVM = $asrCommon.GetProtectableItem($protectionContainer, $sourceMachineName) $processor.Logger.LogTrace("ProtectableStatus: '$($protectableVM.ProtectionStatus)'") $reportItem.ProtectableStatus = $protectableVM.ProtectionStatus if ($protectableVM.ReplicationProtectedItemId -ne $null) { $protectedItem = $asrCommon.GetProtectedItem($protectionContainer, $sourceMachineName) $reportItem.ProtectionState = $protectedItem.ProtectionState $reportItem.ProtectionStateDescription = $protectedItem.ProtectionStateDescription $processor.Logger.LogTrace("ProtectionState: '$($protectedItem.ProtectionState)'") $processor.Logger.LogTrace("ProtectionDescription: '$($protectedItem.ProtectionStateDescription)'") if ($protectedItem.ProtectionState -eq 'Protected') { $processor.Logger.LogTrace("Creating job to set machine properties...") $nicDetails = $protectedItem.NicDetailsList[0] if (($targetAvailabilitySet -eq '') -or ($targetAvailabilitySet -eq $null)) { $updatePropertiesJob = Set-AzRecoveryServicesAsrReplicationProtectedItem ` -InputObject $protectedItem ` -PrimaryNic $nicDetails.NicId ` -RecoveryNicStaticIPAddress $targetPrivateIP ` -RecoveryNetworkId $nicdetails.RecoveryVMNetworkId ` -RecoveryNicSubnetName $targetSubnet ` -UseManagedDisk $True ` -Size $targetMachineSize } else { $targetAvailabilitySetObj = Get-AzAvailabilitySet ` -ResourceGroupName $targetPostFailoverResourceGroup ` -Name $targetAvailabilitySet $updatePropertiesJob = Set-AzRecoveryServicesAsrReplicationProtectedItem ` -InputObject $protectedItem ` -PrimaryNic $nicDetails.NicId ` -RecoveryNicStaticIPAddress $targetPrivateIP ` -RecoveryNetworkId $nicdetails.RecoveryVMNetworkId ` -RecoveryNicSubnetName $targetSubnet ` -UseManagedDisk $True ` -RecoveryAvailabilitySet $targetAvailabilitySetObj.Id ` -Size $targetMachineSize } if ($updatePropertiesJob -eq $null) { $processor.Logger.LogErrorAndThrow("Error creating update properties job for '$($sourceMachineName)'") } $reportItem.UpdatePropertiesJobId = $updatePropertiesJob.Name } else { $processor.Logger.LogTrace("Item '$($sourceMachineName)' it is not in a Protected status") } } else { $processor.Logger.LogTrace("'$($sourceMachineName)' item is not in a protected state ready for replication") } } Function ProcessItem($processor, $csvItem, $reportItem) { try { ProcessItemImpl $processor $csvItem $reportItem } catch { $exceptionMessage = $_ | Out-String $processor.Logger.LogError($exceptionMessage) throw } } $logger = New-AsrLoggerInstance -CommandPath $PSCommandPath $asrCommon = New-AsrCommonInstance -Logger $logger $processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem $processor.ProcessFile($CsvFilePath)
combined_dataset/train/non-malicious/sample_49_56.ps1
sample_49_56.ps1
# # Module manifest for module 'OCI.PSModules.Emaildataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Emaildataplane.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cd44400e-be7f-4e12-bd2b-ec9ea86a7a0d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Emaildataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Emaildataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCIEmaildataplaneSubmitEmail' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Emaildataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1070.ps1
1070.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ResolveRelativePathWithExplicitPath { $fileDir = New-TempDir $to = Join-Path $fileDir 'myfile.txt' $from = [System.IO.Path]::GetTempPath() $relativePath = Resolve-RelativePath -Path $to -FromDirectory $from Assert-Equal ".\$([System.IO.Path]::GetFileName($fileDir))\myfile.txt" $relativePath } function Test-ResolveRelativePathFromPipeline { $to = [System.IO.Path]::GetFullPath( (Join-Path $TestDir '..\..\Carbon\Import-Carbon.ps1') ) $relativePath = Get-Item $to | Resolve-RelativePath -FromDirectory $TestDir Assert-Equal '..\..\Carbon\Import-Carbon.ps1' $relativePath } function Test-ResolvesPathPathFromFilePath { $to = [System.IO.Path]::GetFullPath( (Join-Path $TestDir '..\..\Carbon\Import-Carbon.ps1') ) $relativePath = Get-Item $to | Resolve-RelativePath -FromFile $TestScript Assert-Equal '..\..\Carbon\Import-Carbon.ps1' $relativePath } function Test-ResolvesPathForMultiplePaths { Get-ChildItem $env:WinDir | Resolve-RelativePath -FromDirectory (Join-Path $env:WinDir 'System32') | ForEach-Object { Assert-True $_.StartsWith( '..\' ) } } function Test-ResolvesPathFromFile { $relativePath = Resolve-RelativePath -Path 'C:\Bar\Bar\Bar' -FromFile 'C:\Foo\Foo\Foo.txt' Assert-Equal '..\..\Bar\Bar\Bar' $relativePath } function Test-ShouldReturnString { $relativePath = Resolve-RelativePath -Path 'C:\A\B\D\f.txt' -FromDirectory 'C:\A\B\C' Assert-Is $relativePath string Assert-Equal '..\D\F.txt' $relativePath }
combined_dataset/train/non-malicious/sample_22_8.ps1
sample_22_8.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ArcResourceBridge.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ArcResourceBridge.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAJJhOkM0gNa0ba # enMs34S5KZDuN1NdGhw6v0/VEh8SP6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMiQOA1WWm9uwOUMHhYTWNfL # FYVBYnaPNTQyX253WiK8MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEABf8O5o0ad7v2z6aPdY+HMnEg2Noz3NTunIZSynUbA0YE2eItJft15q9L # jQbmV2fu6DHDN4eqqbBAR5hwlVy5LSeOzDSMLaYLZ1oFjjtky/W9TfFFXgBBBnOM # jnpNNUcSF+XXKOvJYN7sDXCs+iX1T7CjWd+SMfUsUAyvtGfOUwKqifbVzrsFNIvc # b144tVRnINY2oXArLGfQAPjBO80FgxZXAKFMAhRaw9W39MiDmVbuOVaWHeigIyl/ # 6EshT6AOWvCt4cIL3vtuS5xrLHhVSO4b0fFTfGJ2C3B9nteiGRWGneuIg/hbsStg # Duy4llUyqx76/NKnXtEpspJkAnwMsKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCKt4EGQOmHNHtf+uf1wBn59Cj19W0drynFWiJCOkMLFwIGZh/SmF8s # GBMyMDI0MDQyMzEzMTUyMi42NzVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA # 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9 # 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i # 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm # CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgq1b7Or038JNnaOGQ6g+O51efRoe7KpunKRZLX2e48PowgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi # MA0GCSqGSIb3DQEBCwUABIICAEkv2HmFj/hEqJ7+40hODyI2IGSsoM4+qeHC/hiO # PnjaAAm58M1GdRKil2vKyz6DaCR3Ne5xrqACMld+67xbK42j6V2geWP5Y6EJBECY # 34vrDohcINkhsNX5GNxzoqbVrIYa5qLb1mj+Kql9P2N1MHg8SnItAZEnq1IbMIuv # Gs/m9HpjCCuro51LTbuQq3sczHd2Wm7dYQJW13KjS+db1A8QyWc0cL/4uwSCFfp0 # EbWfwndZM9908GO9KdREE3p6i2zQPJP4pDSnY9GM7u01ACxwYh+iXzrbzlUpHVz9 # emen9c9PITOJGEIHzE/Lf7pg1vM45mm/wgbcnhDSWW5gLUHyOxO8pSUg/W2bXOhd # H9oTKqBd9vLCoDt3RQaVDPkjJ/KD/fdKDrjQcfGQJ/VExJvcof9lGYCrYPpBiISw # CSatp247fEPskRRuKZsmqqnOD2S3PhwMf8pU1Fr8grJE01dY8EKo/sv4cfpNfNmP # Vss97h6ddr9o8uazCX8K/uUWlkYgaZfZIZgbBeY7TnaYQmg5rcK+Cp8DuxGEDwP9 # FXZIUVVufk+nAct45gUUZvWZQqQ1GUKUhdysbPJzrycCO3zYPamk3R5sCDLNXWiH # VMkvEUhVJ+WtAb6Wum2sXD9eTO+I23PZYDm3J8bqDwhbjABYan+VSdggTALg3ReB # ZECe # SIG # End signature block
combined_dataset/train/non-malicious/1390.ps1
1390.ps1
function Enable-CIisSsl { [CmdletBinding(SupportsShouldProcess=$true,DefaultParameterSetName='IgnoreClientCertificates')] param( [Parameter(Mandatory=$true)] [string] $SiteName, [Alias('Path')] [string] $VirtualPath = '', [Parameter(ParameterSetName='IgnoreClientCertificates')] [Parameter(ParameterSetName='AcceptClientCertificates')] [Parameter(Mandatory=$true,ParameterSetName='RequireClientCertificates')] [Switch] $RequireSsl, [Switch] $Require128BitSsl, [Parameter(ParameterSetName='AcceptClientCertificates')] [Switch] $AcceptClientCertificates, [Parameter(Mandatory=$true,ParameterSetName='RequireClientCertificates')] [Switch] $RequireClientCertificates ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $SslFlags_Ssl = 8 $SslFlags_SslNegotiateCert = 32 $SslFlags_SslRequireCert = 64 $SslFlags_SslMapCert = 128 $SslFlags_Ssl128 = 256 $intFlag = 0 $flags = @() if( $RequireSSL -or $RequireClientCertificates ) { $flags += 'Ssl' $intFlag = $intFlag -bor $SslFlags_Ssl } if( $AcceptClientCertificates -or $RequireClientCertificates ) { $flags += 'SslNegotiateCert' $intFlag = $intFlag -bor $SslFlags_SslNegotiateCert } if( $RequireClientCertificates ) { $flags += 'SslRequireCert' $intFlag = $intFlag -bor $SslFlags_SslRequireCert } if( $Require128BitSsl ) { $flags += 'Ssl128' $intFlag = $intFlag -bor $SslFlags_Ssl128 } $section = Get-CIisConfigurationSection -SiteName $SiteName -VirtualPath $VirtualPath -SectionPath 'system.webServer/security/access' if( -not $section ) { return } $flags = $flags -join ',' $currentIntFlag = $section['sslFlags'] $currentFlags = @( ) if( $currentIntFlag -band $SslFlags_Ssl ) { $currentFlags += 'Ssl' } if( $currentIntFlag -band $SslFlags_SslNegotiateCert ) { $currentFlags += 'SslNegotiateCert' } if( $currentIntFlag -band $SslFlags_SslRequireCert ) { $currentFlags += 'SslRequireCert' } if( $currentIntFlag -band $SslFlags_SslMapCert ) { $currentFlags += 'SslMapCert' } if( $currentIntFlag -band $SslFlags_Ssl128 ) { $currentFlags += 'Ssl128' } if( -not $currentFlags ) { $currentFlags += 'None' } $currentFlags = $currentFlags -join ',' if( $section['sslFlags'] -ne $intFlag ) { Write-IisVerbose $SiteName 'SslFlags' ('{0} ({1})' -f $currentIntFlag,$currentFlags) ('{0} ({1})' -f $intFlag,$flags) -VirtualPath $VirtualPath $section['sslFlags'] = $flags if( $pscmdlet.ShouldProcess( (Join-CIisVirtualPath $SiteName $VirtualPath), "enable SSL" ) ) { $section.CommitChanges() } } }
combined_dataset/train/non-malicious/921.ps1
921.ps1
$resourceGroup = "myResourceGroup" $location = "westeurope" $vmName = "myVM" $cred = Get-Credential -Message "Enter a username and password for the virtual machine." New-AzResourceGroup -Name $resourceGroup -Location $location New-AzVM ` -ResourceGroupName $resourceGroup ` -Name $vmName ` -Location $location ` -ImageName "Win2016Datacenter" ` -VirtualNetworkName "myVnet" ` -SubnetName "mySubnet" ` -SecurityGroupName "myNetworkSecurityGroup" ` -PublicIpAddressName "myPublicIp" ` -Credential $cred ` -OpenPorts 80 $PublicSettings = '{"commandToExecute":"powershell Add-WindowsFeature Web-Server"}' Set-AzVMExtension -ExtensionName "IIS" -ResourceGroupName $resourceGroup -VMName $vmName ` -Publisher "Microsoft.Compute" -ExtensionType "CustomScriptExtension" -TypeHandlerVersion 1.4 ` -SettingString $PublicSettings -Location $location
combined_dataset/train/non-malicious/4331.ps1
4331.ps1
function Get-Hash { [CmdletBinding()] Param ( [string] $locationString ) if(-not $locationString) { return "" } $sha1Object = New-Object System.Security.Cryptography.SHA1Managed $stringHash = $sha1Object.ComputeHash([System.Text.Encoding]::UTF8.GetBytes($locationString)); $stringHashInHex = [System.BitConverter]::ToString($stringHash) if ($stringHashInHex) { return $stringHashInHex.Replace('-', '') } return "" }
combined_dataset/train/non-malicious/sample_14_15.ps1
sample_14_15.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. Microsoft.PowerShell.Utility\Import-LocalizedData -BindingVariable Strings -FileName Strings -ErrorAction Ignore Microsoft.PowerShell.Management\Get-ChildItem -Path $PSScriptRoot\Public\*.ps1 | ForEach-Object { . $PSItem.FullName } Microsoft.PowerShell.Core\Export-ModuleMember -Function *-* # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCxzWVnoLm+Off/ # EuS1SBLlYtZ1Hmypby+DEJ4ZfmaDiKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOy8 # SoXPA3rfUjQPvd8Y5JtxDAc9SiKTWT8bTQ3kP60FMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAb2dS7bZ3WxV8SP0LGnMVscSrNh3VQndQUt4m # WTGbY1BE4bMh2t6v80pPDHYpa0eInUuKPAyt4Kp92HZ+8DarcdDb3jl95MSZDsvk # 8zYj/bb3NYxPCwUp4VoY7U2Tc0RL3rxQZigCT9e7P0Owtpqcq4Y3oeG8ORH+9TSS # oUAXq+6KyD4huvqcPyCdIDr4/RiwdNGd9XIZz43IsACMcAsTcfU+YPHwQP2zERlR # wULB56yWD78RFLC4oiypdQq2yaXpUzguzvqiL9v9fJqb25F7irjla+SrgU8ILGvs # RcQIQDcKBI6e51Eu72NwlPN1MNLaQh47VnbBslfJQxFTx33SdqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCiIcNhBDv2X6FcqLgN+J1xlfZxPReWE4JO # mgR4muO5ggIGZZ/pixEVGBMyMDI0MDEyNjAyMjcxMC44NzVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdB3CKrvoxfG3QAB # AAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fvM0XAUSmI5qiG # 0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw5z6EwxC4CrXU # 9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+9rT1JDdCDHbo # 5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0xN5cNG20xwBwg # ttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2cppEzTjt/fs0x # p4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2guFVHoHeOze7I # sbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BBLY6AjmbgAzDd # Nl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7Nzu1z9L0Wv7TA # Y/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvSKkII4MayzoUd # seT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37UEmYT+oxC/OFX # UGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIiIczzQgYnsLyE # GepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDPhAYWS0oA+ # lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCXh+ckCkZaA06S # NW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqGiilHyIlZ3iNB # UbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vshHrFQuSgwTHZV # pzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5uwwcz5+j8Oj0G # UX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCDTcXgONnnABQH # BfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3hX9Vg0gsRMoH # RuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQiMZ12sQSsQAkN # DTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx+6IIf2L+b7gL # HtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zty3Nc967iGaQj # yYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiFED7ZRKrnwvvX # vMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwgAJNY1iHvH/8v # zhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6V2FQDAi # GA8yMDI0MDEyNjAxMTEyOFoYDzIwMjQwMTI3MDExMTI4WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpXYVAAgEAMAcCAQACAgORMAcCAQACAhNqMAoCBQDpXtbAAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBADfZHZYexaQQJ+BL0oR9FCkI2VXT # K3PKXF8z/F20+J/NDw1bOOvdoJIQBOj0Cynyg5hWZhVIHHtwDlo/sMwHkwxt//oI # KwTomWc73qQTAwbqOpSeAFoMdCqGJ8SiBRHFv4E1V0f+BsAAF1jQI744Rg+z0lvu # raIHfqZyR+d8TI3s7mahM5M7xuBW+94QOQDfDLOVxcW3sxnBHDmB5bI9XNW1x6M4 # 6/rnLI8qUWs1hhWBMSdJ7IgcdI2lwRB6GHdmDVAsmWCim+JzLGoGNr1quYaAJhoH # X0UmOJ29zKh0Xbk7c0PyfeHpFtsESzoso1ILa9Ehy1rjq8+tvjlcxQSGvhAxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdB3 # CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCBIpghnZ2Y7U8RIeQ/+OI6svZs # 35e+BBx/0wxTYeQZiTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIAiVQAZf # tNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAwIgQgm5S8mLJS # a8/pPK6vdacrZmPJEAl91aLZzCTISTtXJ3wwDQYJKoZIhvcNAQELBQAEggIAKxc5 # j4TS6Ewo64xq2dKGgJT54uywk2DmPlksAsrbrmYVDszGkPLj2a3Ax56hhG9rRlJz # GbdBFzK91JFyVYKalu98/vxEI4goJ7wFy2yp3kpz2SSV7d+4PoOyTpIaxu70v6/R # m4guNowVh+JRY6u/HttbCwZ29VaPfd+DtV7W12fxFly8Yp1ULKfZQoAfvNwa26P5 # 8CXnWjXhUvKRHVi7dfnIm53w6mVaZ5ZzeJCOIJP20CEo3DAlpTdE+28wmnT3eozS # cBznJQExsHirG9A8JUnjVLQjZ+8WFdJ3jYOOwWIWJeLK/3J6zQThwEliMsVx5fb4 # OEiwE9ATq2ZHUs1RalKcAdOD1Xe0jMJQzdP+qhmM0eEUmjSl93IoCmdT0dIrn2b+ # WZbPipDDvXwAsOr+QaaYyVhYOFLKFfaSXQwmmjm8ed4eWT7WcNrS8UqH12zTbvtQ # Ryuj7RglkY2oaVtjc2J4+TThGw+UKNcQLA+Nb8w+wbUuA8pNcSlufeqhEb5CplIK # teRd9fRImVjSl2gNDUidAUMcZFvLZ5gjGLXF3Wz10TUYikc3v0uEPivWxHF0urq4 # VZoeo4L+s3SvFCGSSkDbKU7xBT/Nz+R4GYkW9fh3h2e3DEnOExBnAmHznE5F6ZgR # 6XSJuBcv2ANnGRO6g7a0LWGzd3MYObQUQz4XUgs= # SIG # End signature block
combined_dataset/train/non-malicious/878.ps1
878.ps1
function new-hdinsightwithscriptaction { $ErrorActionPreference = "Stop" $context = Get-AzContext if ($context -eq $null) { Connect-AzAccount } $context $resourceGroupName = Read-Host -Prompt "Enter the resource group name" $location = Read-Host -Prompt "Enter the Azure region to create resources in" New-AzResourceGroup -Name $resourceGroupName -Location $location $defaultStorageAccountName = Read-Host -Prompt "Enter the name of the storage account" New-AzStorageAccount ` -ResourceGroupName $resourceGroupName ` -Name $defaultStorageAccountName ` -Type Standard_LRS ` -Location $location $defaultStorageAccountKey = (Get-AzStorageAccountKey ` -ResourceGroupName $resourceGroupName ` -Name $defaultStorageAccountName)[0].Value $defaultStorageContext = New-AzStorageContext ` -StorageAccountName $defaultStorageAccountName ` -StorageAccountKey $defaultStorageAccountKey $clusterName = Read-Host -Prompt "Enter the name of the HDInsight cluster" $httpCredential = Get-Credential -Message "Enter Cluster login credentials" -UserName "admin" $sshCredential = Get-Credential -Message "Enter SSH user credentials" $clusterSizeInNodes = "4" $clusterVersion = "3.5" $clusterType = "Hadoop" $clusterOS = "Linux" $defaultBlobContainerName = $clusterName New-AzStorageContainer ` -Name $clusterName -Context $defaultStorageContext $config = New-AzHDInsightClusterConfig $scriptActionUri="https://hdiconfigactions.blob.core.windows.net/linuxgiraphconfigactionv01/giraph-installer-v01.sh" $config = Add-AzHDInsightScriptAction ` -Config $config ` -Name "Install Giraph" ` -NodeType HeadNode ` -Uri $scriptActionUri $config = Add-AzHDInsightScriptAction ` -Config $config ` -Name "Install Giraph" ` -NodeType WorkerNode ` -Uri $scriptActionUri New-AzHDInsightCluster ` -Config $config ` -ResourceGroupName $resourceGroupName ` -ClusterName $clusterName ` -Location $location ` -ClusterSizeInNodes $clusterSizeInNodes ` -ClusterType $clusterType ` -OSType $clusterOS ` -Version $clusterVersion ` -HttpCredential $httpCredential ` -DefaultStorageAccountName "$defaultStorageAccountName.blob.core.windows.net" ` -DefaultStorageAccountKey $defaultStorageAccountKey ` -DefaultStorageContainer $containerName ` -SshCredential $sshCredential } function use-scriptactionwithcluster { $ErrorActionPreference = "Stop" $context = Get-AzContext if ($context -eq $null) { Connect-AzAccount } $context $clusterName = Read-Host -Prompt "Enter the name of the HDInsight cluster" $scriptActionName = Read-Host -Prompt "Enter the name of the script action" $scriptActionUri = Read-Host -Prompt "Enter the URI of the script action" $nodeTypes = "headnode", "workernode" Submit-AzHDInsightScriptAction -ClusterName $clusterName ` -Name $scriptActionName ` -Uri $scriptActionUri ` -NodeTypes $nodeTypes ` -PersistOnSuccess } function get-scriptactionhistory { Get-AzHDInsightScriptActionHistory -ClusterName mycluster Get-AzHDInsightScriptActionHistory -ClusterName mycluster ` -ScriptExecutionId 635920937765978529 Set-AzHDInsightPersistedScriptAction -ClusterName mycluster ` -ScriptExecutionId 635920937765978529 Remove-AzHDInsightPersistedScriptAction -ClusterName mycluster ` -Name "Install Giraph" }
combined_dataset/train/non-malicious/sample_0_32.ps1
sample_0_32.ps1
# # PowerConsole profile # <# .SYNOPSIS Clear the host content. .DESCRIPTION This function replaces the standard Clear-Host and is aliased by "cls". #> function Clear-Host { $host.PrivateData.ClearHost() } <# .SYNOPSIS Simple path completion function for PowerConsole. #> function _TabExpansionPath($line) { function UnquoteString($s) { if ($s.StartsWith('"') -or $s.StartsWith("'")) { $s = $s.Substring(1) } if ($s.EndsWith('"') -or $s.EndsWith("'")) { $s = $s.Substring(0, $s.Length - 1) } return $s } $e = $null $tokens = @([System.Management.Automation.PSParser]::Tokenize($line, [ref]$e)) $lastToken = $tokens | Select-Object -Last 1 $replaceStart = -1 $lastWord = $null if ($lastToken -and ($lastToken.EndColumn -gt $line.Length)) { #Last token is terminated if ($tokens.Length -gt 1) { $prevToken = $tokens[$tokens.Length - 2] if ($prevToken.EndColumn -eq $lastToken.StartColumn) { $replaceStart = $prevToken.StartColumn - 1 $lastWord = (UnquoteString $prevToken.Content) + (UnquoteString $lastToken.Content) } } if ($replaceStart -lt 0) { $replaceStart = $lastToken.StartColumn - 1 $lastWord = UnquoteString $lastToken.Content } } else { #There is unrecognized/unterminated words if(!$lastToken) { $lastWord = $line } else { $lastWord = $line.Substring($lastToken.EndColumn - 1).TrimStart() } $replaceStart = $line.Length - $lastWord.Length $lastWord = UnquoteString $lastWord } # If previously unquoted, put back quote in results $unquoted = ($replaceStart -lt ($line.Length - $lastWord.Length)) $relative = !(($lastWord.IndexOf(':') -ge 0) -or $lastWord.StartsWith('/') -or $lastWord.StartsWith('\')) $result = "" | select ReplaceStart, Paths $result.ReplaceStart = $replaceStart $result.Paths = @(Resolve-Path ${lastWord}* -ErrorAction SilentlyContinue -Relative:$relative | %{ # Resolve-Path may return PathInfo or String (e.g. when passing different -Relative) $path = $_.ToString() if ($unquoted -or ($path.IndexOf(' ') -ge 0)) { "'$path'" } else { $path } }) $result } <# .SYNOPSIS Get an explicit interface on an object so that you can invoke the interface members. .DESCRIPTION PowerShell object adapter does not provide explicit interface members. For COM objects it only makes IDispatch members available. This function helps access interface members on an object through reflection. A new object is returned with the interface members as ScriptProperties and ScriptMethods. .EXAMPLE $dte2 = Get-Interface $dte ([EnvDTE80.DTE2]) #> function Get-Interface { Param( $Object, [type]$InterfaceType ) [NuGetConsole.Host.PowerShell.Implementation.PSTypeWrapper]::GetInterface($Object, $InterfaceType) } <# .SYNOPSIS Get a VS service. .EXAMPLE Get-VSService ([Microsoft.VisualStudio.Shell.Interop.SVsShell]) ([Microsoft.VisualStudio.Shell.Interop.IVsShell]) #> function Get-VSService { Param( [type]$ServiceType, [type]$InterfaceType ) $service = [Microsoft.VisualStudio.Shell.Package]::GetGlobalService($ServiceType) if ($service -and $InterfaceType) { $service = Get-Interface $service $InterfaceType } $service } <# .SYNOPSIS Get VS IComponentModel service to access VS MEF hosting. #> function Get-VSComponentModel { Get-VSService ([Microsoft.VisualStudio.ComponentModelHost.SComponentModel]) ([Microsoft.VisualStudio.ComponentModelHost.IComponentModel]) } # Set initial directory Set-Location "$env:USERPROFILE" # For PowerShell v2, we need to create a reference to the default TabExpansion function # so we can delegate back to it in our custom function. This isn't needed in PowerShell v3, # as omitting output in a custom TabExpansion function signals to TabExpansion2 that it # should use its own completion list. if ((Test-Path Function:\DefaultTabExpansion) -eq $false -and (Test-Path Function:\TabExpansion)) { Rename-Item Function:\TabExpansion DefaultTabExpansion } function TabExpansion([string]$line, [string]$lastWord) { $nugetSuggestions = & (Get-Module NuGet) NuGetTabExpansion $line $lastWord if ($nugetSuggestions.NoResult) { # We only want to delegate back to the default tab completion in PowerShell v2. # PowerShell v3's TabExpansion2 will use its own command completion list if the # custom TabExpansion doesn't return anything. if (Test-Path Function:\DefaultTabExpansion) { $line = $line.ToUpperInvariant() $lastWord = $lastWord.ToUpperInvariant() return DefaultTabExpansion $line $lastWord } } else { return $nugetSuggestions } } # default prompt function prompt { "PM>" } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCARzTlS/QQtfl27 # Gi/PIpVaGHwa/jmFZ4p61M4kNqYLaqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIfZ # fxr49tE5KPcC5C+/J9D7oTA/FMWgstbX4pcMJPEBMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAHRlnRNcxa70YpdLVO92G5HTdBX4l9oP7i10b # 8TG8Fway/7Pmn99Pls6MaQ/I6EvPb2gVn2g61KBhI94Gnan/zZ9FaB7O+sGiTJH2 # WJBBpj2vXR/VCV5nmxwZQpVKxNkw+RvcmV3hqrFLVdv0vhJ4ODZN3bC/bLU6663E # E3zaEEgYEamIVL7gsGhIRaFDB9wJStEqThrXYrp9tiVyJstnk3DgnQ/EIXi8FtfI # teR8y4niwgB2sWSKiZIghjwyFtGmzHGAESzUqexesIYKkDomgjRhAvJJK2C4iP5J # 0+pp+9by3fWqEijTQY00nyw2JZP8cyDKGahURoW39dj3cZx83KGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCClAe8GKcP/fNpYGCXVJF+4pZI7OxPG5+h4 # OS/xba8CwgIGZutnE5boGBMyMDI0MTAwMzE5NTMxNS4zNzRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOqpAoswIhgPMjAyNDEwMDMxMTQ2MTlaGA8yMDI0 # MTAwNDExNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6qkCiwIBADAKAgEA # AgIUaQIB/zAHAgEAAgIUOzAKAgUA6qpUCwIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQDHz3MNZwjtxhjacX3MpMK9Vc/DopMJKojUpREbcoicXR7yxYmjdS8U # KnJKUpz94mn1KOLcpoPZiGb3O6hjBqogsOhrAbi5/Iec60qj/1L4J/w/NtBUObXJ # spJwXkxXOt8+dNcL+u6RWO6OaU01a5wpKktSir/SnIPEtDoGhl4odosRgd62a6Xk # cQFq2qwY+IF2ORGfMAMWSVJPB7Aj6ORgnm15/Na1dOlN8OLx98Fak4B9DNbEC8dp # G/x0x5oMHpDJfs5NALxLAFf/e6bjbSWQ1rgr9D+S+svWCNU4eJuDqU4Oxh29Y6Bl # E+H+QAhWyPHhPFMkRBIrldRDR+NqiZ8VMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgvSrAOarSWO4BSc7Rby7F4GQOVSTWqnZdsaON+EHxmGYwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIBSpb65aZrMfTKY64lqssUh0I4twE86abU7Y # BEUc0xAIMA0GCSqGSIb3DQEBCwUABIICAFd3RIwcZdmVuF2wafLW8NJNAViPcxFt # JOsMpZ4ZdzoenBa5N7/tzL15Hfe6Q91YntC0tEoLYwnyV9SZmXLPP035asruXJnD # d6o+XNHhT6TFruOqg07ULFBlJxK4KjzGPHf49KNmLe1NOvFh1Ltb6/jDKPt7JZ4/ # 8NhbB9FZD6Q3sJgKwvR6hG8Sg7Qudt9GZtWUW11eMfvAVlAEstB8fklDNnBhR4Yl # 1wQRXfMoiDlGqHjCTOG84WGNlNZKnkGeg4A9jna3IRYhUNCqeVDaKH2Ggwp5+ILu # iaWCrvq4NsJ5Nzxv9nja9IqwhUAVAn9Yv0W7p9EqmefDGVbd/RikBh3BM0tbKowR # QB/uX18Ahy8+wCl/tunm1pM2l4OVVpbBgZMYrzNL9f0NLG47zOHu0RTVQGKQ4YNO # h4QEaeQI0ojcFbh4ARx2yuI/42EAeswU36SKtpntwrAl6BeqmLVmBNzJtnAuLVNC # xNC4YUJHkPeBLNmlgJ/8Xy2xSJ67PwUH9gMifKDmBuYlmAwAMAcp02Tdvvh+d9AN # 1d8x1quvmXQo0q/3FKiNIAI92/IHJ/ifBlusSMhq/0iHzJgjkmq2EjhSdC1yLOIV # XR12qjcawOG+Cpi/0L+xRO8PMtQ8Jtb6KiI9bz8uPrOfEI1ed8WHF1F6G0z8wEOr # 1hPSKNqMX7x+ # SIG # End signature block